Analysis and Prevention of Account Hijacking Based INCIDENTS in Cloud Environment
Title | Analysis and Prevention of Account Hijacking Based INCIDENTS in Cloud Environment |
Publication Type | Conference Paper |
Year of Publication | 2015 |
Authors | Tirumala, S. S., Sathu, H., Naidu, V. |
Conference Name | 2015 International Conference on Information Technology (ICIT) |
Date Published | dec |
Keywords | Account Hijacking, account hijacking analysis, account hijacking prevention, cloud computing, cloud environment, Cloud Security, Computer crime, cyber-attack, information technology, malicious cyber activity, Organizations, pubcrawl170109, Security Incident Management, security of data, Servers, Service Hijacking, The New York Times |
Abstract | Cloud computing is a technological breakthrough in computing. It has affected each and every part of the information technology, from infrastructure to the software deployment, from programming to the application maintenance. Cloud offers a wide array of solutions for the current day computing needs aided with benefits like elasticity, affordability and scalability. But at the same time, the incidence of malicious cyber activity is progressively increasing at an unprecedented rate posing critical threats to both government and enterprise IT infrastructure. Account or service hijacking is a kind of identity theft and has evolved to be one of the most rapidly increasing types of cyber-attack aimed at deceiving end users. This paper presents an in depth analysis of a cloud security incident that happened on The New York Times online using account hijacking. Further, we present incident prevention methods and detailed incident prevention plan to stop future occurrence of such incidents. |
DOI | 10.1109/ICIT.2015.29 |
Citation Key | tirumala_analysis_2015 |
- information technology
- The New York Times
- Service Hijacking
- Servers
- security of data
- Security Incident Management
- pubcrawl170109
- Organizations
- malicious cyber activity
- Account Hijacking
- cyber-attack
- Computer crime
- Cloud Security
- cloud environment
- Cloud Computing
- account hijacking prevention
- account hijacking analysis