Guideline for privacy and security in Cloud First Security Environment
This is a guideline for Cloud adopters to leverage on Cloud’s benefit while managing to avoid possible risks that may be encountered. The discussion of privacy and security in Cloud computing platform which includes data classification, security and privacy governance, guideline implementation and s...
| Main Authors: | Abdul Aziz, Normaziah, Mansor, Hafizah, Mohd Nor, Rizal, Wahiddin, Mohamed Ridza |
|---|---|
| Format: | Copyright |
| Language: | English English |
| Published: |
Cyber Security Center of Excellence, Kulliyyah of Information and Communication Technology, International Islamic University Malaysia
2017
|
| Subjects: | |
| Online Access: | http://irep.iium.edu.my/81600/ http://irep.iium.edu.my/81600/8/81600_Guideline%20for%20privacy%20and%20security-guideline.pdf http://irep.iium.edu.my/81600/7/81600_Guideline%20for%20privacy%20and%20security-copyright.pdf |
Similar Items
Study on Security Testing-as-a-Service (TaaS) in Cloud Environment
by: Ponkoodalingan, Kannan, et al.
Published: (2018)
by: Ponkoodalingan, Kannan, et al.
Published: (2018)
Security guidelines of electronic academic assets
by: Ibrahim, Subariah, et al.
Published: (2002)
by: Ibrahim, Subariah, et al.
Published: (2002)
Secure coding in software development
by: Zainuddin @ Zenah, Nor Harisah, et al.
Published: (2011)
by: Zainuddin @ Zenah, Nor Harisah, et al.
Published: (2011)
Information security culture guidelines to improve employee’s security behavior: A review of empirical studies
by: Akhyari, N., et al.
Published: (2018)
by: Akhyari, N., et al.
Published: (2018)
Web application - What makes it secure or insecure?
by: Abdul Aziz, Normaziah, et al.
Published: (2011)
by: Abdul Aziz, Normaziah, et al.
Published: (2011)
Risk identification for an information security management system implementation
by: Ramli, Noraza, et al.
Published: (2012)
by: Ramli, Noraza, et al.
Published: (2012)
A Study in Data Security in Cloud Computing
by: Mazlina, Abdul Majid, et al.
Published: (2014)
by: Mazlina, Abdul Majid, et al.
Published: (2014)
Secure coding in cross site scripting
by: Abdul Aziz, Normaziah, et al.
Published: (2011)
by: Abdul Aziz, Normaziah, et al.
Published: (2011)
Blockchain-enabled Secure Privacy-preserving System for Public Health-center Data
by: Islam, Md. Shohidul, et al.
Published: (2023)
by: Islam, Md. Shohidul, et al.
Published: (2023)
Security Everywhere Cloud: An Intensive Review of DoS and DDoS Attacks in Cloud Computing
by: Mazlina, Abdul Majid, et al.
Published: (2014)
by: Mazlina, Abdul Majid, et al.
Published: (2014)
Multimodality to improve Security and Privacy in Fingerprint Authentication System
by: Islam, Md. Rajibul, et al.
Published: (2007)
by: Islam, Md. Rajibul, et al.
Published: (2007)
Energy-efficient data security schemes for mobile users in cloud environment / Abdul Nasir Khan
by: Khan, Abdul Nasir
Published: (2014)
by: Khan, Abdul Nasir
Published: (2014)
The Effect of Security and Privacy Perceptions on Customers’ Trust to Accept Internet Banking Services: An Extension of TAM
by: Al-Sharafi, Mohammed A., et al.
Published: (2016)
by: Al-Sharafi, Mohammed A., et al.
Published: (2016)
The Dynamic Host Configuration Protocol Version 6 Security And Privacy Mechanism
by: Ibrahim, Ayman Khallel
Published: (2020)
by: Ibrahim, Ayman Khallel
Published: (2020)
Multimodality to improve Security and Privacy in Fingerprint Authentication System
by: Islam, Md. Rajibul, et al.
Published: (2007)
by: Islam, Md. Rajibul, et al.
Published: (2007)
Reducing Risks and Enhancing Security and Privacy in IoT-based Health Monitoring Application using Blockchain Technology
by: Chitra, Batumalai, et al.
Published: (2022)
by: Chitra, Batumalai, et al.
Published: (2022)
A Study On AI-Driven Solutions for Cloud Security Platform
by: Menaga, Segar, et al.
Published: (2024)
by: Menaga, Segar, et al.
Published: (2024)
Enabling security for service discovery in pervasive computing environments
by: Sharifi, Mahdi
Published: (2009)
by: Sharifi, Mahdi
Published: (2009)
Software defined networking (SDN) and its security issues
by: Abdul Aziz, Normaziah, et al.
Published: (2019)
by: Abdul Aziz, Normaziah, et al.
Published: (2019)
A Privacy Framework And Guidelines For Psychiatric Behavioural Monitoring System
by: Ramli, Rusyaizila
Published: (2016)
by: Ramli, Rusyaizila
Published: (2016)
Security Scheme for Protecting Cloud Computing Services Against Bursty DDoS Attacks
by: Mazlina, Abdul Majid, et al.
Published: (2015)
by: Mazlina, Abdul Majid, et al.
Published: (2015)
Reasoning of collaborative human behaviour in security-critical work practices: a framework
by: Wahiddin, Mohamed Ridza, et al.
Published: (2012)
by: Wahiddin, Mohamed Ridza, et al.
Published: (2012)
Security Mechanism for MANETs
by: Yasir Abdelgadir , Mohamed, et al.
Published: (2009)
by: Yasir Abdelgadir , Mohamed, et al.
Published: (2009)
Security Mechanism for MANETs
by: Yasir Abdelgadir , Mohamed, et al.
Published: (2008)
by: Yasir Abdelgadir , Mohamed, et al.
Published: (2008)
Dynamic remote data auditing for securing big data storage in cloud computing / Mehdi Sookhak
by: Sookhak, Mehdi
Published: (2015)
by: Sookhak, Mehdi
Published: (2015)
Harnessing ANN for a secure environment
by: Ling, Mee Hong *, et al.
Published: (2010)
by: Ling, Mee Hong *, et al.
Published: (2010)
Rivisit grid computing security
by: Ismail, Saiful Adli, et al.
Published: (2008)
by: Ismail, Saiful Adli, et al.
Published: (2008)
Big data security
by: Al-Shawabkeh, Mahmoud M. M.
Published: (2014)
by: Al-Shawabkeh, Mahmoud M. M.
Published: (2014)
Basics of security and cryptography
by: Pathan, Al-Sakib Khan
Published: (2014)
by: Pathan, Al-Sakib Khan
Published: (2014)
Security of present s-box
by: Taha, Imad, et al.
Published: (2012)
by: Taha, Imad, et al.
Published: (2012)
Network security setting
by: Shah, Asadullah, et al.
Published: (2011)
by: Shah, Asadullah, et al.
Published: (2011)
Security of multimedia in the web
by: Zeki, Akram M.
Published: (2011)
by: Zeki, Akram M.
Published: (2011)
A review on cloud computing security
by: Teo, Marry, et al.
Published: (2018)
by: Teo, Marry, et al.
Published: (2018)
Online securities trading and control of securities offences in Malaysia
by: Jawahitha, , Sarabdeen, et al.
Published: (2006)
by: Jawahitha, , Sarabdeen, et al.
Published: (2006)
Online securities trading and control of securities offences in Malaysia
by: Jawahitha, , Sarabdeen, et al.
Published: (2006)
by: Jawahitha, , Sarabdeen, et al.
Published: (2006)
Secure E-Voting With Blind Signature
by: Ibrahim, Subariah, et al.
Published: (2003)
by: Ibrahim, Subariah, et al.
Published: (2003)
Immunology Inspired Framework for Securing MANETs
by: Yasir Abdelgadir , Mohamed, et al.
Published: (2009)
by: Yasir Abdelgadir , Mohamed, et al.
Published: (2009)
Immune Inspired Framework for MANETs’ Security
by: Yasir Abdelgadir , Mohamed, et al.
Published: (2008)
by: Yasir Abdelgadir , Mohamed, et al.
Published: (2008)
Enhancing cloud data security using hybrid of advanced encryption standard and Blowfish encryption algorithms
by: -, Salma, et al.
Published: (2019)
by: -, Salma, et al.
Published: (2019)
An enhanced next generation security operation center framework for information system security management
by: Yau, Ti Dun
Published: (2023)
by: Yau, Ti Dun
Published: (2023)
Similar Items
-
Study on Security Testing-as-a-Service (TaaS) in Cloud Environment
by: Ponkoodalingan, Kannan, et al.
Published: (2018) -
Security guidelines of electronic academic assets
by: Ibrahim, Subariah, et al.
Published: (2002) -
Secure coding in software development
by: Zainuddin @ Zenah, Nor Harisah, et al.
Published: (2011) -
Information security culture guidelines to improve employee’s security behavior: A review of empirical studies
by: Akhyari, N., et al.
Published: (2018) -
Web application - What makes it secure or insecure?
by: Abdul Aziz, Normaziah, et al.
Published: (2011)