Jurnal RESTI (Rekayasa Sistem dan Teknologi Informasi) (Dec 2022)

Faux Insider Hazard Investigation on Non-Public Cloud Computing by Using ADAM’s Technique

  • Dwi Kurnia Wibowo,
  • Ahmad Luthfi,
  • Yudi Prayudi,
  • Erika Ramadhani,
  • Muhamad Maulana

DOI
https://doi.org/10.29207/resti.v6i6.4714
Journal volume & issue
Vol. 6, no. 6
pp. 1028 – 1036

Abstract

Read online

Cloud computing is a service system mechanism that businesses and organizations use to perform computerized and integrated transactions over computer networks. The service system must, of course, be”matched”with a”certain amount”of security. It is applied to” forecast the probability of cybercrime. A Cloud Service Provider (CSP) often offers cloud-based services with a basic level of security. Typically, CSPs are set up to offer their services on the open internet. Data security-focused organizations strive to shield their systems from a wide range of attackers. One of the alternatives is to construct a private cloud computing system. The issue is the potential for Man in the Cloud (MITC) assaults, which compromise and modify identities and are identified in cloud systems as phony insider threats. Based on the ISO 27032 standard research, the goal of this work is to undertake a threat analysis of MITC attack methodologies against private cloud computing services. With regards to risks to cloud services in a private cloud computing environment, it is intended that reporting and documenting the study' findings would lead to suggestions for more research and cybersecurity management procedures.

Keywords