Meta-análisis de vulnerabilidades y gestión del riesgo en arquitecturas Cloud

Trabajo de investigación

Autores:
Pérez-Cuestas, Javier Alexander
Tipo de recurso:
Trabajo de grado de pregrado
Fecha de publicación:
2020
Institución:
Universidad Católica de Colombia
Repositorio:
RIUCaC - Repositorio U. Católica
Idioma:
spa
OAI Identifier:
oai:repository.ucatolica.edu.co:10983/25312
Acceso en línea:
https://hdl.handle.net/10983/25312
Palabra clave:
PROTECCIÓN DE DATOS
ANÁLISIS
CIBERCRIMEN
DELITO INFORMÁTICO
SEGURIDAD DE LOS DATOS
Rights
openAccess
License
Derechos Reservados - Universidad Católica de Colombia, 2020
id UCATOLICA2_b056106340638bd278f420f234c4f310
oai_identifier_str oai:repository.ucatolica.edu.co:10983/25312
network_acronym_str UCATOLICA2
network_name_str RIUCaC - Repositorio U. Católica
repository_id_str
dc.title.spa.fl_str_mv Meta-análisis de vulnerabilidades y gestión del riesgo en arquitecturas Cloud
title Meta-análisis de vulnerabilidades y gestión del riesgo en arquitecturas Cloud
spellingShingle Meta-análisis de vulnerabilidades y gestión del riesgo en arquitecturas Cloud
PROTECCIÓN DE DATOS
ANÁLISIS
CIBERCRIMEN
DELITO INFORMÁTICO
SEGURIDAD DE LOS DATOS
title_short Meta-análisis de vulnerabilidades y gestión del riesgo en arquitecturas Cloud
title_full Meta-análisis de vulnerabilidades y gestión del riesgo en arquitecturas Cloud
title_fullStr Meta-análisis de vulnerabilidades y gestión del riesgo en arquitecturas Cloud
title_full_unstemmed Meta-análisis de vulnerabilidades y gestión del riesgo en arquitecturas Cloud
title_sort Meta-análisis de vulnerabilidades y gestión del riesgo en arquitecturas Cloud
dc.creator.fl_str_mv Pérez-Cuestas, Javier Alexander
dc.contributor.advisor.spa.fl_str_mv Bolívar-Barón, Holman Diego
dc.contributor.advisor.none.fl_str_mv Bolívar-Barón, Holman Diego
dc.contributor.author.spa.fl_str_mv Pérez-Cuestas, Javier Alexander
dc.subject.lemb.spa.fl_str_mv PROTECCIÓN DE DATOS
topic PROTECCIÓN DE DATOS
ANÁLISIS
CIBERCRIMEN
DELITO INFORMÁTICO
SEGURIDAD DE LOS DATOS
dc.subject.proposal.spa.fl_str_mv ANÁLISIS
CIBERCRIMEN
DELITO INFORMÁTICO
SEGURIDAD DE LOS DATOS
description Trabajo de investigación
publishDate 2020
dc.date.accessioned.spa.fl_str_mv 2020-12-11T15:09:01Z
dc.date.available.spa.fl_str_mv 2020
2020-12-11T15:09:01Z
dc.date.issued.spa.fl_str_mv 2020
dc.type.spa.fl_str_mv Trabajo de grado - Pregrado
dc.type.coarversion.fl_str_mv http://purl.org/coar/version/c_71e4c1898caa6e32
dc.type.coar.spa.fl_str_mv http://purl.org/coar/resource_type/c_7a1f
dc.type.content.spa.fl_str_mv Text
dc.type.driver.spa.fl_str_mv info:eu-repo/semantics/bachelorThesis
dc.type.redcol.spa.fl_str_mv https://purl.org/redcol/resource_type/TP
dc.type.version.spa.fl_str_mv info:eu-repo/semantics/submittedVersion
format http://purl.org/coar/resource_type/c_7a1f
status_str submittedVersion
dc.identifier.citation.spa.fl_str_mv Pérez-Cuestas, J. A. (2020). Meta-análisis de vulnerabilidades y gestión del riesgo en arquitecturas Cloud. Trabajo de Grado. Universidad Católica de Colombia. Facultad de Ingeniería. Programa de Ingeniería de Sistemas. Bogotá, Colombia
dc.identifier.uri.spa.fl_str_mv https://hdl.handle.net/10983/25312
identifier_str_mv Pérez-Cuestas, J. A. (2020). Meta-análisis de vulnerabilidades y gestión del riesgo en arquitecturas Cloud. Trabajo de Grado. Universidad Católica de Colombia. Facultad de Ingeniería. Programa de Ingeniería de Sistemas. Bogotá, Colombia
url https://hdl.handle.net/10983/25312
dc.language.iso.spa.fl_str_mv spa
language spa
dc.relation.references.spa.fl_str_mv A survey of fault tolerance in cloud computing, ScienceDirect, September 2018.
Aditya K. Sood, Ph.D., and Rehan Jalil. Amenazas en la nube—Comprender los ataques y las defensas de la aplicación en la nube. Https://www.isaca.org/Journal/archives/2018/Volume-1/Pages/cloudifying-threatsunderstanding- cloud-app-attacks-and-defenses-spanish.aspx?utm_referrer=
Agencia Europea de Seguridad de las Redes y de la Información (ENISA), 2009, Beneficios, riesgos y recomendaciones para la seguridad de la información [online], Disponible desde Internet: https://www.enisa.europa.eu/activities/riskmanagement/ files/.../file.
Al Morsy, Grundy, Müller. An Analysis of the Cloud Computing Security Problem. Computer Science & Software Engineering, Faculty of Information & Communication Technologies Swinburne University of Technology, Hawthorn. 2010.
Ali, Khan, Vasilakos. Security in cloud computing: Opportunities and challenges. Science Direct 2015.
Alliance, Cloud Security. 2011. Cloudsecurityalliance.org. 2011. https://cloudsecurityalliance.org/wp-content/uploads/2011/09/SecaaS_V1_0.pdf.
Armbrust, Fox, Griffith, Joseph, Katz, Konwinski, Lee, Patterson, Rabkin, Stoica, y Zaharia. A View of Cloud Computing. Communications of the ACM April 2010.
Ateniese, Burns, Curtmola, Herring, Kissner, Peterson, Song. Provable Data Possession at Untrusted Stores. ACM Conference on Computer and Communications Security (CCS 2007).
Barham, Dragovic, Fraser, Hand, Harris, Ho, Neugebauer, Pratt, Warfield. Xen and the Art of Virtualization. ACM 2003.
Beneficios, riesgos y recomendaciones para la seguridad de la información European Network and Information Security Agency (ENISA) 2009.
Bhadauria, Chaki, Chaki, Sanyal. A Survey on Security Issues in Cloud Computing. Hunedoara, University Politehnica Timisoara. ISSN: 2067 – 3809 Tome VII 2014.
Blanco Jiménez Francisco, Romero Ania Alberto, Gómez Fidalgo Diana, Vizcaíno López Alberto, Oportunidades: emprendimiento verde, social y tecnológico. Ed ESIC 2013.
Brown, Anderson, Tan. Multitenancy - Security Risks and Countermeasures. Athabasca University 2018.
Buyya, Shin, Venugopal, Broberg, Brandic. Cloud Computing and Emerging IT Platforms: Vision, Hype, and Reality for Delivering Computing as the 5th Utility. Department of Computer Science and Software Engineering the University of Melbourne.2009.
Carter William A, Zheng Denise E. The Evolution of Cybersecurity Requirements for the U.S. Financial Industry. CSIS. July 2015.
Chow, Golle, Jakobsson, Masuoka, Molina. Controlling Data in the Cloud: Outsourcing Computation without Outsourcing Control. ACM 2009.
CISO Benchmark Report Cisco Cybersecurity Series Marzo 2019.
Cloud Computing: A Review of Features, Benefits, and Risks, and Recommendations for Secure, Efficient Implementations, Junio 2012 (NIST).
Contractor, D., Patel, D.R.: Trust management framework for attenuation of application layer Ddos attack incloud computing. In: Trust Management VI, pp. 201– 208. Springer, 2012.
Curso Google Activate Cloud Computing
Dahbur, Mohammad, Tarakji. A Survey of Risks, Threats and Vulnerabilities in Cloud Computing. School of Engineering and Computing Sciences New York Institute of Technology ACM 2011.
Dawoud, Takouna, Meinel. Infrastructure as a Service Security: Challenges and Solutions. Hasso Plattner Institute and Ministry of Education & Higher Education.2008
Deyan Chen, Hong Zhao. Data Security and Privacy Protection Issues in Cloud Computing. International Conference on Computer Science and Electronics Engineering IEEE 2012.
E. Grosse, “Security at Scale”, ACM Cloud Security Workshop (CCSW), 2010 https://wn.com/2010_google_faculty_summit_security_at_scale.
Fernandes, Soares, Gomes, Freire, Inácio. Security Issues in Cloud Environments — A Survey. Instituto de Telecomunicaciones, Department of Computer Science, University of Beira Interior, Rua Marques d’Avila e Bolama, 2013.
Flavio Lombardi, Roberto Di Pietro. Secure virtualization for cloud computing. ScienceDirect 2010.
Garfinkel, Rosenblum. A Virtual Machine Introspection Based Architecture for Intrusion Detection. Computer Science Department, Stanford University 2009.
Garfinkel, Rosenblum. When Virtual is Harder than Real: Security Challenges in Virtual Machine Based Computing Environments. Stanford University Department of Computer Science,2013.
Gonzalez, Miers, Redígolo, Simplício, Carvalho, Naslund, Pourzandi. A quantitative analysis of current security concerns and solutions for cloud computing. Springer Journal of Cloud Computing: Advances, Systems and Applications 2012.
Goscinski Andrzej, Broberg James, Buyya Rajkumar. Cloud Computing: Principles and Paradigms2011.
Green Cloud computing and Environmental Sustainability, SK Garg, R Buyya, Harnessing Green IT: Principles and Practices 2012.
Grobauer, Walloschek, Stöcker. Understanding Cloud Computing Vulnerabilities. Published by the IEEE Computer Society May 2012.
Harauz, Kaufman, Potter Data Security in the World of Cloud Computing. IEEE Computer and Reliability Societies July-August 2009.
Hashizume, Rosado, Fernández-Medina, Fernandez. An analysis of security issues for cloud computing. Springer link 2013.
https://www.salesforce.com/mx/cloud-computing/.
J. Oriol Fito and Jordi Guitart, Introducing Risk Management into Cloud Computing.
Jensen, Schwenk, Gruschka, Iacono. On Technical Security Issues in Cloud Computing. IEEE International Conference on Cloud Computing. 2010
Khalil, Khreishah, Azeem. Cloud Computing Security: A Survey. Computers ISSN 2073-431X. 2014
L. Youseff, M. Butrico y D. Da Silva, "Hacia una ontología unificada de la computación en la nube", Proc. Taller de Entornos de Computación Grid (GCE), IEEE Press, 2008; Doi: 10.1109 / GCE.2008.4738443.
Liu, Yarom, Ge, Heiser, Lee. Last-Level Cache Side-Channel Attacks are Practical. IEEE Symposium on Security and Privacy.2015
Mahesh U. Shankarwar, Ambika V. Pawar.Security and Privacy in Cloud Computing: A Survey. CSE Department, SIT, Symbiosis International University, Springer International.2015
Malar, Prabhu. An Analysis Of Security Issues In Cloud Computing International Journal of Civil Engineering and Technology (IJCIET) 2019
Maillé Éric, Mennecier René-François, Bento Alberto M, Aggarwal Anil. VMware vSphere 5 en el seno del datacenter, Ed. ENI, 2012, y Tomado Cloud computing service and deployment models: layers and management Ed. Hershey, Pa.: Business Science Reference 2013.
Mell, Grance. The NIST Definition of Cloud Computing Recommendations of the National Institute of Standards and Technology NIST Special Publication 2011.
Mell Peter, Timothy Grance. The NIST definition of Cloud Computing Special Publication 800-145.September 2011. http://faculty.winthrop.edu/domanm/csci411/Handouts/NIST.pdf
Modi, Patel, Borisaniya, Patel, Rajarajan. A Survey on Security Issues and Solutions at Different Layers of Cloud Computing. University of London Institutional Repository 2013.
Normas ISO 27001(seguridad de la Información), ISO 31000(Riesgo), 9001(Calidad), ISO 27018(Protección Información Personal Nube).
P.S. Suryateja. Threats and Vulnerabilities of Cloud Computing: A Review. Dept., Vishnu Institute of Technology 2018
Perez-Botero, D., Szefer, J., Lee, R.B.: Characterizing hypervisor vulnerabilities in cloud computing servers. In: Proceedings of the 2013 international workshop on Security in Cloud Computing, pp. 3–10. ACM, 2013.
Perez-Botero, Szefer, Lee. Characterizing Hypervisor Vulnerabilities in Cloud Computing Servers. Princeton University, 2013
Popović, Hocenski. Cloud computing security issues and challenges. Institute of Automation and Process Computing. MIPRO 2010, May 24-28, 2010.
Ramgovind, Eloff, Smith. The Management of Security in Cloud Computing. School of Computing, University of South Africa, Pretoria, South Africa IEEE 2010.
Report on Cybersecurity Practices—February 2015 FINRA.
Risk and Vulnerabilities in the EU Financial System Joint Committee Risk Report April 2018.
Ristenpart, Tromer, Shacham, Savage. Hey, You, Get Off of My Cloud: Exploring Information Leakage in Third-Party Compute Clouds. ACM 2009.
Santos, Gummadi, Rodrigues. Towards Trusted Cloud Computing. MPI-SWS. 2009
Saripalli, Walters. QUIRC: A Quantitative Impact and Risk Assessment Framework for Cloud Security. IEEE 3rd International Conference on Cloud Computing.2010.
Security Guidance for Critical Areas of Focus in Cloud Computing V4.0 2017 CS.
Social media is a cybersecurity risk for business, cybersecurity insights By Charles Cooper. https://www.csoonline.com/article/3198715/social-media-is-acybersecurity- risk-for-business.html.
Somorovsky, Heiderich, Gruschka, Lo Iacono. All Your Clouds are Belong to us Security Analysis of Cloud Management Interfaces. ACM 2011.
Swathi, Subrahmanyam, Ram Gopal. A Survey on Intrusion Detection Techniques for Cloud. Institute of Technology, Vijayawada and Indira Gandhi National Open University. 2016.
Szefer, Keller, B. Lee, Rexford. Eliminating the Hypervisor Attack Surface for a More Secure Cloud. Princeton University, ACM 2011.
Takabi, Joshi, Ahn. Security and Privacy Challenges in Cloud Computing Environments. Copublished by the IEEE computer and reliability societies November –December 2010.
Toumi, Talea, Marzak, Eddaoui, Talea. Cooperative Trust Framework for Cloud Computing Based on Mobile Agents. International Journal of Communication Networks and Information Security (IJCNIS) Vol. 7 No 2. August 2015.
Vaquero, Merino, Morán. Locking the sky: a survey on IaaS cloud security. Springer- Verlag 2010.
Vaquero, Rodero, Caceres, Lindner. A Break in the Clouds: Towards a Cloud Definition. ACM Computer Communication Review Volume 39, Number 1, January 2009.
Vieira, Schulter, Westphall, Merkle Westphall, Intrusion Detection for Grid and Cloud Computing. Federal University of Santa Catarina, IEEE Computer Society 2010.
Wayne A. Jansen. Cloud Hooks: Security and Privacy Issues in Cloud Computing. 44th Hawaii International Conference on System Sciences IEEE. 2011.
Wei, Zhang, Ammons, Bala, Ning. Managing Security of Virtual Machine Images in a Cloud Environment. ACM 2009.
W van den Bent Johannes, Van der Steeg Martine EXIN Cloud Computing Foundation Workbook, Ed. Zaltbommel: Van Haren Publishing, 2018.
Zhang, Chen, Chen, Zang. CloudVisor: Retrofitting Protection of Virtual Machines in Multi-tenant Cloud with Nested Virtualization. Parallel Processing Institute Fudan University. ACM 2011.
Zhang, Cheng, Boutaba. Cloud computing: state-of-the-art and research challenges. The Brazilian Computer Society 2010.
Zhang, Reiter, Juels, Ristenpart. Cross-VM Side Channels and Their Use to Extract Private Keys ACM 2012.
Zhi Wang, Xuxian Jiang HyperSafe: A Lightweight Approach to Provide Lifetime Hypervisor Control-Flow Integrity. Department of Computer Science North Carolina State University.2011.
Zhifeng Xiao, Yang Xiao. Security and Privacy in Cloud Computing. IEEE Communications Surveys & Tutorials, vol. 15, no. 2, second quarter. 2013
Zissis, Lekkas. Addressing cloud computing security issues. SciVerse ScienceDirect. 2010
dc.rights.spa.fl_str_mv Derechos Reservados - Universidad Católica de Colombia, 2020
dc.rights.coar.fl_str_mv http://purl.org/coar/access_right/c_abf2
dc.rights.accessrights.spa.fl_str_mv info:eu-repo/semantics/openAccess
dc.rights.creativecommons.spa.fl_str_mv Atribución-NoComercial-SinDerivadas 4.0 Internacional (CC BY-NC-ND 4.0)
dc.rights.uri.spa.fl_str_mv https://creativecommons.org/licenses/by-nc-nd/4.0/
rights_invalid_str_mv Derechos Reservados - Universidad Católica de Colombia, 2020
Atribución-NoComercial-SinDerivadas 4.0 Internacional (CC BY-NC-ND 4.0)
https://creativecommons.org/licenses/by-nc-nd/4.0/
http://purl.org/coar/access_right/c_abf2
eu_rights_str_mv openAccess
dc.format.extent.spa.fl_str_mv 90 páginas
dc.format.mimetype.spa.fl_str_mv application/pdf
dc.publisher.spa.fl_str_mv Universidad Católica de Colombia
dc.publisher.faculty.spa.fl_str_mv Facultad de Ingeniería
dc.publisher.place.spa.fl_str_mv Bogotá
dc.publisher.program.spa.fl_str_mv Ingeniería de Sistemas y Computación
institution Universidad Católica de Colombia
bitstream.url.fl_str_mv https://repository.ucatolica.edu.co/bitstreams/42ce6b3c-0095-47ba-bdc4-92f75886430e/download
https://repository.ucatolica.edu.co/bitstreams/f9384365-e77d-4737-b394-0533b472ffbb/download
https://repository.ucatolica.edu.co/bitstreams/6d35aca6-fa2b-48bc-bf10-d6ca6e643830/download
https://repository.ucatolica.edu.co/bitstreams/2063b4c8-d644-4fba-93d0-35b41699da68/download
https://repository.ucatolica.edu.co/bitstreams/7194a65b-b1f4-4b5f-b0d6-4236e743bcc4/download
https://repository.ucatolica.edu.co/bitstreams/299bef37-dca8-419f-86b4-b2a034ca4fea/download
bitstream.checksum.fl_str_mv 1547ab452069b4e7402bc2419f72b7e0
6c6d26e42d18246e6fcf349a21cdc978
91a08c807fc5c4690527b58623b23011
e5c2a7dee9bb88c5d6f1615848b857ff
cce2e3428dd23bf7718fef4cc3911a7c
757241e7e0a4d09568b627250359ae03
bitstream.checksumAlgorithm.fl_str_mv MD5
MD5
MD5
MD5
MD5
MD5
repository.name.fl_str_mv Repositorio Institucional Universidad Católica de Colombia - RIUCaC
repository.mail.fl_str_mv bdigital@metabiblioteca.com
_version_ 1814256332431163392
spelling Bolívar-Barón, Holman Diegoaa0d5dfe-1bce-43c8-a4ef-0c22c5eb69d8-1Bolívar-Barón, Holman Diegovirtual::2300-1Pérez-Cuestas, Javier Alexander0d10b7a0-0854-4b60-b9d2-a98dafba0869-12020-12-11T15:09:01Z20202020-12-11T15:09:01Z2020Trabajo de investigaciónAnalisis investigativo detectando las principales vulnerabilidades en la seguridad Cloud planteado los riesgos y cómo minimizarlos con su respectiva política tanto preventivamente como correctivamente esto además se puede decir de cómo prevenir los ataques informáticos. Con esto da como por formular plantear las políticas de seguridad desde el montaje sus diferentes arquitecturas.PregradoIngeniero de Sistemas1. INTRODUCCIÓN 2. JUSTIFICACIÓN 3. PLANTEAMIENTO DEL PROBLEMA 4. OBJETIVOS 5. MARCO CONCEPTUAL 6. MARCO TEÓRICO 7. ESTADO DEL ARTE 8. METODOLOGÍA 9. ANÁLISIS DE HETEROGENEIDAD 10. CORRELACIÓN DE VULNERABILIDADES Y RIESGOS 11. CONCLUSIONES Y TRABAJOS FUTUROS BIBLIOGRAFÍA90 páginasapplication/pdfPérez-Cuestas, J. A. (2020). Meta-análisis de vulnerabilidades y gestión del riesgo en arquitecturas Cloud. Trabajo de Grado. Universidad Católica de Colombia. Facultad de Ingeniería. Programa de Ingeniería de Sistemas. Bogotá, Colombiahttps://hdl.handle.net/10983/25312spaUniversidad Católica de ColombiaFacultad de IngenieríaBogotáIngeniería de Sistemas y ComputaciónA survey of fault tolerance in cloud computing, ScienceDirect, September 2018.Aditya K. Sood, Ph.D., and Rehan Jalil. Amenazas en la nube—Comprender los ataques y las defensas de la aplicación en la nube. Https://www.isaca.org/Journal/archives/2018/Volume-1/Pages/cloudifying-threatsunderstanding- cloud-app-attacks-and-defenses-spanish.aspx?utm_referrer=Agencia Europea de Seguridad de las Redes y de la Información (ENISA), 2009, Beneficios, riesgos y recomendaciones para la seguridad de la información [online], Disponible desde Internet: https://www.enisa.europa.eu/activities/riskmanagement/ files/.../file.Al Morsy, Grundy, Müller. An Analysis of the Cloud Computing Security Problem. Computer Science & Software Engineering, Faculty of Information & Communication Technologies Swinburne University of Technology, Hawthorn. 2010.Ali, Khan, Vasilakos. Security in cloud computing: Opportunities and challenges. Science Direct 2015.Alliance, Cloud Security. 2011. Cloudsecurityalliance.org. 2011. https://cloudsecurityalliance.org/wp-content/uploads/2011/09/SecaaS_V1_0.pdf.Armbrust, Fox, Griffith, Joseph, Katz, Konwinski, Lee, Patterson, Rabkin, Stoica, y Zaharia. A View of Cloud Computing. Communications of the ACM April 2010.Ateniese, Burns, Curtmola, Herring, Kissner, Peterson, Song. Provable Data Possession at Untrusted Stores. ACM Conference on Computer and Communications Security (CCS 2007).Barham, Dragovic, Fraser, Hand, Harris, Ho, Neugebauer, Pratt, Warfield. Xen and the Art of Virtualization. ACM 2003.Beneficios, riesgos y recomendaciones para la seguridad de la información European Network and Information Security Agency (ENISA) 2009.Bhadauria, Chaki, Chaki, Sanyal. A Survey on Security Issues in Cloud Computing. Hunedoara, University Politehnica Timisoara. ISSN: 2067 – 3809 Tome VII 2014.Blanco Jiménez Francisco, Romero Ania Alberto, Gómez Fidalgo Diana, Vizcaíno López Alberto, Oportunidades: emprendimiento verde, social y tecnológico. Ed ESIC 2013.Brown, Anderson, Tan. Multitenancy - Security Risks and Countermeasures. Athabasca University 2018.Buyya, Shin, Venugopal, Broberg, Brandic. Cloud Computing and Emerging IT Platforms: Vision, Hype, and Reality for Delivering Computing as the 5th Utility. Department of Computer Science and Software Engineering the University of Melbourne.2009.Carter William A, Zheng Denise E. The Evolution of Cybersecurity Requirements for the U.S. Financial Industry. CSIS. July 2015.Chow, Golle, Jakobsson, Masuoka, Molina. Controlling Data in the Cloud: Outsourcing Computation without Outsourcing Control. ACM 2009.CISO Benchmark Report Cisco Cybersecurity Series Marzo 2019.Cloud Computing: A Review of Features, Benefits, and Risks, and Recommendations for Secure, Efficient Implementations, Junio 2012 (NIST).Contractor, D., Patel, D.R.: Trust management framework for attenuation of application layer Ddos attack incloud computing. In: Trust Management VI, pp. 201– 208. Springer, 2012.Curso Google Activate Cloud ComputingDahbur, Mohammad, Tarakji. A Survey of Risks, Threats and Vulnerabilities in Cloud Computing. School of Engineering and Computing Sciences New York Institute of Technology ACM 2011.Dawoud, Takouna, Meinel. Infrastructure as a Service Security: Challenges and Solutions. Hasso Plattner Institute and Ministry of Education & Higher Education.2008Deyan Chen, Hong Zhao. Data Security and Privacy Protection Issues in Cloud Computing. International Conference on Computer Science and Electronics Engineering IEEE 2012.E. Grosse, “Security at Scale”, ACM Cloud Security Workshop (CCSW), 2010 https://wn.com/2010_google_faculty_summit_security_at_scale.Fernandes, Soares, Gomes, Freire, Inácio. Security Issues in Cloud Environments — A Survey. Instituto de Telecomunicaciones, Department of Computer Science, University of Beira Interior, Rua Marques d’Avila e Bolama, 2013.Flavio Lombardi, Roberto Di Pietro. Secure virtualization for cloud computing. ScienceDirect 2010.Garfinkel, Rosenblum. A Virtual Machine Introspection Based Architecture for Intrusion Detection. Computer Science Department, Stanford University 2009.Garfinkel, Rosenblum. When Virtual is Harder than Real: Security Challenges in Virtual Machine Based Computing Environments. Stanford University Department of Computer Science,2013.Gonzalez, Miers, Redígolo, Simplício, Carvalho, Naslund, Pourzandi. A quantitative analysis of current security concerns and solutions for cloud computing. Springer Journal of Cloud Computing: Advances, Systems and Applications 2012.Goscinski Andrzej, Broberg James, Buyya Rajkumar. Cloud Computing: Principles and Paradigms2011.Green Cloud computing and Environmental Sustainability, SK Garg, R Buyya, Harnessing Green IT: Principles and Practices 2012.Grobauer, Walloschek, Stöcker. Understanding Cloud Computing Vulnerabilities. Published by the IEEE Computer Society May 2012.Harauz, Kaufman, Potter Data Security in the World of Cloud Computing. IEEE Computer and Reliability Societies July-August 2009.Hashizume, Rosado, Fernández-Medina, Fernandez. An analysis of security issues for cloud computing. Springer link 2013.https://www.salesforce.com/mx/cloud-computing/.J. Oriol Fito and Jordi Guitart, Introducing Risk Management into Cloud Computing.Jensen, Schwenk, Gruschka, Iacono. On Technical Security Issues in Cloud Computing. IEEE International Conference on Cloud Computing. 2010Khalil, Khreishah, Azeem. Cloud Computing Security: A Survey. Computers ISSN 2073-431X. 2014L. Youseff, M. Butrico y D. Da Silva, "Hacia una ontología unificada de la computación en la nube", Proc. Taller de Entornos de Computación Grid (GCE), IEEE Press, 2008; Doi: 10.1109 / GCE.2008.4738443.Liu, Yarom, Ge, Heiser, Lee. Last-Level Cache Side-Channel Attacks are Practical. IEEE Symposium on Security and Privacy.2015Mahesh U. Shankarwar, Ambika V. Pawar.Security and Privacy in Cloud Computing: A Survey. CSE Department, SIT, Symbiosis International University, Springer International.2015Malar, Prabhu. An Analysis Of Security Issues In Cloud Computing International Journal of Civil Engineering and Technology (IJCIET) 2019Maillé Éric, Mennecier René-François, Bento Alberto M, Aggarwal Anil. VMware vSphere 5 en el seno del datacenter, Ed. ENI, 2012, y Tomado Cloud computing service and deployment models: layers and management Ed. Hershey, Pa.: Business Science Reference 2013.Mell, Grance. The NIST Definition of Cloud Computing Recommendations of the National Institute of Standards and Technology NIST Special Publication 2011.Mell Peter, Timothy Grance. The NIST definition of Cloud Computing Special Publication 800-145.September 2011. http://faculty.winthrop.edu/domanm/csci411/Handouts/NIST.pdfModi, Patel, Borisaniya, Patel, Rajarajan. A Survey on Security Issues and Solutions at Different Layers of Cloud Computing. University of London Institutional Repository 2013.Normas ISO 27001(seguridad de la Información), ISO 31000(Riesgo), 9001(Calidad), ISO 27018(Protección Información Personal Nube).P.S. Suryateja. Threats and Vulnerabilities of Cloud Computing: A Review. Dept., Vishnu Institute of Technology 2018Perez-Botero, D., Szefer, J., Lee, R.B.: Characterizing hypervisor vulnerabilities in cloud computing servers. In: Proceedings of the 2013 international workshop on Security in Cloud Computing, pp. 3–10. ACM, 2013.Perez-Botero, Szefer, Lee. Characterizing Hypervisor Vulnerabilities in Cloud Computing Servers. Princeton University, 2013Popović, Hocenski. Cloud computing security issues and challenges. Institute of Automation and Process Computing. MIPRO 2010, May 24-28, 2010.Ramgovind, Eloff, Smith. The Management of Security in Cloud Computing. School of Computing, University of South Africa, Pretoria, South Africa IEEE 2010.Report on Cybersecurity Practices—February 2015 FINRA.Risk and Vulnerabilities in the EU Financial System Joint Committee Risk Report April 2018.Ristenpart, Tromer, Shacham, Savage. Hey, You, Get Off of My Cloud: Exploring Information Leakage in Third-Party Compute Clouds. ACM 2009.Santos, Gummadi, Rodrigues. Towards Trusted Cloud Computing. MPI-SWS. 2009Saripalli, Walters. QUIRC: A Quantitative Impact and Risk Assessment Framework for Cloud Security. IEEE 3rd International Conference on Cloud Computing.2010.Security Guidance for Critical Areas of Focus in Cloud Computing V4.0 2017 CS.Social media is a cybersecurity risk for business, cybersecurity insights By Charles Cooper. https://www.csoonline.com/article/3198715/social-media-is-acybersecurity- risk-for-business.html.Somorovsky, Heiderich, Gruschka, Lo Iacono. All Your Clouds are Belong to us Security Analysis of Cloud Management Interfaces. ACM 2011.Swathi, Subrahmanyam, Ram Gopal. A Survey on Intrusion Detection Techniques for Cloud. Institute of Technology, Vijayawada and Indira Gandhi National Open University. 2016.Szefer, Keller, B. Lee, Rexford. Eliminating the Hypervisor Attack Surface for a More Secure Cloud. Princeton University, ACM 2011.Takabi, Joshi, Ahn. Security and Privacy Challenges in Cloud Computing Environments. Copublished by the IEEE computer and reliability societies November –December 2010.Toumi, Talea, Marzak, Eddaoui, Talea. Cooperative Trust Framework for Cloud Computing Based on Mobile Agents. International Journal of Communication Networks and Information Security (IJCNIS) Vol. 7 No 2. August 2015.Vaquero, Merino, Morán. Locking the sky: a survey on IaaS cloud security. Springer- Verlag 2010.Vaquero, Rodero, Caceres, Lindner. A Break in the Clouds: Towards a Cloud Definition. ACM Computer Communication Review Volume 39, Number 1, January 2009.Vieira, Schulter, Westphall, Merkle Westphall, Intrusion Detection for Grid and Cloud Computing. Federal University of Santa Catarina, IEEE Computer Society 2010.Wayne A. Jansen. Cloud Hooks: Security and Privacy Issues in Cloud Computing. 44th Hawaii International Conference on System Sciences IEEE. 2011.Wei, Zhang, Ammons, Bala, Ning. Managing Security of Virtual Machine Images in a Cloud Environment. ACM 2009.W van den Bent Johannes, Van der Steeg Martine EXIN Cloud Computing Foundation Workbook, Ed. Zaltbommel: Van Haren Publishing, 2018.Zhang, Chen, Chen, Zang. CloudVisor: Retrofitting Protection of Virtual Machines in Multi-tenant Cloud with Nested Virtualization. Parallel Processing Institute Fudan University. ACM 2011.Zhang, Cheng, Boutaba. Cloud computing: state-of-the-art and research challenges. The Brazilian Computer Society 2010.Zhang, Reiter, Juels, Ristenpart. Cross-VM Side Channels and Their Use to Extract Private Keys ACM 2012.Zhi Wang, Xuxian Jiang HyperSafe: A Lightweight Approach to Provide Lifetime Hypervisor Control-Flow Integrity. Department of Computer Science North Carolina State University.2011.Zhifeng Xiao, Yang Xiao. Security and Privacy in Cloud Computing. IEEE Communications Surveys & Tutorials, vol. 15, no. 2, second quarter. 2013Zissis, Lekkas. Addressing cloud computing security issues. SciVerse ScienceDirect. 2010Derechos Reservados - Universidad Católica de Colombia, 2020info:eu-repo/semantics/openAccessAtribución-NoComercial-SinDerivadas 4.0 Internacional (CC BY-NC-ND 4.0)https://creativecommons.org/licenses/by-nc-nd/4.0/http://purl.org/coar/access_right/c_abf2PROTECCIÓN DE DATOSANÁLISISCIBERCRIMENDELITO INFORMÁTICOSEGURIDAD DE LOS DATOSMeta-análisis de vulnerabilidades y gestión del riesgo en arquitecturas CloudTrabajo de grado - Pregradohttp://purl.org/coar/resource_type/c_7a1fTextinfo:eu-repo/semantics/bachelorThesishttps://purl.org/redcol/resource_type/TPinfo:eu-repo/semantics/submittedVersionhttp://purl.org/coar/version/c_71e4c1898caa6e32PublicationXXXXvirtual::2300-1https://scienti.minciencias.gov.co/gruplac/jsp/visualiza/visualizagr.jsp?nro=00000000011415virtual::2300-1https://scholar.google.com/citations?user=VDbAneMAAAAJ&hl=esvirtual::2300-1https://orcid.org/0000-0001-5989-967Xvirtual::2300-1XXXXvirtual::2300-15d247f8f-b554-4959-b9a1-eedf9539ab98virtual::2300-15d247f8f-b554-4959-b9a1-eedf9539ab98virtual::2300-1ORIGINALMETA-ANALISIS DE VULNERABILIDADES Y GESTIÓN DEL RIESGO EN ARQUITECTURAS CLOUD.pdfMETA-ANALISIS DE VULNERABILIDADES Y GESTIÓN DEL RIESGO EN ARQUITECTURAS CLOUD.pdfapplication/pdf1768467https://repository.ucatolica.edu.co/bitstreams/42ce6b3c-0095-47ba-bdc4-92f75886430e/download1547ab452069b4e7402bc2419f72b7e0MD51F-010-GB-008_RESUMEN_ANALÍTICO_EN_EDUCACIÓN_RAE_VS_01.pdfF-010-GB-008_RESUMEN_ANALÍTICO_EN_EDUCACIÓN_RAE_VS_01.pdfapplication/pdf127574https://repository.ucatolica.edu.co/bitstreams/f9384365-e77d-4737-b394-0533b472ffbb/download6c6d26e42d18246e6fcf349a21cdc978MD52TEXTMETA-ANALISIS DE VULNERABILIDADES Y GESTIÓN DEL RIESGO EN ARQUITECTURAS CLOUD.pdf.txtMETA-ANALISIS DE VULNERABILIDADES Y GESTIÓN DEL RIESGO EN ARQUITECTURAS CLOUD.pdf.txtExtracted texttext/plain164455https://repository.ucatolica.edu.co/bitstreams/6d35aca6-fa2b-48bc-bf10-d6ca6e643830/download91a08c807fc5c4690527b58623b23011MD53F-010-GB-008_RESUMEN_ANALÍTICO_EN_EDUCACIÓN_RAE_VS_01.pdf.txtF-010-GB-008_RESUMEN_ANALÍTICO_EN_EDUCACIÓN_RAE_VS_01.pdf.txtExtracted texttext/plain17054https://repository.ucatolica.edu.co/bitstreams/2063b4c8-d644-4fba-93d0-35b41699da68/downloade5c2a7dee9bb88c5d6f1615848b857ffMD55THUMBNAILMETA-ANALISIS DE VULNERABILIDADES Y GESTIÓN DEL RIESGO EN ARQUITECTURAS CLOUD.pdf.jpgMETA-ANALISIS DE VULNERABILIDADES Y GESTIÓN DEL RIESGO EN ARQUITECTURAS CLOUD.pdf.jpgRIUCACimage/jpeg9463https://repository.ucatolica.edu.co/bitstreams/7194a65b-b1f4-4b5f-b0d6-4236e743bcc4/downloadcce2e3428dd23bf7718fef4cc3911a7cMD54F-010-GB-008_RESUMEN_ANALÍTICO_EN_EDUCACIÓN_RAE_VS_01.pdf.jpgF-010-GB-008_RESUMEN_ANALÍTICO_EN_EDUCACIÓN_RAE_VS_01.pdf.jpgRIUCACimage/jpeg19443https://repository.ucatolica.edu.co/bitstreams/299bef37-dca8-419f-86b4-b2a034ca4fea/download757241e7e0a4d09568b627250359ae03MD5610983/25312oai:repository.ucatolica.edu.co:10983/253122023-11-07 09:38:26.588https://creativecommons.org/licenses/by-nc-nd/4.0/Derechos Reservados - Universidad Católica de Colombia, 2020https://repository.ucatolica.edu.coRepositorio Institucional Universidad Católica de Colombia - RIUCaCbdigital@metabiblioteca.com