Meta-análisis de vulnerabilidades y gestión del riesgo en arquitecturas Cloud
Trabajo de investigación
- Autores:
-
Pérez-Cuestas, Javier Alexander
- Tipo de recurso:
- Trabajo de grado de pregrado
- Fecha de publicación:
- 2020
- Institución:
- Universidad Católica de Colombia
- Repositorio:
- RIUCaC - Repositorio U. Católica
- Idioma:
- spa
- OAI Identifier:
- oai:repository.ucatolica.edu.co:10983/25312
- Acceso en línea:
- https://hdl.handle.net/10983/25312
- Palabra clave:
- PROTECCIÓN DE DATOS
ANÁLISIS
CIBERCRIMEN
DELITO INFORMÁTICO
SEGURIDAD DE LOS DATOS
- Rights
- openAccess
- License
- Derechos Reservados - Universidad Católica de Colombia, 2020
id |
UCATOLICA2_b056106340638bd278f420f234c4f310 |
---|---|
oai_identifier_str |
oai:repository.ucatolica.edu.co:10983/25312 |
network_acronym_str |
UCATOLICA2 |
network_name_str |
RIUCaC - Repositorio U. Católica |
repository_id_str |
|
dc.title.spa.fl_str_mv |
Meta-análisis de vulnerabilidades y gestión del riesgo en arquitecturas Cloud |
title |
Meta-análisis de vulnerabilidades y gestión del riesgo en arquitecturas Cloud |
spellingShingle |
Meta-análisis de vulnerabilidades y gestión del riesgo en arquitecturas Cloud PROTECCIÓN DE DATOS ANÁLISIS CIBERCRIMEN DELITO INFORMÁTICO SEGURIDAD DE LOS DATOS |
title_short |
Meta-análisis de vulnerabilidades y gestión del riesgo en arquitecturas Cloud |
title_full |
Meta-análisis de vulnerabilidades y gestión del riesgo en arquitecturas Cloud |
title_fullStr |
Meta-análisis de vulnerabilidades y gestión del riesgo en arquitecturas Cloud |
title_full_unstemmed |
Meta-análisis de vulnerabilidades y gestión del riesgo en arquitecturas Cloud |
title_sort |
Meta-análisis de vulnerabilidades y gestión del riesgo en arquitecturas Cloud |
dc.creator.fl_str_mv |
Pérez-Cuestas, Javier Alexander |
dc.contributor.advisor.spa.fl_str_mv |
Bolívar-Barón, Holman Diego |
dc.contributor.advisor.none.fl_str_mv |
Bolívar-Barón, Holman Diego |
dc.contributor.author.spa.fl_str_mv |
Pérez-Cuestas, Javier Alexander |
dc.subject.lemb.spa.fl_str_mv |
PROTECCIÓN DE DATOS |
topic |
PROTECCIÓN DE DATOS ANÁLISIS CIBERCRIMEN DELITO INFORMÁTICO SEGURIDAD DE LOS DATOS |
dc.subject.proposal.spa.fl_str_mv |
ANÁLISIS CIBERCRIMEN DELITO INFORMÁTICO SEGURIDAD DE LOS DATOS |
description |
Trabajo de investigación |
publishDate |
2020 |
dc.date.accessioned.spa.fl_str_mv |
2020-12-11T15:09:01Z |
dc.date.available.spa.fl_str_mv |
2020 2020-12-11T15:09:01Z |
dc.date.issued.spa.fl_str_mv |
2020 |
dc.type.spa.fl_str_mv |
Trabajo de grado - Pregrado |
dc.type.coarversion.fl_str_mv |
http://purl.org/coar/version/c_71e4c1898caa6e32 |
dc.type.coar.spa.fl_str_mv |
http://purl.org/coar/resource_type/c_7a1f |
dc.type.content.spa.fl_str_mv |
Text |
dc.type.driver.spa.fl_str_mv |
info:eu-repo/semantics/bachelorThesis |
dc.type.redcol.spa.fl_str_mv |
https://purl.org/redcol/resource_type/TP |
dc.type.version.spa.fl_str_mv |
info:eu-repo/semantics/submittedVersion |
format |
http://purl.org/coar/resource_type/c_7a1f |
status_str |
submittedVersion |
dc.identifier.citation.spa.fl_str_mv |
Pérez-Cuestas, J. A. (2020). Meta-análisis de vulnerabilidades y gestión del riesgo en arquitecturas Cloud. Trabajo de Grado. Universidad Católica de Colombia. Facultad de Ingeniería. Programa de Ingeniería de Sistemas. Bogotá, Colombia |
dc.identifier.uri.spa.fl_str_mv |
https://hdl.handle.net/10983/25312 |
identifier_str_mv |
Pérez-Cuestas, J. A. (2020). Meta-análisis de vulnerabilidades y gestión del riesgo en arquitecturas Cloud. Trabajo de Grado. Universidad Católica de Colombia. Facultad de Ingeniería. Programa de Ingeniería de Sistemas. Bogotá, Colombia |
url |
https://hdl.handle.net/10983/25312 |
dc.language.iso.spa.fl_str_mv |
spa |
language |
spa |
dc.relation.references.spa.fl_str_mv |
A survey of fault tolerance in cloud computing, ScienceDirect, September 2018. Aditya K. Sood, Ph.D., and Rehan Jalil. Amenazas en la nube—Comprender los ataques y las defensas de la aplicación en la nube. Https://www.isaca.org/Journal/archives/2018/Volume-1/Pages/cloudifying-threatsunderstanding- cloud-app-attacks-and-defenses-spanish.aspx?utm_referrer= Agencia Europea de Seguridad de las Redes y de la Información (ENISA), 2009, Beneficios, riesgos y recomendaciones para la seguridad de la información [online], Disponible desde Internet: https://www.enisa.europa.eu/activities/riskmanagement/ files/.../file. Al Morsy, Grundy, Müller. An Analysis of the Cloud Computing Security Problem. Computer Science & Software Engineering, Faculty of Information & Communication Technologies Swinburne University of Technology, Hawthorn. 2010. Ali, Khan, Vasilakos. Security in cloud computing: Opportunities and challenges. Science Direct 2015. Alliance, Cloud Security. 2011. Cloudsecurityalliance.org. 2011. https://cloudsecurityalliance.org/wp-content/uploads/2011/09/SecaaS_V1_0.pdf. Armbrust, Fox, Griffith, Joseph, Katz, Konwinski, Lee, Patterson, Rabkin, Stoica, y Zaharia. A View of Cloud Computing. Communications of the ACM April 2010. Ateniese, Burns, Curtmola, Herring, Kissner, Peterson, Song. Provable Data Possession at Untrusted Stores. ACM Conference on Computer and Communications Security (CCS 2007). Barham, Dragovic, Fraser, Hand, Harris, Ho, Neugebauer, Pratt, Warfield. Xen and the Art of Virtualization. ACM 2003. Beneficios, riesgos y recomendaciones para la seguridad de la información European Network and Information Security Agency (ENISA) 2009. Bhadauria, Chaki, Chaki, Sanyal. A Survey on Security Issues in Cloud Computing. Hunedoara, University Politehnica Timisoara. ISSN: 2067 – 3809 Tome VII 2014. Blanco Jiménez Francisco, Romero Ania Alberto, Gómez Fidalgo Diana, Vizcaíno López Alberto, Oportunidades: emprendimiento verde, social y tecnológico. Ed ESIC 2013. Brown, Anderson, Tan. Multitenancy - Security Risks and Countermeasures. Athabasca University 2018. Buyya, Shin, Venugopal, Broberg, Brandic. Cloud Computing and Emerging IT Platforms: Vision, Hype, and Reality for Delivering Computing as the 5th Utility. Department of Computer Science and Software Engineering the University of Melbourne.2009. Carter William A, Zheng Denise E. The Evolution of Cybersecurity Requirements for the U.S. Financial Industry. CSIS. July 2015. Chow, Golle, Jakobsson, Masuoka, Molina. Controlling Data in the Cloud: Outsourcing Computation without Outsourcing Control. ACM 2009. CISO Benchmark Report Cisco Cybersecurity Series Marzo 2019. Cloud Computing: A Review of Features, Benefits, and Risks, and Recommendations for Secure, Efficient Implementations, Junio 2012 (NIST). Contractor, D., Patel, D.R.: Trust management framework for attenuation of application layer Ddos attack incloud computing. In: Trust Management VI, pp. 201– 208. Springer, 2012. Curso Google Activate Cloud Computing Dahbur, Mohammad, Tarakji. A Survey of Risks, Threats and Vulnerabilities in Cloud Computing. School of Engineering and Computing Sciences New York Institute of Technology ACM 2011. Dawoud, Takouna, Meinel. Infrastructure as a Service Security: Challenges and Solutions. Hasso Plattner Institute and Ministry of Education & Higher Education.2008 Deyan Chen, Hong Zhao. Data Security and Privacy Protection Issues in Cloud Computing. International Conference on Computer Science and Electronics Engineering IEEE 2012. E. Grosse, “Security at Scale”, ACM Cloud Security Workshop (CCSW), 2010 https://wn.com/2010_google_faculty_summit_security_at_scale. Fernandes, Soares, Gomes, Freire, Inácio. Security Issues in Cloud Environments — A Survey. Instituto de Telecomunicaciones, Department of Computer Science, University of Beira Interior, Rua Marques d’Avila e Bolama, 2013. Flavio Lombardi, Roberto Di Pietro. Secure virtualization for cloud computing. ScienceDirect 2010. Garfinkel, Rosenblum. A Virtual Machine Introspection Based Architecture for Intrusion Detection. Computer Science Department, Stanford University 2009. Garfinkel, Rosenblum. When Virtual is Harder than Real: Security Challenges in Virtual Machine Based Computing Environments. Stanford University Department of Computer Science,2013. Gonzalez, Miers, Redígolo, Simplício, Carvalho, Naslund, Pourzandi. A quantitative analysis of current security concerns and solutions for cloud computing. Springer Journal of Cloud Computing: Advances, Systems and Applications 2012. Goscinski Andrzej, Broberg James, Buyya Rajkumar. Cloud Computing: Principles and Paradigms2011. Green Cloud computing and Environmental Sustainability, SK Garg, R Buyya, Harnessing Green IT: Principles and Practices 2012. Grobauer, Walloschek, Stöcker. Understanding Cloud Computing Vulnerabilities. Published by the IEEE Computer Society May 2012. Harauz, Kaufman, Potter Data Security in the World of Cloud Computing. IEEE Computer and Reliability Societies July-August 2009. Hashizume, Rosado, Fernández-Medina, Fernandez. An analysis of security issues for cloud computing. Springer link 2013. https://www.salesforce.com/mx/cloud-computing/. J. Oriol Fito and Jordi Guitart, Introducing Risk Management into Cloud Computing. Jensen, Schwenk, Gruschka, Iacono. On Technical Security Issues in Cloud Computing. IEEE International Conference on Cloud Computing. 2010 Khalil, Khreishah, Azeem. Cloud Computing Security: A Survey. Computers ISSN 2073-431X. 2014 L. Youseff, M. Butrico y D. Da Silva, "Hacia una ontología unificada de la computación en la nube", Proc. Taller de Entornos de Computación Grid (GCE), IEEE Press, 2008; Doi: 10.1109 / GCE.2008.4738443. Liu, Yarom, Ge, Heiser, Lee. Last-Level Cache Side-Channel Attacks are Practical. IEEE Symposium on Security and Privacy.2015 Mahesh U. Shankarwar, Ambika V. Pawar.Security and Privacy in Cloud Computing: A Survey. CSE Department, SIT, Symbiosis International University, Springer International.2015 Malar, Prabhu. An Analysis Of Security Issues In Cloud Computing International Journal of Civil Engineering and Technology (IJCIET) 2019 Maillé Éric, Mennecier René-François, Bento Alberto M, Aggarwal Anil. VMware vSphere 5 en el seno del datacenter, Ed. ENI, 2012, y Tomado Cloud computing service and deployment models: layers and management Ed. Hershey, Pa.: Business Science Reference 2013. Mell, Grance. The NIST Definition of Cloud Computing Recommendations of the National Institute of Standards and Technology NIST Special Publication 2011. Mell Peter, Timothy Grance. The NIST definition of Cloud Computing Special Publication 800-145.September 2011. http://faculty.winthrop.edu/domanm/csci411/Handouts/NIST.pdf Modi, Patel, Borisaniya, Patel, Rajarajan. A Survey on Security Issues and Solutions at Different Layers of Cloud Computing. University of London Institutional Repository 2013. Normas ISO 27001(seguridad de la Información), ISO 31000(Riesgo), 9001(Calidad), ISO 27018(Protección Información Personal Nube). P.S. Suryateja. Threats and Vulnerabilities of Cloud Computing: A Review. Dept., Vishnu Institute of Technology 2018 Perez-Botero, D., Szefer, J., Lee, R.B.: Characterizing hypervisor vulnerabilities in cloud computing servers. In: Proceedings of the 2013 international workshop on Security in Cloud Computing, pp. 3–10. ACM, 2013. Perez-Botero, Szefer, Lee. Characterizing Hypervisor Vulnerabilities in Cloud Computing Servers. Princeton University, 2013 Popović, Hocenski. Cloud computing security issues and challenges. Institute of Automation and Process Computing. MIPRO 2010, May 24-28, 2010. Ramgovind, Eloff, Smith. The Management of Security in Cloud Computing. School of Computing, University of South Africa, Pretoria, South Africa IEEE 2010. Report on Cybersecurity Practices—February 2015 FINRA. Risk and Vulnerabilities in the EU Financial System Joint Committee Risk Report April 2018. Ristenpart, Tromer, Shacham, Savage. Hey, You, Get Off of My Cloud: Exploring Information Leakage in Third-Party Compute Clouds. ACM 2009. Santos, Gummadi, Rodrigues. Towards Trusted Cloud Computing. MPI-SWS. 2009 Saripalli, Walters. QUIRC: A Quantitative Impact and Risk Assessment Framework for Cloud Security. IEEE 3rd International Conference on Cloud Computing.2010. Security Guidance for Critical Areas of Focus in Cloud Computing V4.0 2017 CS. Social media is a cybersecurity risk for business, cybersecurity insights By Charles Cooper. https://www.csoonline.com/article/3198715/social-media-is-acybersecurity- risk-for-business.html. Somorovsky, Heiderich, Gruschka, Lo Iacono. All Your Clouds are Belong to us Security Analysis of Cloud Management Interfaces. ACM 2011. Swathi, Subrahmanyam, Ram Gopal. A Survey on Intrusion Detection Techniques for Cloud. Institute of Technology, Vijayawada and Indira Gandhi National Open University. 2016. Szefer, Keller, B. Lee, Rexford. Eliminating the Hypervisor Attack Surface for a More Secure Cloud. Princeton University, ACM 2011. Takabi, Joshi, Ahn. Security and Privacy Challenges in Cloud Computing Environments. Copublished by the IEEE computer and reliability societies November –December 2010. Toumi, Talea, Marzak, Eddaoui, Talea. Cooperative Trust Framework for Cloud Computing Based on Mobile Agents. International Journal of Communication Networks and Information Security (IJCNIS) Vol. 7 No 2. August 2015. Vaquero, Merino, Morán. Locking the sky: a survey on IaaS cloud security. Springer- Verlag 2010. Vaquero, Rodero, Caceres, Lindner. A Break in the Clouds: Towards a Cloud Definition. ACM Computer Communication Review Volume 39, Number 1, January 2009. Vieira, Schulter, Westphall, Merkle Westphall, Intrusion Detection for Grid and Cloud Computing. Federal University of Santa Catarina, IEEE Computer Society 2010. Wayne A. Jansen. Cloud Hooks: Security and Privacy Issues in Cloud Computing. 44th Hawaii International Conference on System Sciences IEEE. 2011. Wei, Zhang, Ammons, Bala, Ning. Managing Security of Virtual Machine Images in a Cloud Environment. ACM 2009. W van den Bent Johannes, Van der Steeg Martine EXIN Cloud Computing Foundation Workbook, Ed. Zaltbommel: Van Haren Publishing, 2018. Zhang, Chen, Chen, Zang. CloudVisor: Retrofitting Protection of Virtual Machines in Multi-tenant Cloud with Nested Virtualization. Parallel Processing Institute Fudan University. ACM 2011. Zhang, Cheng, Boutaba. Cloud computing: state-of-the-art and research challenges. The Brazilian Computer Society 2010. Zhang, Reiter, Juels, Ristenpart. Cross-VM Side Channels and Their Use to Extract Private Keys ACM 2012. Zhi Wang, Xuxian Jiang HyperSafe: A Lightweight Approach to Provide Lifetime Hypervisor Control-Flow Integrity. Department of Computer Science North Carolina State University.2011. Zhifeng Xiao, Yang Xiao. Security and Privacy in Cloud Computing. IEEE Communications Surveys & Tutorials, vol. 15, no. 2, second quarter. 2013 Zissis, Lekkas. Addressing cloud computing security issues. SciVerse ScienceDirect. 2010 |
dc.rights.spa.fl_str_mv |
Derechos Reservados - Universidad Católica de Colombia, 2020 |
dc.rights.coar.fl_str_mv |
http://purl.org/coar/access_right/c_abf2 |
dc.rights.accessrights.spa.fl_str_mv |
info:eu-repo/semantics/openAccess |
dc.rights.creativecommons.spa.fl_str_mv |
Atribución-NoComercial-SinDerivadas 4.0 Internacional (CC BY-NC-ND 4.0) |
dc.rights.uri.spa.fl_str_mv |
https://creativecommons.org/licenses/by-nc-nd/4.0/ |
rights_invalid_str_mv |
Derechos Reservados - Universidad Católica de Colombia, 2020 Atribución-NoComercial-SinDerivadas 4.0 Internacional (CC BY-NC-ND 4.0) https://creativecommons.org/licenses/by-nc-nd/4.0/ http://purl.org/coar/access_right/c_abf2 |
eu_rights_str_mv |
openAccess |
dc.format.extent.spa.fl_str_mv |
90 páginas |
dc.format.mimetype.spa.fl_str_mv |
application/pdf |
dc.publisher.spa.fl_str_mv |
Universidad Católica de Colombia |
dc.publisher.faculty.spa.fl_str_mv |
Facultad de Ingeniería |
dc.publisher.place.spa.fl_str_mv |
Bogotá |
dc.publisher.program.spa.fl_str_mv |
Ingeniería de Sistemas y Computación |
institution |
Universidad Católica de Colombia |
bitstream.url.fl_str_mv |
https://repository.ucatolica.edu.co/bitstreams/42ce6b3c-0095-47ba-bdc4-92f75886430e/download https://repository.ucatolica.edu.co/bitstreams/f9384365-e77d-4737-b394-0533b472ffbb/download https://repository.ucatolica.edu.co/bitstreams/6d35aca6-fa2b-48bc-bf10-d6ca6e643830/download https://repository.ucatolica.edu.co/bitstreams/2063b4c8-d644-4fba-93d0-35b41699da68/download https://repository.ucatolica.edu.co/bitstreams/7194a65b-b1f4-4b5f-b0d6-4236e743bcc4/download https://repository.ucatolica.edu.co/bitstreams/299bef37-dca8-419f-86b4-b2a034ca4fea/download |
bitstream.checksum.fl_str_mv |
1547ab452069b4e7402bc2419f72b7e0 6c6d26e42d18246e6fcf349a21cdc978 91a08c807fc5c4690527b58623b23011 e5c2a7dee9bb88c5d6f1615848b857ff cce2e3428dd23bf7718fef4cc3911a7c 757241e7e0a4d09568b627250359ae03 |
bitstream.checksumAlgorithm.fl_str_mv |
MD5 MD5 MD5 MD5 MD5 MD5 |
repository.name.fl_str_mv |
Repositorio Institucional Universidad Católica de Colombia - RIUCaC |
repository.mail.fl_str_mv |
bdigital@metabiblioteca.com |
_version_ |
1814256332431163392 |
spelling |
Bolívar-Barón, Holman Diegoaa0d5dfe-1bce-43c8-a4ef-0c22c5eb69d8-1Bolívar-Barón, Holman Diegovirtual::2300-1Pérez-Cuestas, Javier Alexander0d10b7a0-0854-4b60-b9d2-a98dafba0869-12020-12-11T15:09:01Z20202020-12-11T15:09:01Z2020Trabajo de investigaciónAnalisis investigativo detectando las principales vulnerabilidades en la seguridad Cloud planteado los riesgos y cómo minimizarlos con su respectiva política tanto preventivamente como correctivamente esto además se puede decir de cómo prevenir los ataques informáticos. Con esto da como por formular plantear las políticas de seguridad desde el montaje sus diferentes arquitecturas.PregradoIngeniero de Sistemas1. INTRODUCCIÓN 2. JUSTIFICACIÓN 3. PLANTEAMIENTO DEL PROBLEMA 4. OBJETIVOS 5. MARCO CONCEPTUAL 6. MARCO TEÓRICO 7. ESTADO DEL ARTE 8. METODOLOGÍA 9. ANÁLISIS DE HETEROGENEIDAD 10. CORRELACIÓN DE VULNERABILIDADES Y RIESGOS 11. CONCLUSIONES Y TRABAJOS FUTUROS BIBLIOGRAFÍA90 páginasapplication/pdfPérez-Cuestas, J. A. (2020). Meta-análisis de vulnerabilidades y gestión del riesgo en arquitecturas Cloud. Trabajo de Grado. Universidad Católica de Colombia. Facultad de Ingeniería. Programa de Ingeniería de Sistemas. Bogotá, Colombiahttps://hdl.handle.net/10983/25312spaUniversidad Católica de ColombiaFacultad de IngenieríaBogotáIngeniería de Sistemas y ComputaciónA survey of fault tolerance in cloud computing, ScienceDirect, September 2018.Aditya K. Sood, Ph.D., and Rehan Jalil. Amenazas en la nube—Comprender los ataques y las defensas de la aplicación en la nube. Https://www.isaca.org/Journal/archives/2018/Volume-1/Pages/cloudifying-threatsunderstanding- cloud-app-attacks-and-defenses-spanish.aspx?utm_referrer=Agencia Europea de Seguridad de las Redes y de la Información (ENISA), 2009, Beneficios, riesgos y recomendaciones para la seguridad de la información [online], Disponible desde Internet: https://www.enisa.europa.eu/activities/riskmanagement/ files/.../file.Al Morsy, Grundy, Müller. An Analysis of the Cloud Computing Security Problem. Computer Science & Software Engineering, Faculty of Information & Communication Technologies Swinburne University of Technology, Hawthorn. 2010.Ali, Khan, Vasilakos. Security in cloud computing: Opportunities and challenges. Science Direct 2015.Alliance, Cloud Security. 2011. Cloudsecurityalliance.org. 2011. https://cloudsecurityalliance.org/wp-content/uploads/2011/09/SecaaS_V1_0.pdf.Armbrust, Fox, Griffith, Joseph, Katz, Konwinski, Lee, Patterson, Rabkin, Stoica, y Zaharia. A View of Cloud Computing. Communications of the ACM April 2010.Ateniese, Burns, Curtmola, Herring, Kissner, Peterson, Song. Provable Data Possession at Untrusted Stores. ACM Conference on Computer and Communications Security (CCS 2007).Barham, Dragovic, Fraser, Hand, Harris, Ho, Neugebauer, Pratt, Warfield. Xen and the Art of Virtualization. ACM 2003.Beneficios, riesgos y recomendaciones para la seguridad de la información European Network and Information Security Agency (ENISA) 2009.Bhadauria, Chaki, Chaki, Sanyal. A Survey on Security Issues in Cloud Computing. Hunedoara, University Politehnica Timisoara. ISSN: 2067 – 3809 Tome VII 2014.Blanco Jiménez Francisco, Romero Ania Alberto, Gómez Fidalgo Diana, Vizcaíno López Alberto, Oportunidades: emprendimiento verde, social y tecnológico. Ed ESIC 2013.Brown, Anderson, Tan. Multitenancy - Security Risks and Countermeasures. Athabasca University 2018.Buyya, Shin, Venugopal, Broberg, Brandic. Cloud Computing and Emerging IT Platforms: Vision, Hype, and Reality for Delivering Computing as the 5th Utility. Department of Computer Science and Software Engineering the University of Melbourne.2009.Carter William A, Zheng Denise E. The Evolution of Cybersecurity Requirements for the U.S. Financial Industry. CSIS. July 2015.Chow, Golle, Jakobsson, Masuoka, Molina. Controlling Data in the Cloud: Outsourcing Computation without Outsourcing Control. ACM 2009.CISO Benchmark Report Cisco Cybersecurity Series Marzo 2019.Cloud Computing: A Review of Features, Benefits, and Risks, and Recommendations for Secure, Efficient Implementations, Junio 2012 (NIST).Contractor, D., Patel, D.R.: Trust management framework for attenuation of application layer Ddos attack incloud computing. In: Trust Management VI, pp. 201– 208. Springer, 2012.Curso Google Activate Cloud ComputingDahbur, Mohammad, Tarakji. A Survey of Risks, Threats and Vulnerabilities in Cloud Computing. School of Engineering and Computing Sciences New York Institute of Technology ACM 2011.Dawoud, Takouna, Meinel. Infrastructure as a Service Security: Challenges and Solutions. Hasso Plattner Institute and Ministry of Education & Higher Education.2008Deyan Chen, Hong Zhao. Data Security and Privacy Protection Issues in Cloud Computing. International Conference on Computer Science and Electronics Engineering IEEE 2012.E. Grosse, “Security at Scale”, ACM Cloud Security Workshop (CCSW), 2010 https://wn.com/2010_google_faculty_summit_security_at_scale.Fernandes, Soares, Gomes, Freire, Inácio. Security Issues in Cloud Environments — A Survey. Instituto de Telecomunicaciones, Department of Computer Science, University of Beira Interior, Rua Marques d’Avila e Bolama, 2013.Flavio Lombardi, Roberto Di Pietro. Secure virtualization for cloud computing. ScienceDirect 2010.Garfinkel, Rosenblum. A Virtual Machine Introspection Based Architecture for Intrusion Detection. Computer Science Department, Stanford University 2009.Garfinkel, Rosenblum. When Virtual is Harder than Real: Security Challenges in Virtual Machine Based Computing Environments. Stanford University Department of Computer Science,2013.Gonzalez, Miers, Redígolo, Simplício, Carvalho, Naslund, Pourzandi. A quantitative analysis of current security concerns and solutions for cloud computing. Springer Journal of Cloud Computing: Advances, Systems and Applications 2012.Goscinski Andrzej, Broberg James, Buyya Rajkumar. Cloud Computing: Principles and Paradigms2011.Green Cloud computing and Environmental Sustainability, SK Garg, R Buyya, Harnessing Green IT: Principles and Practices 2012.Grobauer, Walloschek, Stöcker. Understanding Cloud Computing Vulnerabilities. Published by the IEEE Computer Society May 2012.Harauz, Kaufman, Potter Data Security in the World of Cloud Computing. IEEE Computer and Reliability Societies July-August 2009.Hashizume, Rosado, Fernández-Medina, Fernandez. An analysis of security issues for cloud computing. Springer link 2013.https://www.salesforce.com/mx/cloud-computing/.J. Oriol Fito and Jordi Guitart, Introducing Risk Management into Cloud Computing.Jensen, Schwenk, Gruschka, Iacono. On Technical Security Issues in Cloud Computing. IEEE International Conference on Cloud Computing. 2010Khalil, Khreishah, Azeem. Cloud Computing Security: A Survey. Computers ISSN 2073-431X. 2014L. Youseff, M. Butrico y D. Da Silva, "Hacia una ontología unificada de la computación en la nube", Proc. Taller de Entornos de Computación Grid (GCE), IEEE Press, 2008; Doi: 10.1109 / GCE.2008.4738443.Liu, Yarom, Ge, Heiser, Lee. Last-Level Cache Side-Channel Attacks are Practical. IEEE Symposium on Security and Privacy.2015Mahesh U. Shankarwar, Ambika V. Pawar.Security and Privacy in Cloud Computing: A Survey. CSE Department, SIT, Symbiosis International University, Springer International.2015Malar, Prabhu. An Analysis Of Security Issues In Cloud Computing International Journal of Civil Engineering and Technology (IJCIET) 2019Maillé Éric, Mennecier René-François, Bento Alberto M, Aggarwal Anil. VMware vSphere 5 en el seno del datacenter, Ed. ENI, 2012, y Tomado Cloud computing service and deployment models: layers and management Ed. Hershey, Pa.: Business Science Reference 2013.Mell, Grance. The NIST Definition of Cloud Computing Recommendations of the National Institute of Standards and Technology NIST Special Publication 2011.Mell Peter, Timothy Grance. The NIST definition of Cloud Computing Special Publication 800-145.September 2011. http://faculty.winthrop.edu/domanm/csci411/Handouts/NIST.pdfModi, Patel, Borisaniya, Patel, Rajarajan. A Survey on Security Issues and Solutions at Different Layers of Cloud Computing. University of London Institutional Repository 2013.Normas ISO 27001(seguridad de la Información), ISO 31000(Riesgo), 9001(Calidad), ISO 27018(Protección Información Personal Nube).P.S. Suryateja. Threats and Vulnerabilities of Cloud Computing: A Review. Dept., Vishnu Institute of Technology 2018Perez-Botero, D., Szefer, J., Lee, R.B.: Characterizing hypervisor vulnerabilities in cloud computing servers. In: Proceedings of the 2013 international workshop on Security in Cloud Computing, pp. 3–10. ACM, 2013.Perez-Botero, Szefer, Lee. Characterizing Hypervisor Vulnerabilities in Cloud Computing Servers. Princeton University, 2013Popović, Hocenski. Cloud computing security issues and challenges. Institute of Automation and Process Computing. MIPRO 2010, May 24-28, 2010.Ramgovind, Eloff, Smith. The Management of Security in Cloud Computing. School of Computing, University of South Africa, Pretoria, South Africa IEEE 2010.Report on Cybersecurity Practices—February 2015 FINRA.Risk and Vulnerabilities in the EU Financial System Joint Committee Risk Report April 2018.Ristenpart, Tromer, Shacham, Savage. Hey, You, Get Off of My Cloud: Exploring Information Leakage in Third-Party Compute Clouds. ACM 2009.Santos, Gummadi, Rodrigues. Towards Trusted Cloud Computing. MPI-SWS. 2009Saripalli, Walters. QUIRC: A Quantitative Impact and Risk Assessment Framework for Cloud Security. IEEE 3rd International Conference on Cloud Computing.2010.Security Guidance for Critical Areas of Focus in Cloud Computing V4.0 2017 CS.Social media is a cybersecurity risk for business, cybersecurity insights By Charles Cooper. https://www.csoonline.com/article/3198715/social-media-is-acybersecurity- risk-for-business.html.Somorovsky, Heiderich, Gruschka, Lo Iacono. All Your Clouds are Belong to us Security Analysis of Cloud Management Interfaces. ACM 2011.Swathi, Subrahmanyam, Ram Gopal. A Survey on Intrusion Detection Techniques for Cloud. Institute of Technology, Vijayawada and Indira Gandhi National Open University. 2016.Szefer, Keller, B. Lee, Rexford. Eliminating the Hypervisor Attack Surface for a More Secure Cloud. Princeton University, ACM 2011.Takabi, Joshi, Ahn. Security and Privacy Challenges in Cloud Computing Environments. Copublished by the IEEE computer and reliability societies November –December 2010.Toumi, Talea, Marzak, Eddaoui, Talea. Cooperative Trust Framework for Cloud Computing Based on Mobile Agents. International Journal of Communication Networks and Information Security (IJCNIS) Vol. 7 No 2. August 2015.Vaquero, Merino, Morán. Locking the sky: a survey on IaaS cloud security. Springer- Verlag 2010.Vaquero, Rodero, Caceres, Lindner. A Break in the Clouds: Towards a Cloud Definition. ACM Computer Communication Review Volume 39, Number 1, January 2009.Vieira, Schulter, Westphall, Merkle Westphall, Intrusion Detection for Grid and Cloud Computing. Federal University of Santa Catarina, IEEE Computer Society 2010.Wayne A. Jansen. Cloud Hooks: Security and Privacy Issues in Cloud Computing. 44th Hawaii International Conference on System Sciences IEEE. 2011.Wei, Zhang, Ammons, Bala, Ning. Managing Security of Virtual Machine Images in a Cloud Environment. ACM 2009.W van den Bent Johannes, Van der Steeg Martine EXIN Cloud Computing Foundation Workbook, Ed. Zaltbommel: Van Haren Publishing, 2018.Zhang, Chen, Chen, Zang. CloudVisor: Retrofitting Protection of Virtual Machines in Multi-tenant Cloud with Nested Virtualization. Parallel Processing Institute Fudan University. ACM 2011.Zhang, Cheng, Boutaba. Cloud computing: state-of-the-art and research challenges. The Brazilian Computer Society 2010.Zhang, Reiter, Juels, Ristenpart. Cross-VM Side Channels and Their Use to Extract Private Keys ACM 2012.Zhi Wang, Xuxian Jiang HyperSafe: A Lightweight Approach to Provide Lifetime Hypervisor Control-Flow Integrity. Department of Computer Science North Carolina State University.2011.Zhifeng Xiao, Yang Xiao. Security and Privacy in Cloud Computing. IEEE Communications Surveys & Tutorials, vol. 15, no. 2, second quarter. 2013Zissis, Lekkas. Addressing cloud computing security issues. SciVerse ScienceDirect. 2010Derechos Reservados - Universidad Católica de Colombia, 2020info:eu-repo/semantics/openAccessAtribución-NoComercial-SinDerivadas 4.0 Internacional (CC BY-NC-ND 4.0)https://creativecommons.org/licenses/by-nc-nd/4.0/http://purl.org/coar/access_right/c_abf2PROTECCIÓN DE DATOSANÁLISISCIBERCRIMENDELITO INFORMÁTICOSEGURIDAD DE LOS DATOSMeta-análisis de vulnerabilidades y gestión del riesgo en arquitecturas CloudTrabajo de grado - Pregradohttp://purl.org/coar/resource_type/c_7a1fTextinfo:eu-repo/semantics/bachelorThesishttps://purl.org/redcol/resource_type/TPinfo:eu-repo/semantics/submittedVersionhttp://purl.org/coar/version/c_71e4c1898caa6e32PublicationXXXXvirtual::2300-1https://scienti.minciencias.gov.co/gruplac/jsp/visualiza/visualizagr.jsp?nro=00000000011415virtual::2300-1https://scholar.google.com/citations?user=VDbAneMAAAAJ&hl=esvirtual::2300-1https://orcid.org/0000-0001-5989-967Xvirtual::2300-1XXXXvirtual::2300-15d247f8f-b554-4959-b9a1-eedf9539ab98virtual::2300-15d247f8f-b554-4959-b9a1-eedf9539ab98virtual::2300-1ORIGINALMETA-ANALISIS DE VULNERABILIDADES Y GESTIÓN DEL RIESGO EN ARQUITECTURAS CLOUD.pdfMETA-ANALISIS DE VULNERABILIDADES Y GESTIÓN DEL RIESGO EN ARQUITECTURAS CLOUD.pdfapplication/pdf1768467https://repository.ucatolica.edu.co/bitstreams/42ce6b3c-0095-47ba-bdc4-92f75886430e/download1547ab452069b4e7402bc2419f72b7e0MD51F-010-GB-008_RESUMEN_ANALÍTICO_EN_EDUCACIÓN_RAE_VS_01.pdfF-010-GB-008_RESUMEN_ANALÍTICO_EN_EDUCACIÓN_RAE_VS_01.pdfapplication/pdf127574https://repository.ucatolica.edu.co/bitstreams/f9384365-e77d-4737-b394-0533b472ffbb/download6c6d26e42d18246e6fcf349a21cdc978MD52TEXTMETA-ANALISIS DE VULNERABILIDADES Y GESTIÓN DEL RIESGO EN ARQUITECTURAS CLOUD.pdf.txtMETA-ANALISIS DE VULNERABILIDADES Y GESTIÓN DEL RIESGO EN ARQUITECTURAS CLOUD.pdf.txtExtracted texttext/plain164455https://repository.ucatolica.edu.co/bitstreams/6d35aca6-fa2b-48bc-bf10-d6ca6e643830/download91a08c807fc5c4690527b58623b23011MD53F-010-GB-008_RESUMEN_ANALÍTICO_EN_EDUCACIÓN_RAE_VS_01.pdf.txtF-010-GB-008_RESUMEN_ANALÍTICO_EN_EDUCACIÓN_RAE_VS_01.pdf.txtExtracted texttext/plain17054https://repository.ucatolica.edu.co/bitstreams/2063b4c8-d644-4fba-93d0-35b41699da68/downloade5c2a7dee9bb88c5d6f1615848b857ffMD55THUMBNAILMETA-ANALISIS DE VULNERABILIDADES Y GESTIÓN DEL RIESGO EN ARQUITECTURAS CLOUD.pdf.jpgMETA-ANALISIS DE VULNERABILIDADES Y GESTIÓN DEL RIESGO EN ARQUITECTURAS CLOUD.pdf.jpgRIUCACimage/jpeg9463https://repository.ucatolica.edu.co/bitstreams/7194a65b-b1f4-4b5f-b0d6-4236e743bcc4/downloadcce2e3428dd23bf7718fef4cc3911a7cMD54F-010-GB-008_RESUMEN_ANALÍTICO_EN_EDUCACIÓN_RAE_VS_01.pdf.jpgF-010-GB-008_RESUMEN_ANALÍTICO_EN_EDUCACIÓN_RAE_VS_01.pdf.jpgRIUCACimage/jpeg19443https://repository.ucatolica.edu.co/bitstreams/299bef37-dca8-419f-86b4-b2a034ca4fea/download757241e7e0a4d09568b627250359ae03MD5610983/25312oai:repository.ucatolica.edu.co:10983/253122023-11-07 09:38:26.588https://creativecommons.org/licenses/by-nc-nd/4.0/Derechos Reservados - Universidad Católica de Colombia, 2020https://repository.ucatolica.edu.coRepositorio Institucional Universidad Católica de Colombia - RIUCaCbdigital@metabiblioteca.com |