...
首页> 外文期刊>Journal of Management History >A comparative study of the evolution of vulnerabilities in IT systems and its relation to the new concept of cloud computing
【24h】

A comparative study of the evolution of vulnerabilities in IT systems and its relation to the new concept of cloud computing

机译:IT系统中的漏洞演变及其与云计算新概念的关系的比较研究

获取原文
获取原文并翻译 | 示例
           

摘要

Purpose - The purpose of this paper is to classify and categorize the vulnerability types emerged with time as information technology (IT) systems evolved. This comparative study aims to compare the seriousness of the old well-known vulnerabilities that may still exist with lower possibility of happening with that of new technologies like cloud computing with Mobility access. Cloud computing is a new structure of IT that is becoming the main part of the new model of business environment. However, issues regarding such new hype of technology do not come without obstacles. These issues have to be addressed before full acceptability of cloud services in a globalized business environment. Businesses need to be aware of issues of concerns before joining the cloud services. This paper also highlights these issues and shows the comparison table to help businesses with appropriate decision-making when joining the cloud. Design/methodology/approach - A historical review of emerged vulnerabilities as IT systems evolved was conducted, then these vulnerabilities were categorized into eight different categories, each of which composed of multiple vulnerability types. Simple scoring techniques were used to build a "risk" analysis table where each vulnerability type was given a score based on availability of matured solution and the likeliness of happening, then in case of vulnerability type, another score was used to derive the impact of such vulnerability. The resulted weighted score can be derived from the multiplication of likeliness to happen score with that of its impact in case it did happen. Percentage of seriousness represented by the percentage of the derived weighted score of each of the vulnerabilities can then be concluded. Similar table was developed for issues related to cloud computing environment in specific. Findings - After surveying the historical background of IT systems and emerged vulnerabilities as well as reviewing the common malicious types of system vulnerabilities, this paper identifies 22 different types of vulnerability categorized in eight different categories. This comparative study explores amount of possible vulnerabilities in new technology like cloud computing services. Specific issues for cloud computing were also explored and a similar comparative study was developed on these issues. The result of the comparative study between all types of vulnerabilities since the start of IT system development till today's technology of cloud computing, shows that the highest percentage vulnerability category was the one related to mobility access as mobile applications/systems are relatively newly emerged and do not have a matured security solution(s). Practical implications - Learning from history, one can conclude the current risk factor in dealing with new technology like cloud computing. Businesses can realize that decision to join the cloud requires thinking about the issues mentioned in this paper and identifying the most vulnerability types to try to avoid them. Originality/value - A new comparative study and new classification of vulnerabilities demonstrated with risk analysis using simple scoring technique.
机译:目的-本文的目的是对随着信息技术(IT)系统的发展而出现的漏洞类型进行分类。这项比较研究旨在比较那些仍旧存在的旧漏洞的严重性,而这些漏洞的发生可能性与采用Mobility access的云计算等新技术相比,发生的可能性较低。云计算是一种新的IT结构,正在成为业务环境新模型的主要部分。但是,关于这种新的技术炒作的问题并非没有障碍。在全球化的业务环境中完全接受云服务之前,必须解决这些问题。企业需要在加入云服务之前意识到关注的问题。本文还重点介绍了这些问题,并显示了比较表,以帮助企业在加入云时做出适当的决策。设计/方法/方法-对随着IT系统的发展而出现的漏洞进行历史回顾,然后将这些漏洞分为八类,每类由多种漏洞类型组成。使用简单的评分技术来构建“风险”分析表,其中根据成熟的解决方案的可用性和发生的可能性为每种漏洞类型赋予一个分数,然后在出现漏洞类型的情况下,使用另一个评分来得出此类影响脆弱性。得出的加权分数可以从发生可能性的分数与其发生的影响的分数相乘得出。然后可以得出由每个漏洞的加权加权分数所占百分比表示的严重性百分比。针对与云计算环境相关的问题专门开发了类似的表格。调查结果-在调查了IT系统的历史背景和出现的漏洞,并回顾了常见的恶意类型的系统漏洞之后,本文确定了22种不同类型的漏洞,这些漏洞分为八类。这项比较研究探索了诸如云计算服务之类的新技术中可能存在的漏洞。还探讨了有关云计算的特定问题,并针对这些问题进行了类似的比较研究。从IT系统开发开始到今天的云计算技术对所有类型漏洞的比较研究结果表明,随着移动应用程序/系统的出现和兴起,漏洞类别中与移动访问相关的类别比例最高。没有成熟的安全解决方案。实际意义-从历史中学习,可以得出结论,在处理诸如云计算之类的新技术时,当前的风险因素。企业可以意识到,决定加入云计算需要考虑本文中提到的问题,并确定大多数漏洞类型以试图避免它们。原创性/价值-使用简单的评分技术通过风险分析证明了一项新的比较研究和漏洞的新分类。

著录项

相似文献

  • 外文文献
  • 中文文献
  • 专利
获取原文

客服邮箱:kefu@zhangqiaokeyan.com

京公网安备:11010802029741号 ICP备案号:京ICP备15016152号-6 六维联合信息科技 (北京) 有限公司©版权所有
  • 客服微信

  • 服务号