Файл: Программно-аппаратные средства защиты информации.pdf

ВУЗ: Не указан

Категория: Курсовая работа

Дисциплина: Не указана

Добавлен: 28.03.2023

Просмотров: 943

Скачиваний: 20

ВНИМАНИЕ! Если данный файл нарушает Ваши авторские права, то обязательно сообщите нам.
  1. Ramgovind S The Management of Security in Cloud Computing // Information Security for South Africa. Sandton, Johannesburg, South Africa: IEEE. 2010

  2. Cyber Security Breaches Survey 2018: Statistical Release // Department for Digital, Culture, Media and Sport. 2018

  3. Закон Российской Федерации "ФЕДЕРАЛЬНЫЙ ЗАКОН ОБ ИНФОРМАЦИИ, ИНФОРМАЦИОННЫХ ТЕХНОЛОГИЯХ И О ЗАЩИТЕ ИНФОРМАЦИИ" от 8.07.2006 № N 149-ФЗ

  4. ISO/IEC 27001 "Информационные технологии — Методы обеспечения безопасности — Системы управления информационной безопасностью — Требования". Введ. 2005

  5. ГОСТ Р ИСО/МЭК 27000-2012 Информационная технология (ИТ). Методы и средства обеспечения безопасности. Системы менеджмента информационной безопасности. Общий обзор и терминология. Введ. 2013-12-01

  6. ISO 27002 “Информационные технологии - Методы защиты – Свод рекомендуемых правил для управления информационной безопасностью”. Введ. 2013-10-01.

  7. Disterer G. ISO/IEC 27000, 27001 and 27002 for Information Security Management // Journal of Information Security. - 2013.

  8. Cyber Security Breaches Survey 2018: Statistical Release // Department for Digital, Culture, Media and Sport // 2018

  9. ГОСТ Р ИСО/МЭК 27002-2012 Информационная технология (ИТ). Методы и средства обеспечения безопасности. Свод норм и правил менеджмента информационной безопасности. Введ. 2014-01-01.

  10. Родичев Ю.А. Нормативная база и стандарты в области информационной безопасности. Учебное пособие. - СПб.: Питер, 2017.

  11. Open Cloud Manifesto - A call to action for the worldwide cloud community. 2009

  12. Peter Mell, Timothy Grance The NIST Definition of Cloud Computing // National Institute of Standards and Technology. - 2011.

  13. Peter Mell Effectively and Securely Using the Cloud Computing Paradigm // NIST, Information Technology Laboratory. - 2009

  14. Ferraiolo D. Cloud Computing [Электронный ресурс] // NIST - URL: https://csrc.nist.gov/projects/cloud-computing (дата обращения: 15.04.2019)

  15. The Notorious Nine Cloud Computing Top Threats in 2013 // Cloud Security Alliance, 2013.

  16. Cloud Computing: Benefits, risks and recommendations for information security // European Network and Information Security Agency (ENISA), 2014

  17. Wayne Jansen, Timothy Grance Guidelines on Security and Privacy in Public Cloud Computing // NIST, 2014

  18. Мультитенантная архитектура для SaaS приложений // Habr URL: https://habr.com/ru/company/microsoft/blog/145027/ (дата обращения: 08.05.2019).

  19. Meiko Jensen, Nils Gruschka, Jörg Schwenk, Luigi Lo Iacono On Technical Security Issues in Cloud Computing // IEEE International Conference on Cloud Computing. 2015.

  20. J.C. Roberts II, W. Al-Hamdani. Who Can You Trust in the Cloud? A Review of Security Issues Within Cloud Computing // Information Security Curriculum Development Conference. 2016

  21. K. Zunnurhain and S. Vrbsky. Security Attacks and Solutions in Clouds // 3rd International Conference on Cloud Computing. 2016

  22. I. M. Khalil, A. Khreishah, and M. Azeem. Cloud Computing Security: A Survey // Computers. 2014

  23. M. Jensen, N. Gruschka, and Ralph Herkenh¨oner. A Survey of Attacks on Web Services // Computer Science - R&D. 2015

  24. B. Grobauer, T. Walloschek, and E. Stocker. Understanding Cloud Computing Vulnerabilities. IEEE Security & Privacy. 2017

  25. R. Bhadauria and S. Sanyal. Survey on Security Issues in Cloud Computing and Associated Mitigation Techniques. 2015.

  26. A. Liu, Y. Yuan, and A. Stavrou. QLProb: A Proxybased Architecture towards Preventing SQL Injection Attacks. // SAC. 2015

  27. F. Sabahi. Secure Virtualization for Cloud Environment Using Hypervisor-based Technology. // Int. Journal of Machine Learning and Computing. 2017

  28. F. Lombardi and R. D. Pietro. Secure Virtualization for Cloud Computing. // Journal of Network and Computer Applications. 2016.

  29. M. Pearce, S. Zeadally, and R. Hunt. Virtualization: Issues, security threats, and solutions // ACM Comput. Surv. 2017.

  30. M.A. Morsy, J. Grundy, and I. Muller. An Analysis of the Cloud Computing Security Problem. // APSEC Cloud Workshop. 2015

  31. S. Luo, Z. Lin, X. Chen, Z. Yang, and J. Chen. Virtualization Security for Cloud Computing Services. // Int. Conf on Cloud and Service Computing. 2015.

  32. C. Dabrowski and K. Mills. VM Leakage and Orphan Control in Open-Source Clouds. // 3rd IEEE International Conference on Cloud Computing Technology and Science (CloudCom). 2015.

  33. T. Ristenpart, E. Tromer, H. Shacham, and S. Savage. Hey, You, Get Off of My Cloud: Exploring Information Leakage in Third-Party Compute Clouds. // ACM Conference on Computer and Communications Security. 2009.

  34. Y. Zhang, M. Ion, G. Russello, and B. Crispo. Cross-VM Side Channels and their Use to Extract Private Keys.

    // ACM CCCS. 2012.

  35. R. Schwarzkopf, M. Schmidt, N. Fallenbeck, and B. Freisleben. Multi-layered Virtual Machines for Security Updates in Grid Environments. // EUROMICRO-SEAA. 2014.

  36. F. Sabahi. Secure Virtualization for Cloud Environment Using Hypervisor-based Technology. // Int. Journal of Machine Learning and Computing. 2017.

  37. M. Le and Y. Tamir. ReHype: Enabling VM Survival Across Hypervisor Failures. // VEE. 2016.

  38. A.S. Ibrahim, J. Hamlyn-Harris, and J. Grundy. Emerging Security Challenges of Cloud Virtual Infrastructure. // APSEC Cloud Workshop. 2016

  39. W.A. Jansen. Cloud Hooks: Security and Privacy Issues in Cloud Computing. // 44th Hawaii International Conference on Systems Science. 2015.

  40. D. Reimer, A. Thomas, G. Ammons, T. W. Mummert, B. Alpern, and Vasanth Bala. Opening Black Boxes: Using Semantic Information to Combat Virtual Machine Image Sprawl. // VEE. 2014.

  41. J. Wei, X. Zhang, G. Ammons, V. Bala, and P. Ning. Managing Security of Virtual Machine Images in a Cloud Environment. // CCSW. 20016.

  42. W. Jansen and T. Grance. Guidelines on Security and Privacy in Public Cloud Computing Special Publication

  43. Ju J, Wang Y, Fu J, Wu J, Lin Z: Research on Key Technology in SaaS // In International Conference on Intelligent Computing and Cognitive Informatics (ICICCI), Hangzhou, China. 2015

  44. Rittinghouse JW, Ransome JF: Security in the Cloud. In Cloud Computing. Implementation, Management, and Security // CRC Press; 2016.

  45. Owens D: Securing elasticity in the Cloud // Commun ACM 2017

  46. Zhang Y, Liu S, Meng X: Towards high level SaaS maturity model: methods and case study // In Services Computing conference. IEEE Asia-Pacific: APSCC; 2016

  47. Mather T, Kumaraswamy S, Latif S: Cloud Security and Privacy // O’Reilly Media, Inc.; 2017

  48. Morsy MA, Grundy J, Müller I: An analysis of the Cloud Computing Security problem. // APSEC 2016 Cloud Workshop. 2016