• Login
    View Item 
    •   Research Bank Home
    • Study Areas
    • Computing
    • Computing Conference Papers
    • View Item
    •   Research Bank Home
    • Study Areas
    • Computing
    • Computing Conference Papers
    • View Item
    JavaScript is disabled for your browser. Some features of this site may not work without it.

    Analysis and prevention of account hijacking based incidents in cloud environment

    Tirumala, Sreenivas Sremath; Sathu, Hira; Naidu, Vijay

    Thumbnail
    Share
    View fulltext online
    Analysis and Prevention of Account Hijacking based.pdf (325.4Kb)
    Date
    2015-12
    Citation:
    Tirumala, S.S., Sathu, H., & Naidu, V. (2015, December). Analysis and Prevention of Account Hijacking based Incidents in Cloud Environment. 14th International Conference on Information Technology (ICIT), ICIT-2015 (Ed.), Bhubaneswar, India (pp.124-129).
    Permanent link to Research Bank record:
    https://hdl.handle.net/10652/3353
    Abstract
    Cloud computing is a technological breakthrough in computing. It has affected each and every part of the information technology, from infrastructure to the software deployment, from programming to the application maintenance. Cloud offers a wide array of solutions for the current day computing needs aided with benefits like elasticity, affordability and scalability. But at the same time, the incidence of malicious cyber activity is progressively increasing at an unprecedented rate posing critical threats to both government and enterprise IT infrastructure. Account or service hijacking is a kind of identity theft and has evolved to be one of the most rapidly increasing types of cyber- attack aimed at deceiving end users. This paper presents an in depth analysis of a cloud security incident that happened on The New York Times online using account hijacking. Further, we present incident prevention methods and detailed incident prevention plan to stop future occurrence of such incidents.
    Keywords:
    account hijacking, identity theft, phishing, New York Times (newspaper), Immediate Incident Response (IIR), Syrian Electronic Army (SEA), cloud security incidents
    ANZSRC Field of Research:
    080303 Computer System Security
    Copyright Holder:
    Authors
    Rights:
    This digital work is protected by copyright. It may be consulted by you, provided you comply with the provisions of the Act and the following conditions of use: Any use you make of these documents or images must be for research or private study purposes only, and you may not make them available to any other person. You will recognise the author's and publishers rights and give due acknowledgement where appropriate.
    Metadata
    Show detailed record
    This item appears in
    • Computing Conference Papers [147]

    Library home
    Send Feedback
    Research publications
    Unitec
    Moodle
    © Unitec Institute of Technology, Private Bag 92025, Victoria Street West, Auckland 1142
     

     

    Usage

    Downloads, last 12 months
    424
     
     

    Usage Statistics

    For this itemFor the Research Bank

    Share

    About

    About Research BankResearch at UnitecContact us

    Help for authors  

    How to add researchOpen Access GuideVersions Toolkit

    Register for updates  

    LoginRegister

    Browse Research Bank  

    EverywhereAcademic study areasAuthorDateSubjectTitleType of researchSupervisorThis CollectionAuthorDateSubjectTitleType of researchSupervisor

    Library home
    Send Feedback
    Research publications
    Unitec
    Moodle
    © Unitec Institute of Technology, Private Bag 92025, Victoria Street West, Auckland 1142