首页    期刊浏览 2024年12月14日 星期六
登录注册

文章基本信息

  • 标题:IT Information Security Management - Ethical Hacking Approach
  • 本地全文:下载
  • 作者:Madhusudan KL ; Dr. Paramashiviah P ; Dr. Narahari NS
  • 期刊名称:International Journal of Innovative Research in Science, Engineering and Technology
  • 印刷版ISSN:2347-6710
  • 电子版ISSN:2319-8753
  • 出版年度:2016
  • 卷号:5
  • 期号:7
  • 页码:13359
  • DOI:10.15680/IJIRSET.2016.0507108
  • 出版社:S&S Publications
  • 摘要:This research paper mainly discusses Cloud based Contact Center as a Service (CCaaS) businesssegment, which is facing serious information security attacks/hacks from multiple stakeholders, both internal to theorganization/s and from external sources. Ironically, the magnitude of the Information security loss/damage is known tothe organizations only if their end customers report discrepancies in data/business, else information security breach isnever known and organizations fail to publish the information fallacies, fearing business losses. Typically,Organizations will never be aware for the fact information security is breached and sensitive business data is leaked. Inorder to win over the customer trust in lieu of frequent information data theft/s, organizations are trying to ascertain thelikely/potential information security damages hacker tries to create havoc and identify the pattern of informationsecurity hack towards cloud based CCaaS product. For the business to perform effectively, it is mandatory for theorganizations to prior know the probability of areas that hacker can target with an objective to tarnish/manipulate data.Some of the model based data security flows are highlighted in this paper.
  • 关键词:IT; Cloud Computing; CCaaS; BPO; IT Security; Ethical hacking; model based testing
国家哲学社会科学文献中心版权所有