期刊名称:International Journal of Innovative Research in Science, Engineering and Technology
印刷版ISSN:2347-6710
电子版ISSN:2319-8753
出版年度:2016
卷号:5
期号:7
页码:13359
DOI:10.15680/IJIRSET.2016.0507108
出版社:S&S Publications
摘要:This research paper mainly discusses Cloud based Contact Center as a Service (CCaaS) businesssegment, which is facing serious information security attacks/hacks from multiple stakeholders, both internal to theorganization/s and from external sources. Ironically, the magnitude of the Information security loss/damage is known tothe organizations only if their end customers report discrepancies in data/business, else information security breach isnever known and organizations fail to publish the information fallacies, fearing business losses. Typically,Organizations will never be aware for the fact information security is breached and sensitive business data is leaked. Inorder to win over the customer trust in lieu of frequent information data theft/s, organizations are trying to ascertain thelikely/potential information security damages hacker tries to create havoc and identify the pattern of informationsecurity hack towards cloud based CCaaS product. For the business to perform effectively, it is mandatory for theorganizations to prior know the probability of areas that hacker can target with an objective to tarnish/manipulate data.Some of the model based data security flows are highlighted in this paper.
关键词:IT; Cloud Computing; CCaaS; BPO; IT Security; Ethical hacking; model based testing