Although cloud computing provides tremendous benefits, security concerns hinder its widespread adoption. However, cloud security involves a broad set of solutions, including encryption, Identity and Access Management (IAM), perimeter defense, Intrusion Detection System (IDS)/Intrusion Prevention System (IPS), and trusted computing. Typical information security analysis predominantly targets either the impact on companies’ stock price from publicly disclosing cyber security incidents or the effectiveness of security incidents disclosure legislation to reduce the frequency of identity theft incidents. Only a handful of research draws attention to cyber risk management. Still, little work exists today prioritizing security solutions through data breach analysis, which is pivotal for efficient budget and resource allocation. To fill in the gap, this study will evaluate the historical breach incidents in the respect of industries, data breach types, costs of breach incidents, and the number of vulnerabilities identified. The goal of the research is to identify the primary cause of the breaches via statistical techniques, including linear regression, Kruskal-Wallis analysis and Random Forest for predictions. If successful, the research will provide information technology security professionals with specific priorities to more optimally manage resources and budget during cloud security planning and implementation.
|Commitee:||Blackburn, Timothy, Malalla, Ebrahim|
|School:||The George Washington University|
|School Location:||United States -- District of Columbia|
|Source:||DAI-A 81/6(E), Dissertation Abstracts International|
|Subjects:||Engineering, Computer Engineering, Information science|
|Keywords:||Cloud, Cyber security, Hack, Prediction|
Copyright in each Dissertation and Thesis is retained by the author. All Rights Reserved
The supplemental file or files you are about to download were provided to ProQuest by the author as part of a
dissertation or thesis. The supplemental files are provided "AS IS" without warranty. ProQuest is not responsible for the
content, format or impact on the supplemental file(s) on our system. in some cases, the file type may be unknown or
may be a .exe file. We recommend caution as you open such files.
Copyright of the original materials contained in the supplemental file is retained by the author and your access to the
supplemental files is subject to the ProQuest Terms and Conditions of use.
Depending on the size of the file(s) you are downloading, the system may take some time to download them. Please be