Analyzing CDR/IPDR data to find People Network from Encrypted Messaging Services

09/25/2018
by   Adya Joshi, et al.
0

Organizations maintaining personal details of their users have to adhere to data protection regulations to ensure their users' data remains confidential and secure. On one end, cloud providers are implementing their own security and privacy controls. On the other hand, standards bodies like Cloud Security Alliance (CSA), International Organization for Standards (ISO), National Institute for Standards and Technology (NIST), etc. are developing broad standards for cloud security. In this paper we provide a comprehensive analysis of the cloud security standards that are being developed and how they compare with the security controls of cloud providers. Our study is mainly focused on policies about the mobility of resources, identity and access management, data protection, incident response & audit and assessment. This paper will help consumer organizations with their compliance needs by evaluating the security controls and policies of cloud providers and assisting them in identifying their enterprise cloud security policies.

READ FULL TEXT

page 2

page 3

research
07/17/2018

An Adaptable Maturity Strategy for Information Security

The lack of security in information systems has caused numerous financia...
research
06/15/2020

ISMS role in the improvement of digital forensics related process in SOC's

Organizations concerned about digital or computer forensics capability w...
research
05/02/2022

Using Constraint Programming and Graph Representation Learning for Generating Interpretable Cloud Security Policies

Modern software systems rely on mining insights from business sensitive ...
research
02/10/2018

Security level analysis of academic information systems based on standard ISO 27002:2003 using SSE-CMM

This research was conducted to find out the level of information securit...
research
11/21/2017

Standards for enabling heterogeneous IaaS cloud federations

Technology market is continuing a rapid growth phase where different res...
research
11/11/2022

An investigation of security controls and MITRE ATT&CK techniques

Attackers utilize a plethora of adversarial techniques in cyberattacks t...
research
04/05/2018

A Fast Fragmentation Algorithm For Data Protection In a Multi-Cloud Environment

Data fragmentation and dispersal over multiple clouds is a way of data p...

Please sign up or login with your details

Forgot password? Click here to reset