Hasil (
Bahasa Indonesia) 1:
[Salinan]Disalin!
The same procedure has been followed in order to determine dependencies among other cloudsecurity issues that we have identified in this survey. A sample of these dependencies has been presentedin the form of rules in Table 4. These rules aim at providing practitioners with deep insights about cloudcomputing security issues to take suitable precaution measures. Practitioners can also trace the sourceof any security issue through these rules. For example, the main cause of wrapping attacks can be tailoredto weak browser security as stated by Rule 7, whereas weak browser security can be linked to securitymisconfiguration as stated by Rule 11. These rules could be helpful in protecting a cloud computingenvironment against various attacks by providing a comprehensive view of the attacks’ map rather thanconsidering each attack in an isolated setup.
Sedang diterjemahkan, harap tunggu..
