5.issues and Challenges
5.issues and Challenges
• Scaling-Out
• Basic terms
– Confidentiality something made accessible to only
authorized parties
– Integrity not altered by an unauthorized party.
– Availability always being accessible and usable.
– Threat A potential security violation that can challenge
defenses.
– Vulnerability a weakness that can be exploited to attack
on a system.
Cloud Information Security
• Key points
– Confidentiality, integrity, authenticity and availability are
associated with measuring security.