Comparison of AWS and AZURE in Prototype for Automated Selected Security Controls

Guardat en:
Dades bibliogràfiques
Publicat a:International Conference on Cyber Warfare and Security (Mar 2025), p. 231
Autor principal: Maimela, Mpho Erick
Altres autors: Vuuren, Joey Jansen van, Moeti, Michael
Publicat:
Academic Conferences International Limited
Matèries:
Accés en línia:Citation/Abstract
Full Text
Full Text - PDF
Etiquetes: Afegir etiqueta
Sense etiquetes, Sigues el primer a etiquetar aquest registre!

MARC

LEADER 00000nab a2200000uu 4500
001 3202191479
003 UK-CbPIL
035 |a 3202191479 
045 2 |b d20250301  |b d20250331 
084 |a 142229  |2 nlm 
100 1 |a Maimela, Mpho Erick 
245 1 |a Comparison of AWS and AZURE in Prototype for Automated Selected Security Controls 
260 |b Academic Conferences International Limited  |c Mar 2025 
513 |a Conference Proceedings 
520 3 |a The continuous development of new malicious codes also puts intense pressure on software and anti-virus companies to update their database definitions from time to time, which causes a challenge to keep up with the pace at which the scripts are developed and distributed (T. Liu et al., 2022) This paper puts forward an enhanced model to detect, classify, and automatically select optimal security control to respond to malicious code attacks in cloud computing environments without human supervision. The automated security control selection is essentially to keep up with the pace of malicious code development and the inevitable changing of the industrial internet to avoid the static procedures and physical human effort to secure the dynamic applications and cloud computing environments (Gergeleit et al., 2020). AWS and Azure comparison across top security scanning tools revealed that each tool has its strengths and capabilities (Singh & Aggarwal, 2022), underscoring this study's approach to automate security control selection for robust cloud security posture. 4. Figure 1 is the architectural view of how Design Science, Literature Review and Usability testing methodologies were used that were influenced by the mixed methods approach by (Jansen van Vuuren et al., 2016) The following steps provide a quick description of how the methodology was utilised to obtain the intended results: *Step 1: 
653 |a Machine learning 
653 |a Software 
653 |a Data integrity 
653 |a Robust control 
653 |a Network security 
653 |a Anti-virus software 
653 |a Cloud computing 
653 |a Malware 
653 |a Cybersecurity 
653 |a Methods 
653 |a Literature reviews 
653 |a Algorithms 
653 |a Automation 
653 |a Usability testing 
700 1 |a Vuuren, Joey Jansen van 
700 1 |a Moeti, Michael 
773 0 |t International Conference on Cyber Warfare and Security  |g (Mar 2025), p. 231 
786 0 |d ProQuest  |t Political Science Database 
856 4 1 |3 Citation/Abstract  |u https://www.proquest.com/docview/3202191479/abstract/embedded/6A8EOT78XXH2IG52?source=fedsrch 
856 4 0 |3 Full Text  |u https://www.proquest.com/docview/3202191479/fulltext/embedded/6A8EOT78XXH2IG52?source=fedsrch 
856 4 0 |3 Full Text - PDF  |u https://www.proquest.com/docview/3202191479/fulltextPDF/embedded/6A8EOT78XXH2IG52?source=fedsrch