Comparison of AWS and AZURE in Prototype for Automated Selected Security Controls
Guardat en:
| Publicat a: | International Conference on Cyber Warfare and Security (Mar 2025), p. 231 |
|---|---|
| Autor principal: | |
| Altres autors: | , |
| Publicat: |
Academic Conferences International Limited
|
| Matèries: | |
| Accés en línia: | Citation/Abstract Full Text Full Text - PDF |
| Etiquetes: |
Sense etiquetes, Sigues el primer a etiquetar aquest registre!
|
MARC
| LEADER | 00000nab a2200000uu 4500 | ||
|---|---|---|---|
| 001 | 3202191479 | ||
| 003 | UK-CbPIL | ||
| 035 | |a 3202191479 | ||
| 045 | 2 | |b d20250301 |b d20250331 | |
| 084 | |a 142229 |2 nlm | ||
| 100 | 1 | |a Maimela, Mpho Erick | |
| 245 | 1 | |a Comparison of AWS and AZURE in Prototype for Automated Selected Security Controls | |
| 260 | |b Academic Conferences International Limited |c Mar 2025 | ||
| 513 | |a Conference Proceedings | ||
| 520 | 3 | |a The continuous development of new malicious codes also puts intense pressure on software and anti-virus companies to update their database definitions from time to time, which causes a challenge to keep up with the pace at which the scripts are developed and distributed (T. Liu et al., 2022) This paper puts forward an enhanced model to detect, classify, and automatically select optimal security control to respond to malicious code attacks in cloud computing environments without human supervision. The automated security control selection is essentially to keep up with the pace of malicious code development and the inevitable changing of the industrial internet to avoid the static procedures and physical human effort to secure the dynamic applications and cloud computing environments (Gergeleit et al., 2020). AWS and Azure comparison across top security scanning tools revealed that each tool has its strengths and capabilities (Singh & Aggarwal, 2022), underscoring this study's approach to automate security control selection for robust cloud security posture. 4. Figure 1 is the architectural view of how Design Science, Literature Review and Usability testing methodologies were used that were influenced by the mixed methods approach by (Jansen van Vuuren et al., 2016) The following steps provide a quick description of how the methodology was utilised to obtain the intended results: *Step 1: | |
| 653 | |a Machine learning | ||
| 653 | |a Software | ||
| 653 | |a Data integrity | ||
| 653 | |a Robust control | ||
| 653 | |a Network security | ||
| 653 | |a Anti-virus software | ||
| 653 | |a Cloud computing | ||
| 653 | |a Malware | ||
| 653 | |a Cybersecurity | ||
| 653 | |a Methods | ||
| 653 | |a Literature reviews | ||
| 653 | |a Algorithms | ||
| 653 | |a Automation | ||
| 653 | |a Usability testing | ||
| 700 | 1 | |a Vuuren, Joey Jansen van | |
| 700 | 1 | |a Moeti, Michael | |
| 773 | 0 | |t International Conference on Cyber Warfare and Security |g (Mar 2025), p. 231 | |
| 786 | 0 | |d ProQuest |t Political Science Database | |
| 856 | 4 | 1 | |3 Citation/Abstract |u https://www.proquest.com/docview/3202191479/abstract/embedded/6A8EOT78XXH2IG52?source=fedsrch |
| 856 | 4 | 0 | |3 Full Text |u https://www.proquest.com/docview/3202191479/fulltext/embedded/6A8EOT78XXH2IG52?source=fedsrch |
| 856 | 4 | 0 | |3 Full Text - PDF |u https://www.proquest.com/docview/3202191479/fulltextPDF/embedded/6A8EOT78XXH2IG52?source=fedsrch |