Claim Missing Document
Check
Articles

Found 2 Documents
Search

Investigation of Fake Insider Threats on Private Cloud Computing Services Dwi Kurnia Wibowo; Ahmad Luthfi; Nur Widiyasono
International Journal of Science, Technology & Management Vol. 3 No. 5 (2022): September 2022
Publisher : Publisher Cv. Inara

Show Abstract | Download Original | Original Source | Check in Google Scholar | DOI: 10.46729/ijstm.v3i5.613

Abstract

Cloud-based services are service system mechanisms used by companies or organizations in conducting computerized and integrated transactions in a computer network. A service system must of course be balanced with a level of security. This is used to anticipate cyber crimes that have the potential to occur. Cloud-based services themselves are usually offered by a Cloud Service Provider (CSP). CSPs are generally configured so that they are accessible on the public internet for their services. Companies that prioritize data security want a system that is safe from a series of cyber crimes. Private cloud computing scheme is a solution that can be implemented as an alternative. The problem that occurs is the possibility of MITC (Man in the Cloud) attacks that infiltrate and manipulate identities so that they are detected as fake insider threats on cloud systems. This thesis aims to carry out threat analysis with the Man in the Cloud attack technique on private cloud computing services based on a study of the ISO 27032 standard. Reports and documentation of the results of the analysis are expected to become recommendations for the cybersecurity investigation and management process related to threats to cloud services with private schemes cloud computing.
Faux Insider Hazard Investigation on Non-Public Cloud Computing by Using ADAM’s Technique Dwi Kurnia Wibowo; Ahmad Luthfi; Yudi Prayudi; Erika Ramadhani; Muhamad Maulana
Jurnal RESTI (Rekayasa Sistem dan Teknologi Informasi) Vol 6 No 6 (2022): Desember 2022
Publisher : Ikatan Ahli Informatika Indonesia (IAII)

Show Abstract | Download Original | Original Source | Check in Google Scholar | DOI: 10.29207/resti.v6i6.4714

Abstract

Cloud computing is a service system mechanism that businesses and organizations use to perform computerized and integrated transactions over computer networks. The service system must, of course, be”matched”with a”certain amount”of security. It is applied to” forecast the probability of cybercrime. A Cloud Service Provider (CSP) often offers cloud-based services with a basic level of security. Typically, CSPs are set up to offer their services on the open internet. Data security-focused organizations strive to shield their systems from a wide range of attackers. One of the alternatives is to construct a private cloud computing system. The issue is the potential for Man in the Cloud (MITC) assaults, which compromise and modify identities and are identified in cloud systems as phony insider threats. Based on the ISO 27032 standard research, the goal of this work is to undertake a threat analysis of MITC attack methodologies against private cloud computing services. With regards to risks to cloud services in a private cloud computing environment, it is intended that reporting and documenting the study' findings would lead to suggestions for more research and cybersecurity management procedures.