eCite Digital Repository

Technical, legal and ethical dilemmas: distinguishing risks from malware and cyber-attack tools in the age of 'cloud computing'

Citation

Broucek, V and Turner, P, Technical, legal and ethical dilemmas: distinguishing risks from malware and cyber-attack tools in the age of 'cloud computing', Proceedings of the 21st Annual EICAR Conference , 5-8 May 2012, Lisbon, Portugal, pp. 72-79. (2012) [Refereed Conference Paper]


Preview
PDF
Restricted - Request a copy
387Kb
  

Copyright Statement

Copyright 2012 The authors

Official URL: http://www.eicar.org/108-0-General-Info.html

Abstract

Despite hype around the benefits of ‘cloud computing’, challenges in maintaining data security and data privacy have been recognised as significant vulnerabilities (Pearson, 2009; Ristenpart, Tromert, Shacham, & Savage, 2009; Vouk, 2008). These vulnerabilities raise numerous questions about the capacity of organisations relying on cloud solutions to effectively manage risk. This is particularly the case as the threats faced move increasingly from indiscriminate malware to targeted cyber-attack tools. It has also already been recognised how ’cloud solutions’ pose additional challenges for forensic computing specialists including discoverability and chain of evidence (Reilly, Wren, & Berry, 2011; Ruan, Carthy, Kechadi, & Crosbie, 2011). However, to date there has been little consideration of how the differences between indiscriminate malware and targeted cyber-attack tools further problematize the capacity of organisations to manage risk. This paper considers these risks and differentiates between technical, legal and ethical dilemmas posed. The paper highlights the need for organisations to be aware of these issues when deciding to move to cloud solutions.

Item Details

Item Type:Refereed Conference Paper
Research Division:Information and Computing Sciences
Research Group:Computer Software
Research Field:Computer System Security
Objective Division:Information and Communication Services
Objective Group:Computer Software and Services
Objective Field:Internet Hosting Services (incl. Application Hosting Services)
Author:Broucek, V (Dr Vlasti Broucek)
Author:Turner, P (Associate Professor Paul Turner)
ID Code:79123
Year Published:2012
Deposited By:Psychology
Deposited On:2012-08-17
Last Modified:2016-08-10
Downloads:1 View Download Statistics

Repository Staff Only: item control page