Abstract
This chapter is a revised version of the authors’ earlier work (Hutchings, Smith and James 2013), “Cloud Computing for Small Business: Criminal and Security Threats and Prevention Measures,” originally published in Trends and Issues in Crime and Criminal Justice (Canberra: Australian Institute of Criminology). It is included in the current collection with permission. The research was supported by the former Department of Broadband, Communication and the Digital Economy and undertaken at the ARC Centre of Excellence in Policing and Security and the Australian Institute of Criminology. The opinions, findings, and conclusions or recommendations expressed are those of the authors and do not reflect those of the aforementioned agencies.
Access this chapter
Tax calculation will be finalised at checkout
Purchases are for personal use only
Preview
Unable to display preview. Download preview PDF.
Similar content being viewed by others
Bibliography
Agrawal, D., El Abbadi, A. and Wang, S. (2011) “Secure Data Management in the Cloud,” Databases in Networked Information Systems 7108: 1–15.
Aleem, A. and Sprott, C. R. (2013) “Let Me in the Cloud: Analysis of the Benefit and Risk Assessment of Cloud Platform,” Journal of Financial Crime 20: 6–24.
Allen, J. (2010) “Data Security in a Mobile World,” GPSolo 27: 4–6.
Aron, J. (2011) “Beware of the Botcloud,” New Scientist 210: 24.
Banham, R. (2012) “Few Data Breaches in the Cloud — For Now,” Business Insurance 46: 14.
Banks, L. (2010) “Cyber Criminals Using Cloud to Launch Attacks, Security Expert Warns,” http://www.computerworld.com.au/article/363710/cyber_criminals_using_cloud_launch_attacks_security_expert_warns/ (accessed 3 August 2014).
Bennett, B. (2012) “Megaupload Raid Underlines Cloud Risk,” NZ Business 26: 54.
Blanton, S. and Schiller, C. (2010) “Is There Safety in the Cloud?,” EDUCAUSE Quarterly 32.
Blumenthal, M. S. (2011) “Is Security Lost in the Cloud?,” Communications and Strategies: 69–86.
Cloud Security Alliance (2010) “Top Threats to Cloud Computing v1.0,” https://cloudsecurityalliance.org/research/top-threats/#_downloads. (accessed 3 August 2014).
Dlodlo, N. (2011) “Legal, Privacy, Security, Access and Regulatory Issues in Cloud Computing,” Proceedings of the European Conference on Information Management & Evaluation, 161–8.
Fortify (2010) “Vast Scale of Cloud Hacking,” International Journal of Micrographics & Optical Technology 28: 7–8.
Grobauer, B., Walloschek, T. and Stoecker, E. (2011) “Understanding Cloud Computing Vulnerabilities,” IEEE Security & Privacy 9: 50–7.
Hong Kong Government News (2011) LCQ3 Information Security, Hong Kong: Hong Kong Government News.
Hutchings, A., Smith, R. G. and James, L. (2013) “Cloud Computing for Small Business: Criminal and Security Threats and Prevention Measures,” in Trends and Issues in Crime and Criminal Justice no. 456, Canberra, Australia: Australian Institute of Criminology.
Karagiannis, E. (2005) “Political Islam and Social Movement Theory: The Case of Hizb ut-Tahrir in Kyrgyzstan.” Religion, State and Society 33 (2): 137–50.
Knapp, K. J., Denney, G. D. and Barner, M. E. (2011) “Key Issues on Data Centre Security: An Investigation of Government Audit Reports,” Government Information Quarterly 28: 533–41.
Kunick, J. M. (2011) “Navigate the Cloud,” Managing Intellectual Property 210: 18.
Mell, P. and Grance, T. (2011) The NIST Definition of Cloud Computing: Recommendations of the National Institute of Standards and Technology, Gaithersburg: US Department of Commerce/National Institute of Standards and Technology.
Mowbray, M. (2009) “The Fog Over the Grimpen Mire: Cloud Computing and the Law,” SCRIPTed Journal of Law, Technology and Society 6: 1–15.
Pacella, R. M. (2011) “Hacking the Cloud,” Popular Science 278: 68–71.
Ponemon Institute (2011) Security of Cloud Computing Providers Study, Traverse City, MI: Ponemon Institute.
Ristenpart, T., Tromer, E., Shacham, H. et al. (2009) “Hey You, Get Off My Cloud: Exploring Information Leakage in Third-party Compute Clouds,” 16th ACM Conference Computer and Communications, Chicago.
Schreiber, T. (2004) Session Riding: A Widespread Vulnerability in Today’s Web Applications, Munchen: SecureNet.
Smith, R. G., Wolanin, N. and Worthington, G. (2003) “e-Crime Solutions and Crime Displacement,” in Trends & Issues in Crime and Criminal Justice no. 243, Canberra, Australia: Australian Institute of Criminology.
Subashini, S. and Kavitha, V. (2011) “A Survey on Security Issues in Service Delivery Models of Cloud Computing,” Journal of Network and Computer Applications 34: 1–11.
Trend Micro (2011) CloudSecuritySurvey: Global Executive Summary, http://newsroom.trendmicro.com/file.php/194/Global+Cloud+Survey+Exec+Summary_Final+%282%29.pdf (accessed 3 August 2014).
Wright, A. (2011) “Cloud Computing and Security,” Toledo Business Journal 27: 20–2.
Editor information
Editors and Affiliations
Copyright information
© 2015 Alice Hutchings, Russell G. Smith, and Lachlan James
About this chapter
Cite this chapter
Hutchings, A., Smith, R.G., James, L. (2015). Criminals in the Cloud: Crime, Security Threats, and Prevention Measures. In: Smith, R.G., Cheung, R.CC., Lau, L.YC. (eds) Cybercrime Risks and Responses. Palgrave Macmillan’s Studies in Cybercrime and Cybersecurity. Palgrave Macmillan, London. https://doi.org/10.1057/9781137474162_10
Download citation
DOI: https://doi.org/10.1057/9781137474162_10
Publisher Name: Palgrave Macmillan, London
Print ISBN: 978-1-349-55788-2
Online ISBN: 978-1-137-47416-2
eBook Packages: Palgrave Social Sciences CollectionSocial Sciences (R0)