Faux Insider Hazard Investigation on Non-Public Cloud Computing by
Using ADAM’s Technique

Dublin Core

Title

Faux Insider Hazard Investigation on Non-Public Cloud Computing by
Using ADAM’s Technique

Subject

Cloud, MITC, Forensics, ADAM, Analysis

Description

Cloud computing is a service system mechanism that businesses and organizations use to perform computerized and integrated
transactions over computer networks. The service system must, of course, be”matched”with a”certain amount”of security. It
is applied to” forecast the probability of cybercrime. A Cloud Service Provider (CSP) often offers cloud-based services with a
basic level of security. Typically, CSPs are set up to offer their services on the open internet. Data security-focused
organizations strive to shield their systems from a wide range of attackers. One of the alternatives is to construct a private
cloud computing system. The issue is the potential for Man in the Cloud (MITC) assaults, which compromise and modify
identities and are identified in cloud systems as phony insider threats. Based on the ISO 27032 standard research, the goal of
this work is to undertake a threat analysis of MITC attack methodologies against private cloud computing services. With
regards to risks to cloud services in a private cloud computing environment, it is intended that reporting and documenting the
study' findings would lead to suggestions for more research and cybersecurity management procedures

Creator

Dwi Kurnia Wibowo1
, Ahmad Luthfi2
, Yudi Prayudi3
, Erika Ramadhani4
, Muhamad Maulana5

Publisher

Indonesian Islamic University

Date

: 29-12-2022

Contributor

Fajar bagus W

Format

PDF

Language

Indonesia

Type

Text

Files

Collection

Citation

Dwi Kurnia Wibowo1 , Ahmad Luthfi2 , Yudi Prayudi3 , Erika Ramadhani4 , Muhamad Maulana5, “Faux Insider Hazard Investigation on Non-Public Cloud Computing by
Using ADAM’s Technique,” Repository Horizon University Indonesia, accessed June 6, 2025, https://repository.horizon.ac.id/items/show/9324.