Faux Insider Hazard Investigation on Non-Public Cloud Computing by
Using ADAM’s Technique
Dublin Core
Title
Faux Insider Hazard Investigation on Non-Public Cloud Computing by
Using ADAM’s Technique
Using ADAM’s Technique
Subject
Cloud, MITC, Forensics, ADAM, Analysis
Description
Cloud computing is a service system mechanism that businesses and organizations use to perform computerized and integrated
transactions over computer networks. The service system must, of course, be”matched”with a”certain amount”of security. It
is applied to” forecast the probability of cybercrime. A Cloud Service Provider (CSP) often offers cloud-based services with a
basic level of security. Typically, CSPs are set up to offer their services on the open internet. Data security-focused
organizations strive to shield their systems from a wide range of attackers. One of the alternatives is to construct a private
cloud computing system. The issue is the potential for Man in the Cloud (MITC) assaults, which compromise and modify
identities and are identified in cloud systems as phony insider threats. Based on the ISO 27032 standard research, the goal of
this work is to undertake a threat analysis of MITC attack methodologies against private cloud computing services. With
regards to risks to cloud services in a private cloud computing environment, it is intended that reporting and documenting the
study' findings would lead to suggestions for more research and cybersecurity management procedures
transactions over computer networks. The service system must, of course, be”matched”with a”certain amount”of security. It
is applied to” forecast the probability of cybercrime. A Cloud Service Provider (CSP) often offers cloud-based services with a
basic level of security. Typically, CSPs are set up to offer their services on the open internet. Data security-focused
organizations strive to shield their systems from a wide range of attackers. One of the alternatives is to construct a private
cloud computing system. The issue is the potential for Man in the Cloud (MITC) assaults, which compromise and modify
identities and are identified in cloud systems as phony insider threats. Based on the ISO 27032 standard research, the goal of
this work is to undertake a threat analysis of MITC attack methodologies against private cloud computing services. With
regards to risks to cloud services in a private cloud computing environment, it is intended that reporting and documenting the
study' findings would lead to suggestions for more research and cybersecurity management procedures
Creator
Dwi Kurnia Wibowo1
, Ahmad Luthfi2
, Yudi Prayudi3
, Erika Ramadhani4
, Muhamad Maulana5
, Ahmad Luthfi2
, Yudi Prayudi3
, Erika Ramadhani4
, Muhamad Maulana5
Publisher
Indonesian Islamic University
Date
: 29-12-2022
Contributor
Fajar bagus W
Format
PDF
Language
Indonesia
Type
Text
Files
Collection
Citation
Dwi Kurnia Wibowo1
, Ahmad Luthfi2
, Yudi Prayudi3
, Erika Ramadhani4
, Muhamad Maulana5, “Faux Insider Hazard Investigation on Non-Public Cloud Computing by
Using ADAM’s Technique,” Repository Horizon University Indonesia, accessed June 6, 2025, https://repository.horizon.ac.id/items/show/9324.
Using ADAM’s Technique,” Repository Horizon University Indonesia, accessed June 6, 2025, https://repository.horizon.ac.id/items/show/9324.