The pervasiveness of the internet and available connectivity solutions brought about by cloud computing has led to an unprecedented increase in technologies built based on information technology infrastructures. This has improved the number of cloud users and substantially increasing the number of incidents related to the security of infrastructure and data in the recent past. Most organizations consider the deployment of different types of protection systems to curb various malicious activities. Organizations offer sophisticated monitoring and reporting capabilities to identify attacks against the cloud environment. Users with ill intentions have increasingly used the cloud as an attack vector due to its ubiquity, scalability and open nature despite the existence of policy violation detection systems necessitating the need to strengthen access policies from time to time. Policy violation detection plays a major role in information security by providing a systematic way of detection and interpreting attacks. Some of the known weaknesses of most detection tools are the generation of false positives or false alerts and the inability to perform analysis if traffic is encrypted as well as failure to detect and prevent attacks.
OGINGA, R (2021). A Model For Detecting Information Technology Infrastructure Policy Violations In A Cloud Environment. Afribary. Retrieved from https://afribary.com/works/a-model-for-detecting-information-technology-infrastructure-policy-violations-in-a-cloud-environment
OGINGA, RUTH "A Model For Detecting Information Technology Infrastructure Policy Violations In A Cloud Environment" Afribary. Afribary, 19 May. 2021, https://afribary.com/works/a-model-for-detecting-information-technology-infrastructure-policy-violations-in-a-cloud-environment. Accessed 29 Nov. 2024.
OGINGA, RUTH . "A Model For Detecting Information Technology Infrastructure Policy Violations In A Cloud Environment". Afribary, Afribary, 19 May. 2021. Web. 29 Nov. 2024. < https://afribary.com/works/a-model-for-detecting-information-technology-infrastructure-policy-violations-in-a-cloud-environment >.
OGINGA, RUTH . "A Model For Detecting Information Technology Infrastructure Policy Violations In A Cloud Environment" Afribary (2021). Accessed November 29, 2024. https://afribary.com/works/a-model-for-detecting-information-technology-infrastructure-policy-violations-in-a-cloud-environment