2014
DOI: 10.1108/jmh-02-2014-0018
|View full text |Cite
|
Sign up to set email alerts
|

A comparative study of the evolution of vulnerabilities in IT systems and its relation to the new concept of cloud computing

Abstract: Purpose – The purpose of this paper is to classify and categorize the vulnerability types emerged with time as information technology (IT) systems evolved. This comparative study aims to compare the seriousness of the old well-known vulnerabilities that may still exist with lower possibility of happening with that of new technologies like cloud computing with Mobility access. Cloud computing is a new structure of IT that is becoming the main part of the new model of business environment. Howeve… Show more

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
2
1
1
1

Citation Types

0
7
0

Year Published

2016
2016
2022
2022

Publication Types

Select...
6

Relationship

0
6

Authors

Journals

citations
Cited by 12 publications
(7 citation statements)
references
References 72 publications
0
7
0
Order By: Relevance
“…Today, a demand to integrate enterprise software in an inexpensive and highly secured fashion is growing. Large IT business players are developing various complex IT solutions and global data centres to accommodate their business needs for efficient data analytics (Kouatli, 2014). Another of the most successful information technologies that made distributed data processing possible is called Cloud Computing.…”
Section: Today (2000s-2020s)mentioning
confidence: 99%
See 1 more Smart Citation
“…Today, a demand to integrate enterprise software in an inexpensive and highly secured fashion is growing. Large IT business players are developing various complex IT solutions and global data centres to accommodate their business needs for efficient data analytics (Kouatli, 2014). Another of the most successful information technologies that made distributed data processing possible is called Cloud Computing.…”
Section: Today (2000s-2020s)mentioning
confidence: 99%
“…MIS supported businesses with medium term planning and strategic decision-making. The network environment, at that time, was based on large and powerful computers, called mainframe computers that provided computational services and processing power (Kouatli, 2014). However, as personal computers became cheaper and more suitable for a typical office environment, organisations started to replace their mainframe terminals with personal computers linked together in a network (Padhy and Patra, 2012).…”
Section: Yesterday (1950s–1990s)mentioning
confidence: 99%
“…Unlike desktop computers, mobile devices are exposed to intentional security attacks and have introduced new types of security risks. Proliferation of mobile devices and increased usage encouraged the hackers to target these devices and whole new types of vulnerabilities and security compromises started emerging (Kouatli, 2014). The mobile devices may be attacked by mobile malware and viruses via email, MMS attachments, internet browsing or even by Bluetooth (Gallaugher, 2021) and are vulnerable to a novel set of script-less injection attacks which can extract sensitive information through these devices (Heiderich et al, 2012).…”
Section: User's Attitude Toward Application-level Security Issuesmentioning
confidence: 99%
“…Ladan (2016) defines a mobile device as “any portable device that belongs to a specific user and has computing and storage capabilities”. The proliferation of mobile devices and increased usage encouraged hackers to target these devices and whole new types of vulnerabilities started emerging (Kouatli, 2014b). For example, Android malware attacks install fake apps which installs malicious code, contaminating data and causing data leakage.…”
Section: Literature Reviewmentioning
confidence: 99%
“…However, BYOD has a risk of phone loss leading to untrusted access, data breaches, data loss or leak accompanied by new types of security threats (Yun et al , 2012; He, 2013; Miller et al , 2012). Besides, when employees leave the organization, the organization’s sensitive data may still be present on their own mobile device (Kouatli, 2014b). This may increase the chances of information misuse and malicious threats (McAfee, 2014).…”
Section: Literature Reviewmentioning
confidence: 99%