Abstract
This article contributes to the foundational understanding of the security vulnerabilities and risk towards wireless grid Edgeware technology. Since communication networks and devices are subject to becoming the target of exploitation by hackers (e.g., individuals who attempt to gain unauthorised access to computer systems), these individuals are gaining ever-increasing knowledge of the often widely-reported exploitable vulnerabilities in these types of innovative technologies; and thus are able to craft increasingly effective computer network attacks (CNA) against such technologies. This research responds to the overall proposition: what security vulnerability enumerations would contribute to the degradation and risk in using a wireless grid Edgeware application in a virtualised cloud environment? Using supporting research pertaining to cyber-attacks and vulnerabilities towards a wireless cloud (e.g., the integration of a cloud computing and a wireless grid architecture), security vulnerabilities in virtualisation environments and specific vulnerabilities exploited against a wireless grid Edgeware application, this research provides a greater understanding of the practical ways wireless grid Edgeware technology can be attacked and the risk in utilising this technology.
Original language | English (US) |
---|---|
Pages (from-to) | 191-222 |
Number of pages | 32 |
Journal | International Journal of Internet Technology and Secured Transactions |
Volume | 5 |
Issue number | 3 |
DOIs | |
State | Published - 2014 |
Keywords
- Cloud computing
- Cyber-attack
- Edge computing
- Edgeware
- Hacking
- Information security
- Risk management
- Virtualisation
- Wireless grids
ASJC Scopus subject areas
- Computer Science Applications
- Computer Networks and Communications