Search the World's Largest Database of Information Science & Technology Terms & Definitions
InfInfoScipedia LogoScipedia
A Free Service of IGI Global Publishing House
Below please find a list of definitions for the term that
you selected from multiple scholarly research resources.

What is Threats

Emerging Technologies and Security in Cloud Computing
In the context of cloud computing, threats refer to potential risks or vulnerabilities that can compromise the security and functionality of cloud-based systems. These threats can include malware attacks, data breaches, denial-of-service (DoS) attacks, insider threats, and various other malicious activities that may target cloud infrastructure, applications, or data.
Published in Chapter:
Cloud Security Risks, Threats, and Solutions for Business Logistics
Shrikant Tiwari (Galgotias University, India), Ramesh S. Wadawadagi (Nagarjuna College of Engineering, India), Arun Kumar Singh (Greater Noida Institute of Technology, India), and Virendra Kumar Verma (Institute of Engineering and Rural Technology (IERT), Prayagraj, India)
Copyright: © 2024 |Pages: 35
DOI: 10.4018/979-8-3693-2081-5.ch006
Abstract
Cloud computing has revolutionized the landscape of modern business logistics by offering scalable and cost-effective solutions for data storage, processing, and application deployment. However, with this newfound convenience comes a plethora of security challenges that businesses must address to protect their valuable assets and sensitive information. This chapter aims to provide a comprehensive overview of the security risks and threats associated with cloud adoption in the logistics industry, along with effective solutions to mitigate them by presenting an in-depth analysis of the primary security risks that businesses may encounter when leveraging cloud-based logistics solutions. Additionally, it discusses the risks posed by shared infrastructure, third-party integrations, and data jurisdiction concerns. Moreover, the chapter highlights the growing role of emerging technologies in bolstering cloud security measures. These technologies offer sophisticated threat detection and proactive response capabilities, enabling logistics companies to stay ahead of evolving cyber threats.
Full Text Chapter Download: US $37.50 Add to Cart
More Results
IoT Security Issues, Challenges, Threats, and Solutions in Healthcare Applications
A blockage or a disruptive process to some productive task that may lead to hampering of the expected outcome.
Full Text Chapter Download: US $37.50 Add to Cart
Infusion of Digital Technologies in the Sustainability of Academic Libraries: Opportunities and Threats
The state of having disasters that militate against the performance of the infusion of digital technologies.
Full Text Chapter Download: US $37.50 Add to Cart
Managing Threats and Potential Solutions to Mitigating Mass Violence
Threats are security conditions that can cause undesirable consequences or impacts on lives or properties. It could be verbal warning or physical conditions meant to create fear on a target population.
Full Text Chapter Download: US $37.50 Add to Cart
Cyberaccounting for the Leaders of the Future
The possibility of accidental or deliberate compromise of information security, the loss of confidentiality, integrity or availability or impaired functions that provide authenticity and non-repudiation of information.
Full Text Chapter Download: US $37.50 Add to Cart
Proactive Information Security Strategy for a Secure Business Environment
The possibility of accidental or deliberate compromise of information security, the loss of confidentiality, integrity, or availability or impaired functions that provide authenticity and non-repudiation of information.
Full Text Chapter Download: US $37.50 Add to Cart
Security Concepts, Developments, and Future Trends
Detection applicability against intrusion should be available which operates usually simultaneously with security system protection.
Full Text Chapter Download: US $37.50 Add to Cart
Information Security Management in Picture Archiving and Communication Systems for the Healthcare Industry
These are things that can go wrong or that can attack the system. Examples might include fire or fraud. Threats are ever present for every system.
Full Text Chapter Download: US $37.50 Add to Cart
Cybersecurity Risks in Romanian Companies
The possibility of accidental or deliberate compromise of information security, the loss of confidentiality, integrity or availability or impaired functions that provide authenticity and non-repudiation of information.
Full Text Chapter Download: US $37.50 Add to Cart
Threat Assessment of Mass Shootings
This is an expression of an intention to cause harm against someone or something.
Full Text Chapter Download: US $37.50 Add to Cart
Threats to Media Freedom and the Safety of Journalists in Nigeria
Any form of danger to journalists or media organisations that could cause physical, verbal or psychological vulnerability, including threats to life and family, or harm to their equipment, including laws or absence thereof to protect journalists and media organisations.
Full Text Chapter Download: US $37.50 Add to Cart
Defending Information Networks in Cyberspace: Some Notes on Security Needs
a) The danger or the possibility of an attack or an incident on a computer system; b) An object, person, or other entity that represents a constant danger to an asset; c) A potential for violation of security, which exists when there is a circumstance, capability, action, or event that could breach security and cause harm; d) A possible danger that might exploit a vulnerability.
Full Text Chapter Download: US $37.50 Add to Cart
Full Text Chapter Download: US $37.50 Add to Cart
Information Security Threats in Public and Private Organizations: Evidence From Romania
The possibility of accidental or deliberate compromise of information security, the loss of confidentiality, integrity or availability or impaired functions that provide authenticity and non-repudiation of information.
Full Text Chapter Download: US $37.50 Add to Cart
Impact of Information and Communication Technology in the Indian Education System During COVID-19
It is a kind of attack which is used by the adversary to steal personal information.
Full Text Chapter Download: US $37.50 Add to Cart
eContent Pro Discount Banner
InfoSci OnDemandECP Editorial ServicesAGOSR