Search the World's Largest Database of Information Science & Technology Terms & Definitions
InfInfoScipedia LogoScipedia
A Free Service of IGI Global Publishing House
Below please find a list of definitions for the term that
you selected from multiple scholarly research resources.

What is Traffic Hijacking

Handbook of Research on Security Considerations in Cloud Computing
Intentional redirection of internet traffic. Attackers take advantage of traffic routing announcements between networks using Border Gateway Protocol being trust-based.
Published in Chapter:
Security Challenges for Cloud Computing Development Framework in Saudi Arabia
Lawan A. Mohammed (King Fahd University of Petroleum and Minerals, Saudi Arabia) and Kashif Munir (King Fahd University of Petroleum and Minerals, Saudi Arabia)
Copyright: © 2015 |Pages: 16
DOI: 10.4018/978-1-4666-8387-7.ch013
Abstract
In recent years, cloud computing or on-demand computing technologies and applications have become ubiquitous, permeating every aspect of our personal and professional lives. Governments and enterprises are now adopting cloud technologies for numerous applications to increase their operational efficiency, improve their responsiveness and competitiveness. For these reasons, the requirements for developing cloud applications have increased. Despite having many advantages for IT organizations, cloud has some issues that must be consider during its deployment. The main concerns are security, privacy and trust. These issues arise during the deployment of mostly public cloud infrastructure. In this chapter, security, privacy and trust issues of cloud computing deployment in Saudi Arabia were identified and the solutions to overcome these problems were discussed.
Full Text Chapter Download: US $37.50 Add to Cart
eContent Pro Discount Banner
InfoSci OnDemandECP Editorial ServicesAGOSR