NotesFAQContact Us
Collection
Advanced
Search Tips
ERIC Number: ED564872
Record Type: Non-Journal
Publication Date: 2013
Pages: 426
Abstractor: As Provided
Reference Count: N/A
ISBN: 978-1-3036-5538-8
ISSN: N/A
Edgeware Security Risk Management: A Three Essay Thesis on Cloud, Virtualization and Wireless Grid Vulnerabilities
Brooks, Tyson T.
ProQuest LLC, D.P.S. Dissertation, Syracuse University
This thesis identifies three essays which contribute to the foundational understanding of the vulnerabilities and risk towards potentially implementing wireless grid Edgeware technology in a virtualized cloud environment. Since communication networks and devices are subject to becoming the target of exploitation by hackers (e.g. individuals who attempt to gain unauthorized access to computer systems), these individuals are gaining ever-increasing knowledge of the often widely-reported exploitable vulnerabilities in these types of innovative technologies; and thus are able to craft increasingly effective computer network attacks against such technologies. Through a review of literature and a technical laboratory experiment against a wireless grid Edgeware product called the GridStreamX Edgeware application, this three essay thesis responds to the overall research proposition: what security vulnerability enumerations would contribute to the degradation and risk in using a wireless grid Edgeware application in a virtualized cloud environment? The first supporting research proposition includes the cyber-attacks and vulnerabilities towards the integration of a cloud computing and a wireless grid architecture (e.g. a wireless cloud) and proposes the following question: (Q1) what potential threats and vulnerabilities exist within the integration of a cloud computing and wireless grid (e.g., wireless cloud) architecture? The second research proposition identifies the security vulnerabilities and countermeasures of virtualization environments and proposes the following question: (Q2) in the area of virtualized computing environments, what are the common exploits of security properties and vulnerabilities that exist from the perspective of hackers performing cyber-attacks? A third proposition is investigated through a technical laboratory experiment of the GridStreamX Edgeware application and proposes the following research question: (Q3) what specific vulnerabilities are exploited against the GridStreamX Edgeware application in its operating environment utilizing an anatomy of a network attack? The findings from these three essays provide a greater understanding of the practical ways wireless grid Edgeware technology can be attacked and how proper countermeasures can be use to protect information systems using this technology from unauthorized modification or disclosure. This research also informs scholars and science-practitioners, who research information systems architectures, on defining security standards, protocols and policies for these new types of integrated and distributed computing architectures. [The dissertation citations contained here are published with the permission of ProQuest LLC. Further reproduction is prohibited without permission. Copies of dissertations may be obtained by Telephone (800) 1-800-521-0600. Web page: http://www.proquest.com/en-US/products/dissertations/individuals.shtml.]
ProQuest LLC. 789 East Eisenhower Parkway, P.O. Box 1346, Ann Arbor, MI 48106. Tel: 800-521-0600; Web site: http://www.proquest.com/en-US/products/dissertations/individuals.shtml
Publication Type: Dissertations/Theses - Doctoral Dissertations
Education Level: N/A
Audience: N/A
Language: English
Sponsor: N/A
Authoring Institution: N/A