Skip to main content
Article
Threat Modeling the Cloud Computing, Mobile Device Toting, Consumerized Enterprise – an overview of considerations
AMCIS 2011 Proceedings - All Submissions
  • Jeffrey A. Ingalsbe, University of Detroit Mercy
  • Dan Shoemaker, University of Detroit Mercy
  • Nancy R. Mead, Software Engineering Institute
Track
Information Systems Security and Privacy
Publication Date
8-7-2011
Abstract

A megatrend triad comprised of cloud computing, converged mobile devices, and consumerization presents complexchallenges to organizations trying to identify, assess, and mitigate risk. Cloud computing offers elastic just-in-time serviceswithout infrastructure overhead. However, visibility and control are compromised. Converged mobile devices offer integratedcomputing power and connectivity. However, end point control and security are compromised. Consumerization offersproductivity gains and reduction in support costs. However, end point control and the organization’s perimeter arecompromised. This paper presents an overview of considerations for organizations impacted by the megatrend triad and,subsequently, shows how threat modeling techniques can be used to identify, assess, and mitigate the attendant risks.

Citation Information
Jeffrey A. Ingalsbe, Dan Shoemaker and Nancy R. Mead. "Threat Modeling the Cloud Computing, Mobile Device Toting, Consumerized Enterprise – an overview of considerations" (2011)
Available at: http://works.bepress.com/dan_shoemaker/6/