Please use this identifier to cite or link to this item:
Title: The weakest link of Office 365 security
Authors: Syynimaa, Nestori ItemCrisRefDisplayStrategy.rp.deleted.icon
Keywords: Office 365;security;mitigation;risk
Issue Date: 2015
Publisher: EUNIS
Journal: EUNIS Journal of Higher Education
Series/Report no.: EUNIS Journal of Higher Education IT - Issue 2015/3; EUNIS2015 Congress Issue;
Office 365 service is widely adopted in Higher Education field all around the world. It is a cloud service provided by Microsoft, including Office applications and services like Exchange Online and SharePoint Online. Although the Office 365 is audited by many external bodies, there have been continuous discussions about the information security of the service.
One of the top current security risks of web applications is Security Misconfiguration. This paper introduces some techniques a rogue administrator may use in order to exploit users’ confidential information. Symptoms, detection techniques, forensics, and mitigation techniques of these are also introduced. As a conclusion, it can be argued that the weakest point of Office 365 security is organisation’s on-premise misconfiguration. This paper helps organisation’s security officers and IT administrators auditing their on-premise environment security.
ISSN: 2409-1340
Appears in Collections:Eunis Journal of Higher Education IT (EJHEIT)

Files in This Item:
File Description SizeFormat
EUNIS2015_submission_12.pdfThe weakest link of Office 365 security544.49 kBAdobe PDFView/Open
Show full item record

Page view(s) 50

Last Week
Last month
checked on Aug 13, 2020

Download(s) 50

checked on Aug 13, 2020

Google ScholarTM


Items in DSpace are offered under a CC-BY 4.0 licence unless otherwise indicated