Please use this identifier to cite or link to this item:
http://hdl.handle.net/11366/459
DC Field | Value | Language |
---|---|---|
dc.contributor.author | Syynimaa, Nestori | en_US |
dc.date.accessioned | 2016-05-04T06:59:23Z | - |
dc.date.available | 2016-05-04T06:59:23Z | - |
dc.date.issued | 2015 | - |
dc.identifier.issn | 2409-1340 | - |
dc.identifier.uri | http://hdl.handle.net/11366/459 | - |
dc.description.abstract | Office 365 service is widely adopted in Higher Education field all around the world. It is a cloud service provided by Microsoft, including Office applications and services like Exchange Online and SharePoint Online. Although the Office 365 is audited by many external bodies, there have been continuous discussions about the information security of the service. One of the top current security risks of web applications is Security Misconfiguration. This paper introduces some techniques a rogue administrator may use in order to exploit users’ confidential information. Symptoms, detection techniques, forensics, and mitigation techniques of these are also introduced. As a conclusion, it can be argued that the weakest point of Office 365 security is organisation’s on-premise misconfiguration. This paper helps organisation’s security officers and IT administrators auditing their on-premise environment security. | en_US |
dc.language.iso | en | en_US |
dc.publisher | EUNIS | en_US |
dc.relation.ispartof | EUNIS Journal of Higher Education | en_US |
dc.relation.ispartofseries | EUNIS Journal of Higher Education IT - Issue 2015/3; EUNIS2015 Congress Issue; | - |
dc.subject | Office 365 | en_US |
dc.subject | security | en_US |
dc.subject | mitigation | en_US |
dc.subject | risk | en_US |
dc.title | The weakest link of Office 365 security | en_US |
dc.type | Article | en_US |
item.openairecristype | http://purl.org/coar/resource_type/c_18cf | - |
item.grantfulltext | open | - |
item.cerifentitytype | Publications | - |
item.openairetype | Article | - |
item.fulltext | With Fulltext | - |
item.languageiso639-1 | en | - |
Appears in Collections: | Eunis Journal of Higher Education IT (EJHEIT) |
Files in This Item:
File | Description | Size | Format | |
---|---|---|---|---|
EUNIS2015_submission_12.pdf | The weakest link of Office 365 security | 544.49 kB | Adobe PDF | View/Open |
Page view(s) 50
535
checked on Mar 27, 2024
Download(s) 50
355
checked on Mar 27, 2024
Google ScholarTM
Check
Items in DSpace are offered under a CC-BY 4.0 licence unless otherwise indicated