Search the World's Largest Database of Information Science & Technology Terms & Definitions
InfInfoScipedia LogoScipedia
A Free Service of IGI Global Publishing House
Below please find a list of definitions for the term that
you selected from multiple scholarly research resources.

What is Robust Identity

Emerging Technologies and Security in Cloud Computing
Robust identity typically refers to a strong and secure way of verifying the identity of users or entities accessing a system or network. It involves authentication methods that are difficult to forge or compromise, such as multi-factor authentication (MFA) and biometric authentication, to ensure that only authorized individuals or processes gain access to resources.
Published in Chapter:
Cloud Security Risks, Threats, and Solutions for Business Logistics
Shrikant Tiwari (Galgotias University, India), Ramesh S. Wadawadagi (Nagarjuna College of Engineering, India), Arun Kumar Singh (Greater Noida Institute of Technology, India), and Virendra Kumar Verma (Institute of Engineering and Rural Technology (IERT), Prayagraj, India)
Copyright: © 2024 |Pages: 35
DOI: 10.4018/979-8-3693-2081-5.ch006
Abstract
Cloud computing has revolutionized the landscape of modern business logistics by offering scalable and cost-effective solutions for data storage, processing, and application deployment. However, with this newfound convenience comes a plethora of security challenges that businesses must address to protect their valuable assets and sensitive information. This chapter aims to provide a comprehensive overview of the security risks and threats associated with cloud adoption in the logistics industry, along with effective solutions to mitigate them by presenting an in-depth analysis of the primary security risks that businesses may encounter when leveraging cloud-based logistics solutions. Additionally, it discusses the risks posed by shared infrastructure, third-party integrations, and data jurisdiction concerns. Moreover, the chapter highlights the growing role of emerging technologies in bolstering cloud security measures. These technologies offer sophisticated threat detection and proactive response capabilities, enabling logistics companies to stay ahead of evolving cyber threats.
Full Text Chapter Download: US $37.50 Add to Cart
eContent Pro Discount Banner
InfoSci OnDemandECP Editorial ServicesAGOSR