December 18, 2015
      
                  
        
  Author(s)
  Michaela  Iorga,   Anil  Karmel
 
       
            
    
    
        The article focuses on the tier 3 security risks related to the operation and use of cloud-based information systems. To prevent and mitigate any threats, adverse actions, service disruptions, attacks, or compromises, organizations need to quantify their