Wednesday, May 6, 2020

Increasing Attacks on Cloud Platforms - 1300 Words

STUDENT NUMBER: 066275 CLOUD COMPUTING SECURITY TERM PAPER TWO Living with Increasing Attacks on Cloud Computing Platforms Cloud Computing is an on demand, flexible and cost friendly delivery platform that has provided IT consumers and organizations services such as networks, storage, servers and applications over the Internet. Its importance is increasing as a large number of industrial and technological communities are rapidly adopting it. The benefits such as low cost and convenience of cloud computing services have significantly changed our day to days activities, however, there are numerous security issues facing cloud computing making it difficult to maintain data security and privacy, support data and service availability and†¦show more content†¦Flooding attacks are also performed by hackers where they send numerous bogus offers and request for help to a target machine rendering services blocked from users trying to access them. The two types of attacks that would result from flooding attack in cloud include direct DoS and indirect DoS. When a cloud server receives a large volume of flooded requests, it will provide more computational resources to cope with the malicious requests. The server then exhausts its full capability and a direct DoS is occurred to all requests from users. However, the flood attack could possibly cause indirect DoS to other servers in the same cloud when the servers share the wor kload of the targeted server, which results a full lack of availability on all of the services. Cloud Security Attacks Web-based applications enable users to access application servers via web pages of web browsers. Wrapping attacks and malware injection attack is one of the various web-based attacks where an attacker exploits the vulnerabilities in a web application and attach malicious codes into it resulting to a variation in its proper execution. Cloud computing systems are also susceptible to malware injection attacks. The attacker develops a malicious program or application and inject them into target cloud service model such as SaaS, PaaS or IaaS. Once the injection is successful, the malicious module is executed as one of the valid instances running in the cloud; then, the hacker can doShow MoreRelatedThe Problem Of Cloud Technology1211 Words   |  5 Pages1. Introduction Cloud technology is attracting increasing attention from industry and scientific areas. It has been treated as one of the most important technologies and shown promising future. Cloud is the technology to provide a quick, secure, convenient net computing and data storage service and implemented over the Internet, which is capable of sharing a pool of configurable computing resources with on-demand network access. Cloud technology provides various specific services such as softwareRead MoreThe Security Of Cloud Computing1395 Words   |  6 Pagescomputing and what are the potential security issues, I will be covering topics such as why would a company use cloud computing and how could computing is beneficial for an organisation. I will also look into the security of cloud computing. I will then go on to discuss what is being done to combat these issues, touching on the policies used by Netflix, Sony and Apple. Technical usage of the term cloud computing is the description of distributed systems, the running of a single instance of an applicationRead MoreThe Impact Of Media On Social Media1487 Words   |  6 Pagesnumber of photos and videos being shared across the social media has been ever increasing. There has been a lot of research on social media and privacy implications of sharing photos and videos on it. Privacy implications of cloud-based storage need to be researched further as the current literature on this is clearly not sufficient. Increasingly, many are storing their own private photos and videos in the cloud. Such cloud storages offer convenient backup features and allow users to access their dataRead MoreThe Cloud Of Cloud Computing1464 Words   |  6 PagesCloud Computing is one of the most popular computing technology. It allows organizations to use resources like hardware, software and IT applications as a service through the internet or web without physically holding th ese resources internally. So, organization need not worry about the maintenance of these resources. These cloud applications and services can be accessed not only by PCs but also using mobile devices, such as smart phones and tablets (Dutta, Peng, Choudhary, 2013). Furthermore,Read MoreTop Threat : Denial Of Service1081 Words   |  5 Pages5.0 Top Threat: Denial of Service Simply put, denial-of-service attacks are attacks meant to prevent users of a cloud service from being able to access their data or their applications. By forcing the victim cloud service to consume inordinate amounts of finite system resources such as processor power, memory, disk space or network bandwidth, the attacker (or attackers, as is the case in distributed denial-of- service (DDoS) attacks) causes an intolerable system slowdown and leaves all of the legitimateRead MoreAnalysis Of Virtualization Issues And Security Enhancement Strategies For Cloud Computing1563 Words   |  7 PagesAnalysis of Virtualization Issues and Security Enhancement Strategies for Cloud Computing Rajagomathi Athisankaranarayanan Department of Electrical and Computer Engineering, Colorado State University, Fort Collins. shankar_krithika@yahoo.com Abstract—Cloud Computing is a shared Information Technology infrastructure in which computing resources are shared among several systems that are connected together, using a network of servers. This type of resource sharing is facilitated by the VirtualizationRead MoreCyber Threats And The Cyber Threat1640 Words   |  7 PagesSince the â€Å"Morris† worm in the 1980’s cyber threat has grown from isolated incidents to high profile attacks on major government and private organizations. Cyber threats can be classified broadly into three distinct areas – ï‚ · Cyber crime – intentional attacks carried out by individuals or groups of individuals with specific objectives of acquiring money, data or causing disruption. ï‚ · Cyber war – an attack conducted by a nation against another nation with the objective to cause disruption or obtain confidentialRead MoreCloud Computing Case Study1423 Words   |  6 PagesCloud computing is a computing model which is widely applied and is one of the most recent terms in the computing industry. The cloud allows for outsourcing of computing infrastructures for storing data and applications of which are remotely accessible by a server. Cloud computing can be referred to network-based hosting of programs in a way that users are not expected to update software/hardware or purchase updated versions. Clouds allow on-demand delivery of software, hardware and data servicesRead MoreCloud Computing And Its Impact On Business Technology1425 Words   |  6 Pages Though the actual history of cloud computing is not that old (the first business and consumer cloud computing services websites – salesforce.com and Google, were launched in 1999), its story is tied directly to the development of the Internet and business technology, since cloud computing is the solution to the problem of how the Internet can help improve business technology. Business technology has a long and fascinating history, one that is almost as long as business itself, but the developmentsRead MoreVirtual Machine Intrusions939 Words   |  4 PagesThe technique can detect DDoS attacks as well and blocking complete botnets (Amna Riaz 2017). However, NIDS is going to face issues processing all packets in large virtual network and it may fail to detect attacks in time as SNORT is single threaded. Another solution that has been studied is Virtual Machine Introspection (VMI) based technique (Amna Riaz 2017). Virtual machine introspection (VMI) is the main idea behind out-of-box intrusion detection. VMI is a technique of inspecting VM state by

No comments:

Post a Comment

Note: Only a member of this blog may post a comment.