波音游戏源码-波音博彩公司评级_百家乐园天将_新全讯网3344111.c(中国)·官方网站

III. Exploitation on Cloud Computing

by JUCC ISTF

/* The following article is extracted from the "Information Security Newsletter" published by the JUCC IS Task Force. */

Cloud computing inherits security vulnerabilities from the Internet and makes them more significant when incorporating resource concentration and multi-tenancy sharing approach. Major cloud-specific vulnerabilities include: (1) Economic Denial of Service; (2) Compromise of Service Engine; (3) Interception and Leakage of Data in Transit

Major Vulnerabilities in Cloud Computing Environment

1. Economic Denial of Service (EDoS)

EDoS attempts to consume IT resources maliciously that result in economic damage to their owners. Universities' resources in the cloud can be harmed by the following kinds of EDoS attacks:

 

Identity theft - an attacker hijacks the user accounts of universities' members and uses them for his personal gain or to damage universities economically.

 

Resource Abuse - If effective limits on the usage of paid resources from the cloud service providers, malicious actions can be made by attackers to create unexpected consumption of such resources.

 

Public Channel Attack - Cloud services delivered through public channel, such as metering per HTTP requests, are vulnerable to attacks from the public Internet, such as Disturbed Denial of Service (DDoS).

 

2. Compromise of Service Engine

Cloud architecture relies on a highly specialised platform, the service engine that sits above the physical hardware resources and manages customer resources at different levels of abstraction.

An attacker can compromise the service engine by hacking it from inside a virtual machine (IaaS clouds), the runtime environment (PaaS clouds), the application pool (SaaS clouds), or through its Application Programming Interface (API).

 

3. Interception or Leakage of Data in Transit

Being a distributed architecture based on the Internet technologies, cloud computing implies more data in transit than traditional infrastructures. Data must be transferred between remote web clients of universities and cloud infrastructure to synchronise multiple distributed machine images, images distributed across multiple physical machines. Secured data transmission mechanism like Virtual Private Network (VPN) is not always followed in the cloud context.

Sniffing, spoofing, main-in-the-middle attacks, side channel and replay attacks are potential threat sources that can be used by attackers to exploit this vulnerability.

 

Reference:

http://www.enisa.europa.eu/act/rm/files/deliverables/cloud-computing-risk-assessment/at_download/fullReport


[Previous section] [Next section]

太阳城百家乐客户端| 大发888娱乐场and| 百家乐网站赌博| 普格县| 云赢百家乐分析| 赌博百家乐官网弱点| 大发888真钱游戏平台| 百家乐官网庄闲出现几| 皇冠赌球| 连环百家乐怎么玩| 娱乐城百家乐官网送白菜| 大发888 58| 百家乐开户最快的平台是哪家| 足球赌博网站| 叶氏百家乐平注技巧| 百家乐官网博彩平台| 波克棋牌游戏大厅| 搓牌百家乐技巧| 百家乐官网娱乐平台网77scs| 大发888娱乐城客户端| 阳宅64卦与24山| E乐博百家乐官网现金网| 大发888wf娱乐场下载| 百家乐任你博娱乐场开户注册| 澳门百家乐官网群代理| SHOW| 总统娱乐城能赢钱吗| V博百家乐的玩法技巧和规则 | 大发888玩法技巧| 百家乐出千手法| 去澳门百家乐官网的玩法技巧和规则 | 大上海百家乐官网的玩法技巧和规则 | 大发888常见断续| 香港百家乐马书| 百家乐手机投注平台| 电脑百家乐官网的玩法技巧和规则| 百家乐官网保单详图| 大发888 dafa888游戏| 淘宝博百家乐的玩法技巧和规则 | 皇冠开户娱乐网| 大发888赌城|