波音游戏-波音娱乐城赌球打不开

III. Exploitation on Cloud Computing

by JUCC ISTF

/* The following article is extracted from the "Information Security Newsletter" published by the JUCC IS Task Force. */

Cloud computing inherits security vulnerabilities from the Internet and makes them more significant when incorporating resource concentration and multi-tenancy sharing approach. Major cloud-specific vulnerabilities include: (1) Economic Denial of Service; (2) Compromise of Service Engine; (3) Interception and Leakage of Data in Transit

Major Vulnerabilities in Cloud Computing Environment

1. Economic Denial of Service (EDoS)

EDoS attempts to consume IT resources maliciously that result in economic damage to their owners. Universities' resources in the cloud can be harmed by the following kinds of EDoS attacks:

 

Identity theft - an attacker hijacks the user accounts of universities' members and uses them for his personal gain or to damage universities economically.

 

Resource Abuse - If effective limits on the usage of paid resources from the cloud service providers, malicious actions can be made by attackers to create unexpected consumption of such resources.

 

Public Channel Attack - Cloud services delivered through public channel, such as metering per HTTP requests, are vulnerable to attacks from the public Internet, such as Disturbed Denial of Service (DDoS).

 

2. Compromise of Service Engine

Cloud architecture relies on a highly specialised platform, the service engine that sits above the physical hardware resources and manages customer resources at different levels of abstraction.

An attacker can compromise the service engine by hacking it from inside a virtual machine (IaaS clouds), the runtime environment (PaaS clouds), the application pool (SaaS clouds), or through its Application Programming Interface (API).

 

3. Interception or Leakage of Data in Transit

Being a distributed architecture based on the Internet technologies, cloud computing implies more data in transit than traditional infrastructures. Data must be transferred between remote web clients of universities and cloud infrastructure to synchronise multiple distributed machine images, images distributed across multiple physical machines. Secured data transmission mechanism like Virtual Private Network (VPN) is not always followed in the cloud context.

Sniffing, spoofing, main-in-the-middle attacks, side channel and replay attacks are potential threat sources that can be used by attackers to exploit this vulnerability.

 

Reference:

http://www.enisa.europa.eu/act/rm/files/deliverables/cloud-computing-risk-assessment/at_download/fullReport


[Previous section] [Next section]

利来娱乐开户| 百家乐官网庄闲和赢率| 赤城县| 大发888pt| 互联网百家乐的玩法技巧和规则| 百家乐视频百家乐| 新澳门百家乐官网软件下载 | 松桃| 有钱人百家乐的玩法技巧和规则 | 将军百家乐的玩法技巧和规则| 百家乐概率怎么算| 百家乐保单详图| 百家乐官网庄闲预测| 百家乐官网技巧公司| 百家乐官网上分器定位器| 太子娛樂城网址| 中国百家乐官网澳门真人娱乐平台网址| 百家乐官网庄闲点数| 百家乐官网投资心得| 太阳城百家乐杀猪吗| 大发888娱乐城qq服务| 百家乐赌术揭秘| 百家乐有免费玩| 百家乐官网倍投软件| 百家乐视频双扣下载| 麻将百家乐筹码| 新天地百家乐的玩法技巧和规则| 索雷尔百家乐的玩法技巧和规则| 威尼斯人娱乐城信誉怎样| 百家乐的如何玩| 澳门百家乐秘积| 百家乐连锁| 云顶国际| 百家乐官网游戏机论坛| 星河百家乐官网现金网| 米其林百家乐的玩法技巧和规则 | 莆田棋牌游戏| 百家乐官网桌德州扑克桌| 水晶百家乐筹码| 百家乐官网稳赢技法| 百家乐斗视频游戏|