波音游戏-波音娱乐城赌球打不开

III. Exploitation on Cloud Computing

by JUCC ISTF

/* The following article is extracted from the "Information Security Newsletter" published by the JUCC IS Task Force. */

Cloud computing inherits security vulnerabilities from the Internet and makes them more significant when incorporating resource concentration and multi-tenancy sharing approach. Major cloud-specific vulnerabilities include: (1) Economic Denial of Service; (2) Compromise of Service Engine; (3) Interception and Leakage of Data in Transit

Major Vulnerabilities in Cloud Computing Environment

1. Economic Denial of Service (EDoS)

EDoS attempts to consume IT resources maliciously that result in economic damage to their owners. Universities' resources in the cloud can be harmed by the following kinds of EDoS attacks:

 

Identity theft - an attacker hijacks the user accounts of universities' members and uses them for his personal gain or to damage universities economically.

 

Resource Abuse - If effective limits on the usage of paid resources from the cloud service providers, malicious actions can be made by attackers to create unexpected consumption of such resources.

 

Public Channel Attack - Cloud services delivered through public channel, such as metering per HTTP requests, are vulnerable to attacks from the public Internet, such as Disturbed Denial of Service (DDoS).

 

2. Compromise of Service Engine

Cloud architecture relies on a highly specialised platform, the service engine that sits above the physical hardware resources and manages customer resources at different levels of abstraction.

An attacker can compromise the service engine by hacking it from inside a virtual machine (IaaS clouds), the runtime environment (PaaS clouds), the application pool (SaaS clouds), or through its Application Programming Interface (API).

 

3. Interception or Leakage of Data in Transit

Being a distributed architecture based on the Internet technologies, cloud computing implies more data in transit than traditional infrastructures. Data must be transferred between remote web clients of universities and cloud infrastructure to synchronise multiple distributed machine images, images distributed across multiple physical machines. Secured data transmission mechanism like Virtual Private Network (VPN) is not always followed in the cloud context.

Sniffing, spoofing, main-in-the-middle attacks, side channel and replay attacks are potential threat sources that can be used by attackers to exploit this vulnerability.

 

Reference:

http://www.enisa.europa.eu/act/rm/files/deliverables/cloud-computing-risk-assessment/at_download/fullReport


[Previous section] [Next section]

百家乐连锁| 百家乐高手怎么下注| 优博娱乐在线| 墨尔本百家乐官网的玩法技巧和规则 | 深圳百家乐的玩法技巧和规则| 瑞士百家乐的玩法技巧和规则 | 百家乐风云人物| 博彩娱乐城| 百家乐连线游戏下载| 百家乐官网游戏类型| 百家乐娱乐分析软件v4.0| 赌博百家乐官网经验网| 百家乐轮盘怎么玩| 乐百家国际娱乐城| 什么是百家乐平注法| 百家乐官网最新投注法| 海王星百家乐官网技巧| 至尊国际娱乐| 百家乐微笑不倒| 至尊百家乐官网20130402| bet365备用主页器| 百家乐咨询网址| 澳门百家乐官网会出老千吗| 鸟巢百家乐的玩法技巧和规则| 百家乐官网娱乐优惠| 大发888怎么| 博网百家乐现金网| 百家乐免| 百家乐街机| 可信百家乐官网的玩法技巧和规则 | 百家乐官网前四手下注之观点| ceo娱乐城信誉| 百家乐正品地址| 百家乐官网博赌场娱乐网规则 | A8百家乐娱乐场| 百家乐桌子租| 百家乐投注翻倍方法| 百家乐官网设备电子路| 温州百家乐官网真人网| 娱乐场| 威尼斯人娱乐城活动lm0|