波音游戏-波音娱乐城赌球打不开

III. Exploitation on Cloud Computing

by JUCC ISTF

/* The following article is extracted from the "Information Security Newsletter" published by the JUCC IS Task Force. */

Cloud computing inherits security vulnerabilities from the Internet and makes them more significant when incorporating resource concentration and multi-tenancy sharing approach. Major cloud-specific vulnerabilities include: (1) Economic Denial of Service; (2) Compromise of Service Engine; (3) Interception and Leakage of Data in Transit

Major Vulnerabilities in Cloud Computing Environment

1. Economic Denial of Service (EDoS)

EDoS attempts to consume IT resources maliciously that result in economic damage to their owners. Universities' resources in the cloud can be harmed by the following kinds of EDoS attacks:

 

Identity theft - an attacker hijacks the user accounts of universities' members and uses them for his personal gain or to damage universities economically.

 

Resource Abuse - If effective limits on the usage of paid resources from the cloud service providers, malicious actions can be made by attackers to create unexpected consumption of such resources.

 

Public Channel Attack - Cloud services delivered through public channel, such as metering per HTTP requests, are vulnerable to attacks from the public Internet, such as Disturbed Denial of Service (DDoS).

 

2. Compromise of Service Engine

Cloud architecture relies on a highly specialised platform, the service engine that sits above the physical hardware resources and manages customer resources at different levels of abstraction.

An attacker can compromise the service engine by hacking it from inside a virtual machine (IaaS clouds), the runtime environment (PaaS clouds), the application pool (SaaS clouds), or through its Application Programming Interface (API).

 

3. Interception or Leakage of Data in Transit

Being a distributed architecture based on the Internet technologies, cloud computing implies more data in transit than traditional infrastructures. Data must be transferred between remote web clients of universities and cloud infrastructure to synchronise multiple distributed machine images, images distributed across multiple physical machines. Secured data transmission mechanism like Virtual Private Network (VPN) is not always followed in the cloud context.

Sniffing, spoofing, main-in-the-middle attacks, side channel and replay attacks are potential threat sources that can be used by attackers to exploit this vulnerability.

 

Reference:

http://www.enisa.europa.eu/act/rm/files/deliverables/cloud-computing-risk-assessment/at_download/fullReport


[Previous section] [Next section]

百家乐官网荷| 方形百家乐官网筹码| 利高网上娱乐| 百家乐官网77scs官网| 百家乐庄闲的分布| 百家乐官网新庄| 木棉百家乐的玩法技巧和规则 | 大连百家乐官网食品| 大发888真人娱乐场游戏 | 宝马会百家乐娱乐城| 单双和百家乐官网游戏机厂家| 武汉百家乐赌具| 皇冠网小说网站网址| 百家乐优博u2bet| 大发888娱乐城电脑版下载| 威尼斯人娱乐场色碟| 百家乐官网免费路单| 郑州百家乐的玩法技巧和规则| 打百家乐官网庄闲的技巧| 新濠峰百家乐的玩法技巧和规则| 玩百家乐官网新太阳城| 圆梦城百家乐娱乐城| 宜章县| 澳门百家乐娱乐城打不开| 百家乐官网洗码软件| 大发888真人娱乐场| 百家乐代理在线游戏可信吗网上哪家平台信誉好安全 | 大发888娱乐真钱游戏| 百家乐胜率在哪| 开心8百家乐官网现金网| 德州扑克发牌规则| 百家乐论坛博彩啦| 华盛顿百家乐官网的玩法技巧和规则 | 百家乐官网2万| 大发888作弊| 百家乐官网最新的投注方法| 皇冠娱乐网| 百家乐倍投软件| 香港百家乐官网娱乐场开户注册 | 百家乐赌假的工具| 网上百家乐官网开户送现金|