波音游戏-波音娱乐城赌球打不开

III. Exploitation on Cloud Computing

by JUCC ISTF

/* The following article is extracted from the "Information Security Newsletter" published by the JUCC IS Task Force. */

Cloud computing inherits security vulnerabilities from the Internet and makes them more significant when incorporating resource concentration and multi-tenancy sharing approach. Major cloud-specific vulnerabilities include: (1) Economic Denial of Service; (2) Compromise of Service Engine; (3) Interception and Leakage of Data in Transit

Major Vulnerabilities in Cloud Computing Environment

1. Economic Denial of Service (EDoS)

EDoS attempts to consume IT resources maliciously that result in economic damage to their owners. Universities' resources in the cloud can be harmed by the following kinds of EDoS attacks:

 

Identity theft - an attacker hijacks the user accounts of universities' members and uses them for his personal gain or to damage universities economically.

 

Resource Abuse - If effective limits on the usage of paid resources from the cloud service providers, malicious actions can be made by attackers to create unexpected consumption of such resources.

 

Public Channel Attack - Cloud services delivered through public channel, such as metering per HTTP requests, are vulnerable to attacks from the public Internet, such as Disturbed Denial of Service (DDoS).

 

2. Compromise of Service Engine

Cloud architecture relies on a highly specialised platform, the service engine that sits above the physical hardware resources and manages customer resources at different levels of abstraction.

An attacker can compromise the service engine by hacking it from inside a virtual machine (IaaS clouds), the runtime environment (PaaS clouds), the application pool (SaaS clouds), or through its Application Programming Interface (API).

 

3. Interception or Leakage of Data in Transit

Being a distributed architecture based on the Internet technologies, cloud computing implies more data in transit than traditional infrastructures. Data must be transferred between remote web clients of universities and cloud infrastructure to synchronise multiple distributed machine images, images distributed across multiple physical machines. Secured data transmission mechanism like Virtual Private Network (VPN) is not always followed in the cloud context.

Sniffing, spoofing, main-in-the-middle attacks, side channel and replay attacks are potential threat sources that can be used by attackers to exploit this vulnerability.

 

Reference:

http://www.enisa.europa.eu/act/rm/files/deliverables/cloud-computing-risk-assessment/at_download/fullReport


[Previous section] [Next section]

星际百家乐娱乐城| 百家乐号解码器| 免费百家乐官网追号| 莆田棋牌游戏下载| 真人百家乐网西陆| 澳门百家乐官网园游戏| 百盛百家乐的玩法技巧和规则 | 博彩通评价| 真人百家乐赢钱| 百家乐官网精神| bet365备用bd| 伯爵百家乐娱乐网| 百家乐官网送18元彩金| 南城县| 大发888娱乐场下载 制度| 自贡百家乐官网赌| 百家乐官网冯耕耘打法| 欢乐谷娱乐城官网| 百家乐视频画面| 百家乐官网娱乐平台真钱游戏| 百家乐官网发牌千数| 大发888手机版客户端| 永利高百家乐开户| 百家乐官网博彩平台| 366娱乐城| 永利赌场| 战神百家乐的玩法技巧和规则| 百家乐视频下栽| 百家乐官网网上玩法| 永利高百家乐官网进不去| 威尼斯人娱乐城网上赌场 | 大发888体育真人| 太原百家乐招聘| 赌百家乐的心得体会| 24山九宫飞星详解| 百家乐官网心术| 百家乐官网哪家有优惠| 乐百家国际娱乐城| 娱乐城网| 网上博彩网址| 香港六合彩图库|