Cloud Computing Attacks

Great Essays
In its beginning, the Internet was much slower than it is today, requiring companies to host their own networks in order to interconnect their computer systems. As the Internet continues to evolve and become faster with each passing year, the ability has emerged for companies to cut costs by offloading their networks to companies who host these services over the Internet. This practice has widely come to be known as Cloud Computing. The benefits of such a service are many, but it does come with its own risks. Those who take advantage of such services are exposed to various attacks utilizing the Internet. These potential attacks include, but are not limited to, web browser attacks, Denial of Service (DoS) attacks, and Man-in-the-Middle attacks. …show more content…
This model allows consumers to simply use the applications provided by their service provider. Dropbox and Google Drive are examples of SaaS. Security-wise, the SaaS provider bears the sole responsibility for security (Sommer et al. 18). The second model offered by providers is Platform-as-a-Service (PaaS). PaaS allows customers to build and run their own applications on the provider’s infrastructure so that they do not have to build and maintain their own infrastructure to host the application. An example of this would be Microsoft Azure. While the provider bears the most burden for security in PaaS, the user must also ensure that the applications they build are secure. The third and final model offered by providers is Infrastructure-as-a-Service (IaaS). IaaS allows consumers some control over the systems, as they are allowed control over operating systems, storage, and deployed applications, as well as some network components, such as host firewalls, in some deployments (Mell et al. 3). Examples of IaaS include Amazon EC2 and Rackspace. In this model, the consumer assumes a larger role in the security of the systems they utilize. Understanding the various models offered by cloud providers and the level of security the user assumes in each, it is now possible to explore the possible attack vectors against cloud computing

Related Documents

  • Great Essays

    Triggered Live Migration 4. Evaluate each course of action a. Integrated Management Software Power Power is very important to effective operation of cloud structures as meting out storage space and capacity. For a smoothly running of a cloud data center managers need up-to-date data of the power consumption and the IT resources. Nowadays, managers use distinct tools to display data server and the power resources.…

    • 1300 Words
    • 6 Pages
    Great Essays
  • Great Essays

    They are INFRASTRUCTURESERVICE AS A SERVICE (IAAS): IaaS layer is used for providing the primary services to the customers. This is also called providing the primary infrastructure which is the provision of hardware components as well as related software i.e.., network, services, Os etc.The customers who uses this delivery model has a small control over the infrastructure of the cloud as payment depends on the usage of services. The security in this services is divided into two main areas namely virtual as well as physical .Virtual environment includes the issues of security at virtual level…

    • 1141 Words
    • 5 Pages
    Great Essays
  • Great Essays

    2.LOAD BALANCING IN CLOUD COMPUTING ENVIRONMENT Load balancing in cloud computing provides an efficient resolution to a variety of issues residing in cloud computing environment set-up and usage. Load balancing must take into account two main tasks, one is the resource provisioning or resource allocation and other is task scheduling in distributed environment. Efficient provisioning of resources and scheduling of resources as well as tasks will ensure: a. Resources are easily available on demand. b.…

    • 1320 Words
    • 6 Pages
    Great Essays
  • Great Essays

    It is imperative to tailor the policy as a way of meeting the needs of the company. Responsibility sharing is one factor that the management of an organization should take into account to ensure effective use of the data systems. An information security policy goes a long way in reducing risks…

    • 1257 Words
    • 6 Pages
    Great Essays
  • Great Essays

    The above shows that the main issue of distributed computing is programs in execution, which are called processes. The second issue is that these processes cooperate or compete in order to provide the requested services. This means that these processes are synchronized. A natural model of distributed computing is the client-server model, which is able to deal with the problems generated by distribution, could be used to describe computation processes and their behavior when providing services to users, and allows design of system and application software for distributed computing systems. Client-server communicates at the virtual (logical) level by exchanging requests and responses.…

    • 1122 Words
    • 5 Pages
    Great Essays
  • Improved Essays

    Effects Of Cybercrime

    • 781 Words
    • 4 Pages

    In this case, the latter refers to the businesses or trade carried out over the internet. Cybercrime affects the free flow of the online companies by hacking systems. It may be in the form of slowing down or denying an individual’s access to the internet, which affects the performance of the internet economy due to lack of transactions for a particular number of people and organizations. In fact, it is estimated that cybercrime causes about $400 billion losses annually (Center for Strategic and International Studies, 2013). It has been noted that cybercriminals thrive in their trade by ceasing the opportunity arising from the rising number of internet users and low barriers to market entry.…

    • 781 Words
    • 4 Pages
    Improved Essays
  • Improved Essays

    Assets can be physical or logical like datacenters, desktops, remote systems, network devices, systems that process, manage, and store personal information. This is done by documentation review, interviews with business managers, and technical experts. Evaluate importance of the assets – After assets are identified, certain value needs to be assign to them in terms of how much business impact those assets have. After the value is determined, data needs to be classified by importance, which would further impact risk reduction plan. Further Vulnerabilities need to be identified.…

    • 980 Words
    • 4 Pages
    Improved Essays
  • Superior Essays

    Command Prompt

    • 1077 Words
    • 5 Pages

    Automation could be employed to move critical files to an alternate location for safe storage. The alternate location could then be backed up to tape or some other type of long term storage media. Effective file management must include a definition of what is critical to be backed up, and what is not (Needleman, 2015). Conclusion File management is one of the most important aspects of an information technology function within a business. Files are produced for a reason, and the files must be managed and secured effectively.…

    • 1077 Words
    • 5 Pages
    Superior Essays
  • Superior Essays

    ERP Implementation Best Practices ERP (Enterprise Resource Planning) refers to the automation and the integration of the core business of a company to assist it in focusing on effectiveness and success. Its business software is designed and used to record and manage the enterprise data of a corporation. The software integrates various core processes in business such as taking orders from customers, keeping financial data, making inventory records and scheduling operations. Due to its importance in ensuring significant improvements in realizing effectiveness by organizations there is a need to ensure that the best practices are exercised to ensure the benefits are met. There are various practices that are necessary for ERP to be useful.…

    • 1233 Words
    • 5 Pages
    Superior Essays
  • Great Essays

    Therefore, enterprises are advised to start from the strategic selection before all technical and designing process while conducting system development methodology (Markus, Tanis and van Fenema, 2000). Such an information blueprint of the enterprise, with focal points of organisation design and software design, requires carefully selecting suitable ERP vendors and specifically tailored software modules. But not only the ERP vendors, but also the offered software modules can be varied (Gibson, Holland and Light, 1999). In order to solve the posing selection troubles, the selection phase in ERP system development methodology is unavoidable. During this phase, the enterprise not only have to defining the project boundaries, but also have to evaluate system vendors and their offered ERP software modules in order to locate the most suitable software solution to the system.…

    • 1213 Words
    • 5 Pages
    Great Essays