Cloud Computing Threats
Essay Preview: Cloud Computing Threats
Report this essay
Introduction to threats: the technical and operational capability of an adversary to identify and to exploit vulnerabilities. Threats are potentials for vulnerabilities to turn into attacks on computer systems, networks, and more. They can put individuals’ computer systems and business computers at risk, so vulnerabilities have to be fixed so that attackers cannot infiltrate the system and cause damage.Types of threats consists of:Internal threat: A threat originating inside a company, government agency, or institution, and typically an exploit by a disgruntled employee denied promotion or informed of employment termination.Also, an intruder who has successfully penetrated a networks perimeter defenses becomes an internal threat when the intruder attempts to compromise other parts of an organizations network security as a result of gaining access to one system within the network.External threat: individuals outside an organization attempting to gain unauthorized access to an organization’s networks using the Internet, other networks, or dial-up modems. flooding a network with large volumes of access requests so that the network is unable to respond to legitimate requests, one type of denial-of-service attack.Table 1-Catagorization of top threats in cloud environmentThreatsDescriptionTypes(Internal, External)Loss of data integrityData integrity is the maintenance and the assurance of the accuracy and consistency of dataIt dangers loss of data. In [2] and [3] It solved by mapping techniques, map reduce and HadoopInternal threats: A threat originating inside a company, government agency, or institution and External threats : A threat originating inside a company, government agency, or institution.It is internal threats deletion of data without backup and also external threat access the data by unauthorized userDOS attacksDOS attacks is a ‘Denial of services’ is an attempt to make an online service unavailable by overwhelming it with traffic from multiple sources. It deeply described in [3], [4] and [7]Internal threat : NoExternal threats : Yes it relates the external hacker by services areunavailable to legitimateusers.Malicious insiderMalicious insider threats which slow the kernel process and generate inappropriate process. A author has discussed in [4], [7] and [10] these are the major threats and it solved by different techniques e.g. AES(Advance Encryption Algorithm) .Internal threats: Yes it can damage the information by insider.External threats : NoData segregationA data segregation is the principle or policy by which access and storage of a given dataset or sets is segmented. In [6] this mutual trust can be generated by involvement of third party who attest both the customers and cloud providerInternal threat: Yes the information can be damage by separation of data.External threat: NoAuthenticationThe authorization is a process for credentials of users in [6] the authors emphasized the two services provided by TCP are authenticated boot and encryption.Internal threats: Yes the insider may misuse the information by using his authority.External threats: Yes the outsider can access the encrypted password of the users by hacking mechanism Data breachA data breach is a threat in [7], [8] and [10] it is major threat which can potentially view, stolen and used by individual unauthorized to do so. And it solved by RN number techniques and provided the list of guidance.Internal threat: Yes it occurs due toinadequate physical security Procedures.External threat: Yes the hosted data can be stole and misuse.Process riskProcess risk is a threat which relates to the cloud process it can access by the unauthorized usersIn [8] we studied that the service provider should use secure API’sInternal threat: NoExternal threat: Yes the poorly writtenAPIs may become entry point for maliciousoutsiders.Data disposalA data disposal is a threat of data destruction it relates some dangers e.g. data clearing and data overwrite which stored in electronic tapes and hard drives.In [9] it explained in details that how to overcomes from data disposal for using CSF framework.Internal threat: Yes deletion and overwriting of data without backup by employee.External threat: unauthorized access by hacker to organization database.Service layer architectureA service layer architecture in [1] author described the architecture of the cloud computing. Cloud computing is facing many issues and challenges at the current in forms of architecture, security issues and open challenges in adopting cloud computing. Internal threat: Yes the insider disturbed the service layer.External threat: No Issue cyber defenseThis issue was highlighted in a NATO workshop for cyber-attack detections for assessments of mission impacts. As from the name cyber defense of major institutions of a country is very vital because cyber-attacks and proxy wars are a growing threat [5]Internal threat: No External threat: The organization hosting data on cloud may become the victim of cyber theft.
Essay About Loss Of Data Integritydata Integrity And Damage.Types Of Threats
Essay, Pages 1 (757 words)
Latest Update: June 1, 2021
//= get_the_date(); ?>
Views: 98
//= gt_get_post_view(); ?>
Loss Of Data Integritydata Integrity And Damage.Types Of Threats. (June 1, 2021). Retrieved from https://www.freeessays.education/loss-of-data-integritydata-integrity-and-damage-types-of-threats-essay/