百家乐怎么玩-澳门百家乐官网娱乐城网址_网上百家乐是不是真的_全讯网888 (中国)·官方网站

III. Exploitation on Cloud Computing

by JUCC ISTF

/* The following article is extracted from the "Information Security Newsletter" published by the JUCC IS Task Force. */

Cloud computing inherits security vulnerabilities from the Internet and makes them more significant when incorporating resource concentration and multi-tenancy sharing approach. Major cloud-specific vulnerabilities include: (1) Economic Denial of Service; (2) Compromise of Service Engine; (3) Interception and Leakage of Data in Transit

Major Vulnerabilities in Cloud Computing Environment

1. Economic Denial of Service (EDoS)

EDoS attempts to consume IT resources maliciously that result in economic damage to their owners. Universities' resources in the cloud can be harmed by the following kinds of EDoS attacks:

 

Identity theft - an attacker hijacks the user accounts of universities' members and uses them for his personal gain or to damage universities economically.

 

Resource Abuse - If effective limits on the usage of paid resources from the cloud service providers, malicious actions can be made by attackers to create unexpected consumption of such resources.

 

Public Channel Attack - Cloud services delivered through public channel, such as metering per HTTP requests, are vulnerable to attacks from the public Internet, such as Disturbed Denial of Service (DDoS).

 

2. Compromise of Service Engine

Cloud architecture relies on a highly specialised platform, the service engine that sits above the physical hardware resources and manages customer resources at different levels of abstraction.

An attacker can compromise the service engine by hacking it from inside a virtual machine (IaaS clouds), the runtime environment (PaaS clouds), the application pool (SaaS clouds), or through its Application Programming Interface (API).

 

3. Interception or Leakage of Data in Transit

Being a distributed architecture based on the Internet technologies, cloud computing implies more data in transit than traditional infrastructures. Data must be transferred between remote web clients of universities and cloud infrastructure to synchronise multiple distributed machine images, images distributed across multiple physical machines. Secured data transmission mechanism like Virtual Private Network (VPN) is not always followed in the cloud context.

Sniffing, spoofing, main-in-the-middle attacks, side channel and replay attacks are potential threat sources that can be used by attackers to exploit this vulnerability.

 

Reference:

http://www.enisa.europa.eu/act/rm/files/deliverables/cloud-computing-risk-assessment/at_download/fullReport


[Previous section] [Next section]

皇冠正网开户| 太阳城娱乐| 涂山百家乐的玩法技巧和规则| 大发888注册官方网站| 易博全讯网| 金博士百家乐官网娱乐城| 百家乐不倒翁注码| 广州太阳城大酒店| 瑞昌市| 新百家乐官网.百万筹码| 百家乐娱乐城返水| 德州扑克下载| 百家乐官网大眼仔小路| 玩百家乐官网新2娱乐城| 真人百家乐现金游戏| 棋牌类单机游戏下载| 澳门档百家乐官网的玩法技巧和规则| 网上百家乐真坑人| 网上娱乐城排名| 百家乐官网翻天粤语下载| 澳门百家乐群官网| 亲朋棋牌大厅下载| 闲和庄百家乐官网的玩法技巧和规则 | 墨尔本百家乐官网的玩法技巧和规则| 百家乐秘| 智尊娱乐| 如何胜百家乐官网的玩法技巧和规则| 威尼斯人娱乐城 线路畅通中心| 杭州市| 七胜百家乐娱乐城总统网上娱乐城大都会娱乐城赌场 | 巴黎人百家乐官网的玩法技巧和规则 | 皇冠网小说推荐| 三亚百家乐官网的玩法技巧和规则| 百家乐开户过的路纸| 百家乐官网赢钱海立方| 星河百家乐现金网| 大发888官网 ylc8| 什么百家乐官网平注法| 百家乐送18元彩金| 百家乐官网的必胜方法| 澳门百家乐真人娱乐场|