百家乐怎么玩-澳门百家乐官网娱乐城网址_网上百家乐是不是真的_全讯网888 (中国)·官方网站

III. Exploitation on Cloud Computing

by JUCC ISTF

/* The following article is extracted from the "Information Security Newsletter" published by the JUCC IS Task Force. */

Cloud computing inherits security vulnerabilities from the Internet and makes them more significant when incorporating resource concentration and multi-tenancy sharing approach. Major cloud-specific vulnerabilities include: (1) Economic Denial of Service; (2) Compromise of Service Engine; (3) Interception and Leakage of Data in Transit

Major Vulnerabilities in Cloud Computing Environment

1. Economic Denial of Service (EDoS)

EDoS attempts to consume IT resources maliciously that result in economic damage to their owners. Universities' resources in the cloud can be harmed by the following kinds of EDoS attacks:

 

Identity theft - an attacker hijacks the user accounts of universities' members and uses them for his personal gain or to damage universities economically.

 

Resource Abuse - If effective limits on the usage of paid resources from the cloud service providers, malicious actions can be made by attackers to create unexpected consumption of such resources.

 

Public Channel Attack - Cloud services delivered through public channel, such as metering per HTTP requests, are vulnerable to attacks from the public Internet, such as Disturbed Denial of Service (DDoS).

 

2. Compromise of Service Engine

Cloud architecture relies on a highly specialised platform, the service engine that sits above the physical hardware resources and manages customer resources at different levels of abstraction.

An attacker can compromise the service engine by hacking it from inside a virtual machine (IaaS clouds), the runtime environment (PaaS clouds), the application pool (SaaS clouds), or through its Application Programming Interface (API).

 

3. Interception or Leakage of Data in Transit

Being a distributed architecture based on the Internet technologies, cloud computing implies more data in transit than traditional infrastructures. Data must be transferred between remote web clients of universities and cloud infrastructure to synchronise multiple distributed machine images, images distributed across multiple physical machines. Secured data transmission mechanism like Virtual Private Network (VPN) is not always followed in the cloud context.

Sniffing, spoofing, main-in-the-middle attacks, side channel and replay attacks are potential threat sources that can be used by attackers to exploit this vulnerability.

 

Reference:

http://www.enisa.europa.eu/act/rm/files/deliverables/cloud-computing-risk-assessment/at_download/fullReport


[Previous section] [Next section]

百家乐官网赌博代理荐| 百家乐官网靠什么赢| 高楼24层风水好吗| 百家乐怎么骗人| 彰武县| 百家乐平台有什么优势| 澳门赌百家乐心法| 网上百家乐官网有假的吗| 百家乐博彩公| 百家乐官网破解软件真的有用吗| 大发888bet下载| 百家乐平台要多少钱| 澳门百家乐官网规则| 大发888娱乐城注册| 属虎与属鼠做生意好吗| 真人百家乐官网信誉| 百家乐网上投注文章| 宝格丽百家乐官网娱乐城| 大连娱网棋牌步步为赢| 百家乐做庄家必赢诀窍| 百家乐官网长龙技巧| 大洼县| 235棋牌游戏| 盐城百家乐的玩法技巧和规则| 乐中百家乐官网的玩法技巧和规则| 滨海县| 德州扑克 规则| 名人百家乐的玩法技巧和规则| 求购百家乐程序| 百家乐官网博彩网排名| 戰神国际娱乐城| 百家乐怎么稳赢| 最好的百家乐投注| 欢乐博百家乐官网娱乐城| 百家乐官网路单网下载| 必盛国际| 威尼斯人娱乐城游戏lm0| 百家乐园云鼎赌场娱乐网规则 | 大发888娱乐城都有啥扑克牌游戏| 澳门百家乐官网赌技巧| e世博百家乐官网娱乐场|