Question

In: Computer Science

1. Explain the common security threat concept in the cloud. [Hint : chapter 9] Cloud Computing,...

1. Explain the common security threat concept in the cloud.

[Hint : chapter 9] Cloud Computing, Kris Jamsa, 2013, Johns & Bartlett Learning, ISBN: 978-1- 4496-4739-1

Solutions

Expert Solution

Cloud security is the protection of data stored online via cloud computing plateforms against theft,leakage and deletion.

The common security threats in cloud are following:

  1. Data Storage Wiping: Cloud based data stroage provider may share a stroage device across multiple customers, and suppose you store a important file in the cloud, later you delete that file, but what happens that normally when file system delete a file on disk the file system marks the location within which the file resided as avilable for use to store other file. Assume that another person come along and allocate space on the disk, but doesnot write any information to the space, the customer may have access to your previously deleted confidential file.
  2. Distributed Denial-of-Service Attacks: A distributed denial of serive attack uses multiple computers distributed across the internet to attack the target site. And the goal of which is to consume system resources so that the resources cannot be used by the site's user.
  3. Packet Sniffing: Packet sniffing is a form of network attack that allows an attacker access to files and information. This is accomplished by turning off the filter that stops host machines connected to the network from seeing data traffic sent to other machines. This enables the attacker to view all data traffic over the network. This particular kind of attack can be implemented locally, on the server, or on a router that is connected to the network.
  4. Man in the Middle Attacks: A man-in-the-middle attack is when an attacker intercepts communications between two parties either to secretly eavesdrop or modify traffic traveling between the two. Attackers might use MitM attacks to steal login credentials or personal information, spy on the victim, or sabotage communications or corrupt data. Because cloud based solutions rely on user communication across the internet the solutions are at risk for man in middle.

Related Solutions

Explain the disaster recovery plan for AWS cloud. [Hint : chapter 10] Cloud Computing, Kris Jamsa,...
Explain the disaster recovery plan for AWS cloud. [Hint : chapter 10] Cloud Computing, Kris Jamsa, 2013, Johns & Bartlett Learning, ISBN: 978-1- 4496-4739-1
A research project focused on developing a security policy for the use of cloud computing and...
A research project focused on developing a security policy for the use of cloud computing and mobile devices in a selected business environment. Developing a security policy for the use of cloud computing and mobile devices. A summary that would be appropriate to give your manager so that he/she would know the essence of your project. • Description of the business environment. • Compliance or other regulatory requirements under which this business operates. • Description of the specific cloud service...
write a research paper on DATA SECURITY IN MULTI-TENANT CLOUD COMPUTING?
write a research paper on DATA SECURITY IN MULTI-TENANT CLOUD COMPUTING?  
Some authors make the assertion that there are no new security issues with cloud computing at...
Some authors make the assertion that there are no new security issues with cloud computing at a network-, host-, or application-level. They maintain that cloud computing may exacerbate existing issues, but that cloud computing does not present new security issues. Do you agree with that assertion? Explain security issues with cloud computing. Include how they differ from privacy issues. How are organizations and CSPs overcoming those issue? Use examples and references to support your answer. Provide at least one reference...
1. Define the terms internal security threat and external security threat. Provide examples of each. 2....
1. Define the terms internal security threat and external security threat. Provide examples of each. 2. Describe the role of the HIM professional after medical identity theft has been discovered. 3. Discuss access controls such as authentication, termination of access, and remote access control. 4. Identify security threats that can occur during the electronic transmission of data. How could these be mitigated by policies and procedures? 5. Describe the role of the HIM professional in contingency planning.
The Cloud Effect" Please respond to the following: 1. Many firms are relying on cloud computing,...
The Cloud Effect" Please respond to the following: 1. Many firms are relying on cloud computing, also known as “the cloud,” to perform key business functions. By moving transactional processing to the cloud, firms are exposing themselves to additional attacks as well as to tighter scrutiny from regulators and stakeholders. From the e-Activity, assume that you are the CFO of Amazon.com. Create an argument indicating how your firm will be able to balance the needs of security with the desire...
1. Please compare “Cloud Computing” with “Cloud Storage” and the integral parts used in both, and...
1. Please compare “Cloud Computing” with “Cloud Storage” and the integral parts used in both, and provide examples. 2. What is social network & it's influence on today's society? Give examples of social network..
The Cloud Effect" Please respond to the following 1. Many firms are relying on cloud computing,...
The Cloud Effect" Please respond to the following 1. Many firms are relying on cloud computing, also known as “the cloud,” to perform key business functions. By moving transactional processing to the cloud, firms are exposing themselves to additional attacks as well as to tighter scrutiny from regulators and stakeholders. From the e-Activity, assume that you are the CFO of Amazon.com. Create an argument indicating how your firm will be able to balance the needs of security with the desire...
1) Privacy/Security 2) Deployment 3) Heterogenous computig(cloud, distributed computing) is these challenges still exist today and...
1) Privacy/Security 2) Deployment 3) Heterogenous computig(cloud, distributed computing) is these challenges still exist today and is there any other challanges exist also ? It is related to issues with computer and cloud computing
Cloud Computing In your chapter 5 reading assignment, you will learn all about the components of...
Cloud Computing In your chapter 5 reading assignment, you will learn all about the components of a traditional information technology infrastructure. This includes all the equipment, beyond your desktop or laptop computer, which allows you to communicate and share information with others. Some of this equipment includes cables, servers, network devices, telecommunications lines, data storage systems, and other devices. Many of these components are usually found behind the scenes in a data center. There has been a developing trend in...
ADVERTISEMENT
ADVERTISEMENT
ADVERTISEMENT