Question

In: Computer Science

1. Describe four cloud-specific security threats. 2. Are there any advantages in not including the MAC...

1. Describe four cloud-specific security threats.

2. Are there any advantages in not including the MAC in the scope of the packet encryption in SSH?

Solutions

Expert Solution

Cloud-specific security threats

1. Data Breaches :

Data breaching is the process of exposing the confidential or protected information. This can happen by either by stealing the bank account ,credit card details or even by stolen email. In-order to prevent data breaching one must use secure websites, create strong and secure passwords using a combination of upper case ,lower case and special characters, use different passwords for different accounts and also keep the system and applications updated with the latest versions.

2. Data Loss with no backup

Data loss is the process where data is lost accidentally or gets corrupted. In some cases lost data is recoverable but it requires additional cost, time and IT assistance and some data cannot even be recovered hence this makes data loss prevention more important.Data loss can be caused due to human error, soft corruption, virus and malware, hackers or computer theft.

3. DDoS Attack

DDoS attack stands for distributed denial-of-service attack.DDoS attack happens as a result of malicious attempt to disturb the normal traffic of a server.DDoS attacks happen generally by using compromised computer systems as a source of attack.For DDoS attack to happen the attacker needs to control the network of machines. The intermediate machines are loaded with malware which turns each system to a bot which are intermediates in the attack. It can be prevented by having updated firewall , keeping all softwares updated and by preventing downloading form unknown sources.

4. Human Error

Human error can happen by multiple ways like falling for phishing, by wetting an unauthorised person using the official website, by poorly managing accounts of high importance or by the most common one that is poor password. These can pr prevented by ensuring a strong set of organisational rules ensuring rules for the protection the systems and softwares to security threats.

Advantages in not including the MAC in the scope of the packet encryption in SSH

In the key exchange phase of SSH the purpose of authentication is to ensure that both the peers taking part are right. In this process of authentication the server authenticated itself using the public key and where as the client uses it's userid and password. When finally the data is sent authentication ensures that each part of data reaches the destination without nay tampering, this is achieved using MAC. This is often encoded using AES or CBC mode. Both these do not provide prevention from manipulation of data and hence the MAC us required to be sent along. Consider a situation when A sends a message to B without including MAC.A middle man can strategically change the cypher text in the middle which will lead to complete alteration of the the message sent initially. It is impossible for the recipient to understand the alteration in the original message without the  attachment of MAC with AES.

1.

2.

3.

4.

5.


Related Solutions

SWOT (Strengths, Weaknesses, Opportunities, and Threats) Analysis of Google’s Cloud Security.
SWOT (Strengths, Weaknesses, Opportunities, and Threats) Analysis of Google’s Cloud Security.
Describe and give examples of the 2 most significant computer security threats that are impacting the...
Describe and give examples of the 2 most significant computer security threats that are impacting the world at the present time. (b) What steps are being taken to minimize or thwart these threats? (c) Will the efforts proposed to protect individuals, companies and the governments from these threats still protect the rights of citizens? (d) Do you think that the steps taken or to be taken are ethical and will not cause a backlash in society? Please elaborate (beyond a...
1. What are the new threats to human security in the era of globalization? 2. Two...
1. What are the new threats to human security in the era of globalization? 2. Two individuals have become whistleblowers: Edward Snowden abd Julian Assange. They believe that their choices prioritize human or individual rights over nation-states security. Do uou think that their arguments are valid? Why or Why not? Please explain with a lengthy explanation.
1. Explain why temporary accounts are closed. 2. Describe the four specific steps included in the...
1. Explain why temporary accounts are closed. 2. Describe the four specific steps included in the Closing Process. 3. Which account types (i.e. Assets, Liabilities, Expenses etc.) are NOT closed and why?
1. Explain the common security threat concept in the cloud. [Hint : chapter 9] Cloud Computing,...
1. Explain the common security threat concept in the cloud. [Hint : chapter 9] Cloud Computing, Kris Jamsa, 2013, Johns & Bartlett Learning, ISBN: 978-1- 4496-4739-1
Describe the electron cloud for SO3 and CO3(2-).
Describe the electron cloud for SO3 and CO3(2-).
1.Describe a design pattern that incents good security behavior. 2.Design a hash function that uses any...
1.Describe a design pattern that incents good security behavior. 2.Design a hash function that uses any desired date as the salt. Demonstrate operation of the function, including input values. Describe benefits and shortcomings of the hash function.
describe the life cycle of a specific helminth ( including terminology)
describe the life cycle of a specific helminth ( including terminology)
Discuss the advantages of cloud-based solutions of your choosing. Give an example of each and describe...
Discuss the advantages of cloud-based solutions of your choosing. Give an example of each and describe how you've seen cloud-based solutions in action. Some examples; may include communication tools (Email, Skype and WhatsApp), productivity (Microsoft Office 365 and Google Docs), business process (Salesforce and HubSpot), backup and recovery (Dropbox and Google Drive) and social media (Facebook, LinkedIn and Twitter).
1. What are the physiological advantages of a heart that is divided into four chambers? 2....
1. What are the physiological advantages of a heart that is divided into four chambers? 2. Discuss what would happen to a human that is born with a heart in which the septum that separates the heart atria has a hole. A person has been fasting overnight and when this person wakes up the person drinks a regular Coca-Cola for breakfast. The graph below indicates the changes in blood glucose levels over time right before (1) the person drinks the...
ADVERTISEMENT
ADVERTISEMENT
ADVERTISEMENT