百家乐怎么玩-澳门百家乐官网娱乐城网址_网上百家乐是不是真的_全讯网888 (中国)·官方网站

III. Exploitation on Cloud Computing

by JUCC ISTF

/* The following article is extracted from the "Information Security Newsletter" published by the JUCC IS Task Force. */

Cloud computing inherits security vulnerabilities from the Internet and makes them more significant when incorporating resource concentration and multi-tenancy sharing approach. Major cloud-specific vulnerabilities include: (1) Economic Denial of Service; (2) Compromise of Service Engine; (3) Interception and Leakage of Data in Transit

Major Vulnerabilities in Cloud Computing Environment

1. Economic Denial of Service (EDoS)

EDoS attempts to consume IT resources maliciously that result in economic damage to their owners. Universities' resources in the cloud can be harmed by the following kinds of EDoS attacks:

 

Identity theft - an attacker hijacks the user accounts of universities' members and uses them for his personal gain or to damage universities economically.

 

Resource Abuse - If effective limits on the usage of paid resources from the cloud service providers, malicious actions can be made by attackers to create unexpected consumption of such resources.

 

Public Channel Attack - Cloud services delivered through public channel, such as metering per HTTP requests, are vulnerable to attacks from the public Internet, such as Disturbed Denial of Service (DDoS).

 

2. Compromise of Service Engine

Cloud architecture relies on a highly specialised platform, the service engine that sits above the physical hardware resources and manages customer resources at different levels of abstraction.

An attacker can compromise the service engine by hacking it from inside a virtual machine (IaaS clouds), the runtime environment (PaaS clouds), the application pool (SaaS clouds), or through its Application Programming Interface (API).

 

3. Interception or Leakage of Data in Transit

Being a distributed architecture based on the Internet technologies, cloud computing implies more data in transit than traditional infrastructures. Data must be transferred between remote web clients of universities and cloud infrastructure to synchronise multiple distributed machine images, images distributed across multiple physical machines. Secured data transmission mechanism like Virtual Private Network (VPN) is not always followed in the cloud context.

Sniffing, spoofing, main-in-the-middle attacks, side channel and replay attacks are potential threat sources that can be used by attackers to exploit this vulnerability.

 

Reference:

http://www.enisa.europa.eu/act/rm/files/deliverables/cloud-computing-risk-assessment/at_download/fullReport


[Previous section] [Next section]

大发888赌博违法吗| 百家乐全部规| 电玩百家乐官网游戏机路单| 百家乐官网凯时娱乐场| 明升百家乐娱乐城| 大发8888| 爱拼娱乐场| 至尊百家乐官网qvod| 百家乐游戏技巧| 百家乐官网巴厘岛平台| 百家乐一起多少张牌| 平顺县| 新利百家乐官网的玩法技巧和规则| 百家乐记牌器| 百家乐官网庄家抽水的秘密| 大发8880634| 下载百家乐棋牌大厅| 新澳门百家乐官网娱乐城| 澳门百家乐怎玩| 真人百家乐官网888| 全讯网新2代理| 百家乐连输的时候| 富易堂百家乐官网娱乐城| 百家乐牌桌订做| 百家乐官网娱乐城玩法| 如何看百家乐官网的玩法技巧和规则| 梭哈棋牌游戏大厅| 百家乐技术辅助软件| 军事| 百家乐娱乐礼金| 百家乐官网那个平台信誉高| 澳门百家乐免费开户| 豪门网上娱乐| 大发888在线娱乐下载| 视频百家乐游戏| 大发888游戏优惠| 百家乐api| 百家乐破解版下载| 百家乐官网网开服表| 百家乐官网天上人间| bet365体育在线15|