Major attacks • Back-door: A back-door attack takes place using asynchronous external connections or dial-up […]
Cloud Fundamentals and Cyber Security Assessment -3
Security threats 1. Misuse of Cloud Computational Resources: In order to conduct cyber-attacks on computer […]
Cloud Fundamentals and Cyber Security Assessment -2
Cloud Delivery Models In a IaaS model too, infrastructure is provided to run applications. The […]
Cloud Fundamentals and Cyber Security Assessment -1
Cloud Fundamentals and Cyber Security Assessment Cloud Computing Cloud computing refers to a model in […]