Top Threats In Cloud Security

“Top Threats to Cloud Computing”, provides needed background to help organizations in making refined risk management decisions regarding their cloud adoption strategies. #Threat1- Misuse of cloud computing: PaaS providers have usually suffered most from this type of attacks. Recent evidence shows that attackers have initiated to target IaaS cloud providers as well. Forthcoming areas of…

Cloud Fundamentals and Cyber Security Assessment -4

Major attacks • Back-door: A back-door attack takes place using asynchronous external connections or dial-up modems. Here, the strategy is to gain access to a network through bypassing of control mechanisms and getting in through a backdoor such as a modem. • Spoofing: IP spoofing involves the alteration of a packet at the TCP level.…

Cloud Fundamentals and Cyber Security Assessment -3

Security threats 1. Misuse of Cloud Computational Resources: In order to conduct cyber-attacks on computer systems, a large amount of computing power is required. So, hackers use multiple computers to develop higher computing power. This is a complicated case which may take few months to complete. But nowadays, this can be done easily. Using a…

Cloud Fundamentals and Cyber Security Assessment -2

Cloud Delivery Models In a IaaS model too, infrastructure is provided to run applications. The cloud computing approach provides a pay-per-use model for the client and he/she can also scale the service depending on demand; i.e., you have to pay for the processing power, disk space and other computing resources that you have used. IaaS…

Cloud Fundamentals and Cyber Security Assessment -1

Cloud Fundamentals and Cyber Security Assessment Cloud Computing Cloud computing refers to a model in which computing resources and applications are accessed on demand, from anywhere in the world. Cloud computing provides a shared pool of resources such as data storage space, computer processing power, networks, corporate and user applications etc. In short is the…

Cloud Star Certification For Cloud Services Providers

Cloud Star Certification for Cloud Services Providers 1.What is CSA STAR Certification? CSA STAR Certification is a unique new scheme developed to address specific issues relating to cloud security as an enhancement to ISO/IEC 27001. Whilst ISO/IEC 27001 standard is widely recognized and respected, its requirements are more generic and therefore there can be a…

Cloud Application Pen Testing

Cloud Application Pentesting With the growth of cloud computing, Penetration testing deployment is becoming bit difficult due to its shared responsibility model. Cloud computing brings concept of shared ownership to penetration testing. We will discuss here about the cloud, as well as provide tricks and tips for pen testing it. Cloud using shared responsibility Here are two…