Loading...

Messages

Proposals

Stuck in your homework and missing deadline? Get urgent help in $10/Page with 24 hours deadline

Get Urgent Writing Help In Your Essays, Assignments, Homeworks, Dissertation, Thesis Or Coursework & Achieve A+ Grades.

Privacy Guaranteed - 100% Plagiarism Free Writing - Free Turnitin Report - Professional And Experienced Writers - 24/7 Online Support

Mcafee hacker intercepting traffic message

30/11/2021 Client: muhammad11 Deadline: 2 Day

Cloud Computing

Chapter 9

Securing the Cloud

Learning Objectives

List the security advantages of using a cloud-based provider.

List the security disadvantages of using a cloud-based provider.

Describe common security threats to cloud-based environments.

Physical Security

IT data centers have been secured physically to prevent users who do not have a need to physically touch computers, servers, and storage devices from doing so.

A general security rule is that if an individual can physically touch a device, the individual can more easily break into the device.

Advantages of Cloud Providers with Respect to Security

Immediate deployment of software patches

Extended human-relations reach

Hardware and software redundancy

Timeliness of incident response

Specialists instead of personnel

Disadvantages of Cloud-Based Security

Country or jurisdiction issues

Multitenant risks

Malicious insiders

Vendor lock in

Risk of the cloud-based provider failing

Real World: McAfee Security as a Service

McAfee now offers a range of security solutions that deploy from the cloud. The solutions protect e-mail (spam, phishing, redirection, and virus elimination), websites, desktop computers, mobile devices, and more.

Data Storage Wiping

Within a cloud-based disk storage facility, file wiping overwrites a file’s previous contents when the file is deleted.

Denial of Service Attacks

A denial-of-service attack is a hacker attack on a site, the goal of which is to consume system resources so that the resources cannot be used by the site’s users.

The motivation for and the implementation of denial-of-service attacks differ.

Simple Denial of Service

:Loop

ping SomeSite.com

GOTO Loop

While responding to the ping message, the server can handle fewer other requests.

Distributed Denial of Service (DDOS) Attack

A distributed denial-of-service (DDoS) attack uses multiple computers distributed across the Internet to attack a target site

Packet Sniffing Attacks

Network applications communicate by exchanging network packets. Each computer within a wired network examines the message address to determine if the message is for an application it is running.

Packet Sniffing Continued

A hacker can write code that lets his system examine the content of each packet that travels past it.

Within a wireless network, hackers can simply monitor the airways to intercept packets.

The cloud, because it allows users to connect to applications from anywhere, increases potential risks. Users may connect from an insecure network or a network in which the wireless traffic is being monitored.

The best defense against a packet sniffing attack is to use secure (encrypted) connections.

Man-in-the Middle Attack

Within a man-in-the-middle attack, a hacker intercepts the messages a user and system are exchanging. The hacker can view and/or change the message contents.

Monitoring Device Screens

Years ago, when employees accessed sensitive or confidential data only from within their office, the data was better physically protected from prying eyes.

The cloud, however, extends the delivery of such data to users who are any place, at any time, and often to any device.

The net result is that within a busy coffee shop or an airport, strangers can see data ranging from human-relations information or customer sales data to student grades, and more.

Malicious Employees

Companies spend considerable amounts of money trying to protect their data and communications from hackers.

IT staffs deploy firewalls, use encryption, monitor network traffic for intrusion, and much more. With all of these security features in place, the most difficult challenge for a company to defend itself against is a malicious employee.

Malicious Employees Continued

Developers, for example, have access to databases, and IT staff members have access to various system passwords, which means that each may have access to human-relations data, payroll data, e-mail content, and so on.

By shifting data to the cloud, you move sensitive data away from your own employees.

Hypervisor Attack

When you virtualize a server, each server operating system runs on top of special virtualization software called the hypervisor.

Hypervisor developers such as VMware and Microsoft constantly focus on ways to lock down and secure the hypervisor to reduce risks.

The hypervisor will remain an attractive hacker target as companies continue to virtualize solutions.

Hypervisor Attack Continued

Hackers refer to the process of taking over the hypervisor as a hyperjacking attack.

To reduce the chance of a hypervisor being taken over by malicious code the underlying hardware may assign a state value, like a cyclic redundancy check (CRC), to the hypervisor. If this value changes, the hardware can detect that the hypervisor has been attacked or replaced.

Guest Hopping Attack

Hackers refer to an attack from one guest operating system to another as a guest hopping attack.

Real World: Cloud Security Alliance

The Cloud Security Alliance is a not-for-profit organization, the goal of which is to promote education of cloud security issues.

The Cloud Security Alliance consists of a large coalition of cloud practitioners, companies, associations, and other cloud stakeholders.

SQL Injection Attack

Many web applications present forms that users must complete by filling in fields and then submitting the form contents for processing.

The application that receives the form data often stores the data within an SQL database.

SQL Injection Attack Continued

An SQL-injection attack occurs when a malicious user inserts one or more SQL queries within one or more of the fields. For example, rather than simply typing in his or her last name, the hacker might type the following:

Smith; DROP DATABASE EMPLOYEES;

Depending on how the database uses the user input, the processing may result in the execution of the injected SQL, which in this case would delete the database of the company’s employees.

SQL Injection Attack Continued

Many cloud-based software as a service (SaaS) solutions are multitenant applications, which means different customers may share underlying resources such as a database.

If the SaaS application falls victim to SQL injection, it might be possible for a user in one company to view, change, or destroy the data of another company.

Real World: ENISA

The European Network and Information Security Agency (ENISA), based in Greece, promotes cybersecurity best practices. Within the ENISA website, you will find a broad range of papers and reports on a variety of security topics.

Improving Physical Security through Colocation

By using colocated, replicated hardware and software, cloud solution providers reduce many threats to IT resources.

Key Terms

Chapter Review

List the security advantages of cloud-based solutions.

List the security disadvantages of cloud-based solutions.

Define and discuss the data wiping process.

Discuss how a cloud-based solution provider may reduce the risk of a DDoS attack.

Define and discuss hyperjacking attacks.

Define and discuss guest-hopping attacks.

Homework is Completed By:

Writer Writer Name Amount Client Comments & Rating
Instant Homework Helper

ONLINE

Instant Homework Helper

$36

She helped me in last minute in a very reasonable price. She is a lifesaver, I got A+ grade in my homework, I will surely hire her again for my next assignments, Thumbs Up!

Order & Get This Solution Within 3 Hours in $25/Page

Custom Original Solution And Get A+ Grades

  • 100% Plagiarism Free
  • Proper APA/MLA/Harvard Referencing
  • Delivery in 3 Hours After Placing Order
  • Free Turnitin Report
  • Unlimited Revisions
  • Privacy Guaranteed

Order & Get This Solution Within 6 Hours in $20/Page

Custom Original Solution And Get A+ Grades

  • 100% Plagiarism Free
  • Proper APA/MLA/Harvard Referencing
  • Delivery in 6 Hours After Placing Order
  • Free Turnitin Report
  • Unlimited Revisions
  • Privacy Guaranteed

Order & Get This Solution Within 12 Hours in $15/Page

Custom Original Solution And Get A+ Grades

  • 100% Plagiarism Free
  • Proper APA/MLA/Harvard Referencing
  • Delivery in 12 Hours After Placing Order
  • Free Turnitin Report
  • Unlimited Revisions
  • Privacy Guaranteed

6 writers have sent their proposals to do this homework:

George M.
Assignment Solver
Assignment Hub
Financial Solutions Provider
Assignments Hut
Buy Coursework Help
Writer Writer Name Offer Chat
George M.

ONLINE

George M.

I have assisted scholars, business persons, startups, entrepreneurs, marketers, managers etc in their, pitches, presentations, market research, business plans etc.

$24 Chat With Writer
Assignment Solver

ONLINE

Assignment Solver

I can assist you in plagiarism free writing as I have already done several related projects of writing. I have a master qualification with 5 years’ experience in; Essay Writing, Case Study Writing, Report Writing.

$34 Chat With Writer
Assignment Hub

ONLINE

Assignment Hub

I have worked on wide variety of research papers including; Analytical research paper, Argumentative research paper, Interpretative research, experimental research etc.

$30 Chat With Writer
Financial Solutions Provider

ONLINE

Financial Solutions Provider

I have written research reports, assignments, thesis, research proposals, and dissertations for different level students and on different subjects.

$17 Chat With Writer
Assignments Hut

ONLINE

Assignments Hut

After reading your project details, I feel myself as the best option for you to fulfill this project with 100 percent perfection.

$19 Chat With Writer
Buy Coursework Help

ONLINE

Buy Coursework Help

I find your project quite stimulating and related to my profession. I can surely contribute you with your project.

$46 Chat With Writer

Let our expert academic writers to help you in achieving a+ grades in your homework, assignment, quiz or exam.

Similar Homework Questions

Palestrina kyrie from pope marcellus mass tempo - Health care budgeting and financial management for non financial managers - What is environmental scanning in management - Ben and jerry's case study - The ugly american quotes - What promotional strategy should be pursued by papa john's to attract antonio's business? - BUSN601 - Assume that both portfolios a and b are well diversified - Discussion #2 - Fema is 120 c an introduction to exercises answers - What does scroll lock do - Sas air sampler manual - History of google company pdf - Library chamberlain.edu - Swarovski ring size chart - Front office manager checklist - Onion root tip lab worksheet - Mpg excel spreadsheet - 705 Wk 2 DQ 1# - Live load for residential building - Two compounds react to form two different compounds - Chapter 13 case scanner project - Explain romans 12 1 2 - Module 7 discussion group B - Isaac rosenberg dead man's dump analysis - Midsomer murders the fisher king susannah doyle - Nursing project - Sharad chaudhary bank of america - Www codeblocks org downloads 26 - Mother tongue amy tan answer key - Capricorn credit union bsb - The purpose of the olive branch petition was to persuade - Week 5 Discussion question - Heysen 105 results 2021 - Https www youtube com watch v mh5ly4mz15o - Walden NURS6003 Week 4 Quiz Part 1 - Nurse manager role in reengineering of health care - Wall street journal swap rates - Words to use in poetry - Everyday use questions - Cavity spot in carrot - Social enviroment - Pick up motors excel - Vsam status code 93 - Cool automatic watches that are sure fire conversation starters - Bus timetable mosgiel to dunedin - The bible in public schools a first amendment guide - Multiple choice test in trigonometry with answers - Adf transition training and skills guide - GR Friday - 480 8th st ne naples fl 34120 - Ias 40 investment property pdf - Vce grade distribution 2020 - Www mh alabama gov pasrr - Harvard 3 minute step test - Process Synchronization Using Monitor and Pthreads - What is the diameter of a cd in cm - Leadership newsletter article template - Chapter 9 the outsiders audio - Experiment 2 effect of temperature on enzyme activity - The supply curve slopes upward because - Potential of magnetic dipole - Dead men's path character analysis - Halfords 40l cool box instructions - Disaster Management - Large herbivorous dinosaur crossword 9 letters - How long does it take to get bond back nsw - Henna co produces and sells two products - Evolution by natural selection lab answer key - Future of the juvenile justice system proposal presentation - Paged memory reference - Silicon valley of india - Z domain root locus - Phoenix tears foundation janet sweeney - Which division detects stimuli of the general senses and special senses? - Henderson and venkatraman strategic alignment model - Cl2co lewis structure molecular geometry - How to eat croissant etiquette - Cells cells parts of the cell rap lyrics - Testout switching pro certification exam answers - Do a checkout chore crossword clue - The very noisy bear literacy activities - Assignment: Literature Review: The Use of Clinical Systems to Improve Outcomes and Efficiencies,,NURS 5051/NURS 6051: Transforming Nursing and Healthcare Through Technology - Starch production in photosynthesis - Quality concepts course - Down girl the logic of misogyny review - Essays - NRS 451-VN-0501 Nursing Leadership - Tony and susan jackett - Chill soda drink - Global lunar crescent visibility maps - Discuss Question - Carbon dioxide from antacid tablets lab - All minus one jonathan haidt - 250 grams in kg - Endless summer sebastian forslund lyrics - Fluid friction in a smooth bore pipe lab report - Algebra even and odd numbers hands on lesson 1.1 - Cross docking walmart case study - Form factor of full wave rectifier