Cloud Computing Security Risk: (Chapter Five)
Cloud Computing Security Risk: (Chapter Five)
Cloud Computing Security Risk: (Chapter Five)
Risk
[Chapter Five]
Dr. Ethar Abdul Wahhab
السيبان
ر فرع االمن/ المرحلة الرابعة/ قسم علوم الحاسوب/ كلية العلوم
Chapter Five Cloud Computing Security Risk
might have to sign for the item upon receipt. The vendor can then use the
signed receipt as evidence that the user did receive the package.
4. Information disclosure: Information disclosure threats involve the
exposure of information to individuals who are not supposed to have access
to it for example, the ability of users to read a file that they were not granted
access to, or the ability of an intruder to read data in transit between two
computers. Relevant security controls are in the area of confidentiality.
5. Denial-of-service: Denial-of-service (DoS) attacks deny service to valid
Users for example, by making a Web server temporarily unavailable or
unusable. Relevant security controls are in the area of availability.
6. Elevation of privilege: In this type of threat, an unprivileged user gains
privileged access and thereby has sufficient access to compromise or destroy
the entire system. Elevation of privilege threats include those situations in
which an attacker has effectively penetrated all system defenses and become
part of the trusted system itself, a dangerous situation indeed. Relevant
security controls are in the area of authorization.
5.3 cloud computing Threats
1. Threats from external attackers: External attackers use a variety of attack
operations such as security vulnerabilities, malware attacks, and network
tapping to gain unauthorized access to cloud data. Attackers may tamper
with data or delete it for malicious reasons, resulting in data loss or make
data incorrect.
2. Threats from internal participants: When dealing with a cloud computing
service, both the CSP and the third-party auditor are not entirely trusted as
internal participants. So that the provider of the service cloud is a service
Whether you’re looking to store files or host a website on the cloud, selecting a
secure cloud service provider is important. Keep in mind the following
considerations:
Reputation: look for cloud services with high reliability and an uptime
guarantee of at least 99.9%. A good provider ensures that all files and
data remain accessible without frequent interruptions.
Providers offering cloud services are responsible for maintaining their network
and the physical security of their cloud infrastructure. That said, the cloud
customer must safeguard their data, too. In cloud computing, this is called
the shared responsibility model.
Data breaches are one of the biggest challenges public cloud providers face,
which can lead to identity theft and a damaged brand reputation.
To mitigate cloud security risks, check the cloud service providers’ terms of
service for the following information:
Data ownership : understand who owns the data stored on the cloud
platform and the rights and permissions granted to the provider.
Regularly review these terms in the agreement to ensure they align with
your expectations.
Dr. Ethar Abdul Wahhab Page 58
Chapter Five Cloud Computing Security Risk
Data backup and access recovery : see what kind of backup and
recovery mechanisms the provider offers. We recommend finding a host
offering daily backups.
Strong password policies : all users should use complex and unique
passwords that are difficult to crack. Avoid reusing passwords to prevent
hackers from gaining access to all your accounts. Renew the passwords
regularly to strengthen your cloud access control.