1. Account Hijacking
Attackers can access user accounts remotely. Attackers can access data stored on the cloud.
Methods of Hijacking: Reused Password and Scripting Bugs [in April 2010 Amazon faced crossed-site scripting bug].
2. Insider threat
An Attack from inside your organization [Business Partnership]. Employees can use their authorized access to an organization’s cloud-based services. Employees can misuse or access information such as
Customer accounts, Financial forms, and other sensitive information.
3. Phishing and social engineering attacks
Once login information or other confidential information is available. A malicious user can log into a system easily as the system is accessible from anywhere.
4. Malware injection
Malware Injection means Code or Scripts embedded into cloud services. Malicious code can be injected into cloud services. Injected code is viewed as part of the software or service that is running within the cloud servers themselves.
5. Security issues faced with saas, Iaas
Data theft.
Lack of staff with the skills [for cloud security management].
Misuse of data.
Advanced Attacks against cloud service providers.
Inability to prevent malicious attacks.
Inability to monitor cloud workload systems.
.
Comments
Post a Comment