Level 140 Level 142
Level 141

Cloud Computing Vulnerabilities


5 words 0 ignored

Ready to learn       Ready to review

Ignore words

Check the boxes below to ignore/unignore words, then click save at the bottom. Ignored words will never appear in any learning session.

All None

Ignore?
Authentication Attacks
Passwords that are weak and can be compromised with attacks including cross-site scripting (XSS) and crosssite request forgery (CSRF).
Denial of Service (DoS)
Disrupting service so that the cloud service becomes so busy responding to illegitimate requests, it can prevent authorized users from having access.
Data Extraction attacks
An attacker could attempt to access retired hard drives that may have been formatted or wiped.
Man-in-the-Middle Attacks
An attacker places himself in the communication's path, between the user and the cloud so that they can intercept and modify communications
Other cloud attack methods
Keyloggers, custom malware sent via phishing—such as malicious PDFs—and dropping trojaned USB keys