Level 140 Level 142
5 words 0 ignored
Ready to learn Ready to review
Check the boxes below to ignore/unignore words, then click save at the bottom. Ignored words will never appear in any learning session.
Passwords that are weak and can be compromised with attacks including cross-site scripting (XSS) and crosssite request forgery (CSRF).
Denial of Service (DoS)
Disrupting service so that the cloud service becomes so busy responding to illegitimate requests, it can prevent authorized users from having access.
Data Extraction attacks
An attacker could attempt to access retired hard drives that may have been formatted or wiped.
An attacker places himself in the communication's path, between the user and the cloud so that they can intercept and modify communications
Other cloud attack methods
Keyloggers, custom malware sent via phishing—such as malicious PDFs—and dropping trojaned USB keys