logo

Risks Associated with Cloud Computing Technology

   

Added on  2022-11-12

5 Pages851 Words438 Views
Running head: CLOUD COMPUTING
ITS 532 Module Cloud Computing: Concepts, Technology & Architecture
Name of the student:
Name of the University:

1CLOUD COMPUTING
Introduction
In this new era of technology cloud computing has become one of the most widely using
technical support for both medium and large size businesses. This technology increases the
complete business efficiency with reliability, flexibility scalability and security as well.
However lack of concern in some of the components of cloud computing technology may cause
severe risks also. The potential risks that may occur while using the cloud services are elaborated
in this essay. In addition to this, the consequences of each attack are also developed and lastly
the reasons for which theses threats may occur are elaborated in this essay.
Discussion
Potential types of risks
Denial of services: The attack known as Denial of Services (DOS) is used by the
attackers to prevent the users from accessing a particular server they wants to access. However in
case of cloud computing technology this attack acts is a nasty way (Han, Chan, Alpcan &
Leckie, 2015). In this attack the hackers keep on sending excessive messages requesting the
authenticated server to accept the message request. While sending an approval for authentication
the address of the network or server will not be found. It causes the server to wait before the
connection gets close.
Man in the middle attack: In this attack the attackers manipulate or theft the
synchronization token of the users. These attacks take place through hit of malware ether by
website or email. After that the attackers get access of the local files of the users (Ali, Khan &

End of preview

Want to access all the pages? Upload your documents or become a member.

Related Documents
Security threats in cloud computing and preventive methods
|9
|2288
|116

Network security - Sample Assignment
|10
|2195
|122

Mitigation Strategies for Distributed Denial of Service (DDoS) Attack
|7
|1857
|53

GNS3 Simulation - Networking
|9
|565
|52

Components for Building IT Infrastructure
|1
|646
|51

Denial-Of-Service and Distributed Denial-Of-Service Attacks
|5
|675
|90