Assessment Item 3: Security Threats in Cloud Computing

Verified

Added on  2025/04/30

|4
|347
|405
AI Summary
Desklib provides past papers and solved assignments for students. This report analyzes active and passive attacks in cloud computing.
Document Page
ITC595 - Information Security
Assessment Item 3
Security threats in cloud computing and
preventive methods
Assessment title-
Assessment no.-
Student name-
Student ID-
Student email-
tabler-icon-diamond-filled.svg

Paraphrase This Document

Need a fresh take? Get an instant paraphrase of this document with our AI Paraphraser
Document Page
Active Attack: Unlike a passive attack, an active attack is actually trying to change the network.
This can change data streams, change data, delete clients, etc. We knew from the query that a
material device which could most probably be raspberry pi was deployed by the attacker. If the
strike is a serious threat, the technology can be severely damaged by R-pi. If the attacker is
intelligent, then the R-pi can be designed in such a manner that it can erroneously demonstrate
itself to computer system as among the servers and it would be almost indistinguishable from
what is counterfeit and what is authentic.
We can see, therefore, through this analysis that a Masquerade attack can be a potential active
attack on this network. Masquerade attack occurs when an entity presents itself as another entity
that can harm the system.
Figure 1: Masquerade Attack
Passive attack: In general, a Passive attack does not harm the system, it just learns about it, store
and make use of information that it gathers by being in the system.
We already know that on this network traffic is going to be affected by this intrusion. So, a
potential passive attack can be traffic analysis which means that it will monitor all the traffic on
this network and will be able to find potential information like the location of the host server, the
identity of communicating host etc. All this information can really be a help to any competitor
who is trying to force this company out of the market.
Document Page
Figure 2: Traffic analysis attack
Document Page
References
Buczak, A. L., & Guven, E. (2016). A survey of data mining and machine learning methods for
cyber security intrusion detection. IEEE Communications Surveys & Tutorials, 18(2), 1153-
1176.
Cherdantseva, Y., Burnap, P., Blyth, A., Eden, P., Jones, K., Soulsby, H., & Stoddart, K. (2016).
A review of cyber security risk assessment methods for SCADA systems. Computers & security,
56, 1-27.
chevron_up_icon
1 out of 4
circle_padding
hide_on_mobile
zoom_out_icon
[object Object]