Assessment Item 3: Security Threats in Cloud Computing
VerifiedAdded on 2025/04/30
|4
|347
|405
AI Summary
Desklib provides past papers and solved assignments for students. This report analyzes active and passive attacks in cloud computing.

ITC595 - Information Security
Assessment Item 3
Security threats in cloud computing and
preventive methods
Assessment title-
Assessment no.-
Student name-
Student ID-
Student email-
Assessment Item 3
Security threats in cloud computing and
preventive methods
Assessment title-
Assessment no.-
Student name-
Student ID-
Student email-
Paraphrase This Document
Need a fresh take? Get an instant paraphrase of this document with our AI Paraphraser

Active Attack: Unlike a passive attack, an active attack is actually trying to change the network.
This can change data streams, change data, delete clients, etc. We knew from the query that a
material device which could most probably be raspberry pi was deployed by the attacker. If the
strike is a serious threat, the technology can be severely damaged by R-pi. If the attacker is
intelligent, then the R-pi can be designed in such a manner that it can erroneously demonstrate
itself to computer system as among the servers and it would be almost indistinguishable from
what is counterfeit and what is authentic.
We can see, therefore, through this analysis that a Masquerade attack can be a potential active
attack on this network. Masquerade attack occurs when an entity presents itself as another entity
that can harm the system.
Figure 1: Masquerade Attack
Passive attack: In general, a Passive attack does not harm the system, it just learns about it, store
and make use of information that it gathers by being in the system.
We already know that on this network traffic is going to be affected by this intrusion. So, a
potential passive attack can be traffic analysis which means that it will monitor all the traffic on
this network and will be able to find potential information like the location of the host server, the
identity of communicating host etc. All this information can really be a help to any competitor
who is trying to force this company out of the market.
This can change data streams, change data, delete clients, etc. We knew from the query that a
material device which could most probably be raspberry pi was deployed by the attacker. If the
strike is a serious threat, the technology can be severely damaged by R-pi. If the attacker is
intelligent, then the R-pi can be designed in such a manner that it can erroneously demonstrate
itself to computer system as among the servers and it would be almost indistinguishable from
what is counterfeit and what is authentic.
We can see, therefore, through this analysis that a Masquerade attack can be a potential active
attack on this network. Masquerade attack occurs when an entity presents itself as another entity
that can harm the system.
Figure 1: Masquerade Attack
Passive attack: In general, a Passive attack does not harm the system, it just learns about it, store
and make use of information that it gathers by being in the system.
We already know that on this network traffic is going to be affected by this intrusion. So, a
potential passive attack can be traffic analysis which means that it will monitor all the traffic on
this network and will be able to find potential information like the location of the host server, the
identity of communicating host etc. All this information can really be a help to any competitor
who is trying to force this company out of the market.

Figure 2: Traffic analysis attack
⊘ This is a preview!⊘
Do you want full access?
Subscribe today to unlock all pages.

Trusted by 1+ million students worldwide

References
Buczak, A. L., & Guven, E. (2016). A survey of data mining and machine learning methods for
cyber security intrusion detection. IEEE Communications Surveys & Tutorials, 18(2), 1153-
1176.
Cherdantseva, Y., Burnap, P., Blyth, A., Eden, P., Jones, K., Soulsby, H., & Stoddart, K. (2016).
A review of cyber security risk assessment methods for SCADA systems. Computers & security,
56, 1-27.
Buczak, A. L., & Guven, E. (2016). A survey of data mining and machine learning methods for
cyber security intrusion detection. IEEE Communications Surveys & Tutorials, 18(2), 1153-
1176.
Cherdantseva, Y., Burnap, P., Blyth, A., Eden, P., Jones, K., Soulsby, H., & Stoddart, K. (2016).
A review of cyber security risk assessment methods for SCADA systems. Computers & security,
56, 1-27.
1 out of 4
Related Documents

Your All-in-One AI-Powered Toolkit for Academic Success.
+13062052269
info@desklib.com
Available 24*7 on WhatsApp / Email
Unlock your academic potential
Copyright © 2020–2025 A2Z Services. All Rights Reserved. Developed and managed by ZUCOL.