There are attacks which are specific to the web, networks, data, desktop workstations, and mobile devices. Please research and describe 3 attacks that are specific to the cloud and at least 1 counterm

Web Attack  

Serious weaknesses or vulnerabilities allow criminals to gain direct and public access to databases in order to churn sensitive data – this is known as a web attack.

 

The Denial-of-service (DoS) attack attempts to make the system or network resources(such as webs) unavailable to the users from accessing their data and applications from the cloud. It could flood the target with fake requests and finally cause that the site is made, unavailable and prevent it from responding to requests from the legitimate users.

The cloud model gives the DoS attack even more computational power. This problem is further aggravated when DoS comes into picture as more machines will be compromised to attack a large number of systems. 

 

Countermeasure: 

 

Intrusion detection system - A defence mechanism is used for guarding where each cloud is located with separate IDs. When a specific cloud is under attack, the cooperative IDs alerts the whole system.

 

Data Breach 

In cloud computing, the virtual machines (VMs) reside in the same physical host and when one VM is able to access information from another VM, data breach occurs. The major risk factor is when the tenants of the two VMs are different customers. Data can be breached from highly sophisticated secured servers to poorly designed multi-tenant database where a flaw in the client’s application can lead the hacker to access client’s information and also information of every other client

 

Countermeasure: 

 

Encryption: To keep data secure, the front line of defense for any cloud system is encryption. Encryption methods utilize complex algorithms to conceal cloud-protected information.

Mobile devices Attack

Mobile devices are considered as physical threats. Mobile phones could contain a lot of sensitive information. The thieving or loss of it is quickly consequences, as a result of a complete unwelcome person has in his hands all the data you retain among the device (bank accounts, social network parole, contact lists, etc.) and use them with dangerous intentions. 

 

Countermeasure: 

 

Setup a PIN or Password to lock the phone and also Encrypting the device is the best security.

References : 

https://www.researchgate.net/publication/260549502_Mobile_Cloud_Computing_Security_Threats

 

http://www.ijstr.org/final-print/nov2015/Cloud-Computing-Security-Latest-Issues-Countermeasures.pdf

 

https://www.globaldots.com/blog/cloud-attack-vectors