There are attacks which are specific to the web, networks, data, desktop workstations, and mobile devices. Please research and describe 3 attacks that are specific to the cloud and at least 1 counterm

Types of Attacks in Cloud

Cloud services have generated numerous opportunities in the world of business but have also presented an unlimited number of risks. There are several attacks associated with the cloud that have raised some concerns. One of the nuanced attacks is the denial of service. Ultimately, denial of service has been around for several decades, but the reliance evident in cloud services has made it more dangerous in recent years. Denial of service occurs when hackers bombard organizations’ systems with abundant commands or requests, thereby preventing access to routine serve.

Insider threats are also common in cloud systems. Insider attacks occur when legitimate users of the cloud system purposely violate security policies. In cloud technology, attackers can be administrators, cloud providers, and employees of a specific company. Insider threats are worse because these individual use the trust the company have in them to conduct their malicious activities (Liu et al., 2018). In most cases, detecting an insider threat is difficult.

            Similarly, cloud systems suffer from a man in the middle attack. In the man in the middle, hackers reconfigure and intercept cloud services by manipulating the vulnerabilities in the synchronization server. Therefore, all the data that organizations send or process on the cloud, hacker intercept, and replace with others. Companies may never realize the man in the middle attack because hackers often provide the original information token to the cloud systems.

            Companies can prevent all these attacks by establishing a defense in depth. Usually, defense in depth provides multilayered security controls (Mavroeidakos, Michalas & Vergados, 2016). In case hackers succeed in manipulating one layer of defense, other security controls prevent further intrusion. Defense in depth also helps companies to detect a security breach quickly.

 

 

References

Mavroeidakos, T., Michalas, A., & Vergados, D. D. (2016). Security architecture based on defense in depth for Cloud Computing environment. In 2016 IEEE Conference on Computer Communications Workshops (INFOCOM WKSHPS) (pp. 334-339). IEEE.

Liu, L., De Vel, O., Han, Q. L., Zhang, J., & Xiang, Y. (2018). Detecting and preventing cyber insider threats: A survey. IEEE Communications Surveys & Tutorials20(2), 1397-1417.