This occurs when an unauthorized third-party maliciously gains access to data at rest in a cloud infrastructure or data in transit for compromising its integrity.
What is a Data Breach?
This is what CIA stands for when it comes to cloud computing.
What is Confidentiality, Integrity, and Availability?
This is a service-oriented security mechanism for protecting the user layer of the cloud computing ecosystem.
What is Security-as-a-Service?
This issue is a critical challenge is cloud computing as regulations on storage, usage, management and access to individual information vary across the world.
What is Privacy?
These are information that have close connections with the name or address of any individual which could be used to identify or locate people or information that can be potentially correlated with the other information to identify an individual.
What are Personally Identifiable Information (PII)?
Those with a high-level of access to potentially private, sensitive information and critical systems leading to a serious data breach are referred to as this.
What are malicious insiders?
This refers to the ability to share sensitive data between a number of users without violating the privileges granted by the data owner to each of the targeted user
What is Data Confidentiality?
This is an application used by cloud consumers to access their subscribed services anywhere and at any time.
What is a standard web browser?
This is used for securing data in transmission while making sure it reaches the correct destination.
What is the secure socket layer (SSL)?
This is a proprietary monitoring solution for Amazon Web Services (AWS).
What is Amazon CloudWatch?
This is a stealthy computer network attack in which multiple assault code are injected into a vulnerable system at entry points while participating in a targeted network such that certain malicious individuals gain unauthorized access and remain undetected over a long period of time.
What are advanced persistent threats?
This characteristic indicates that rightful owners of data, in this case, cloud service consumers, can seamlessly gain access to their data, and they are not denied access erroneously or due to malicious attacks by any entity.
What is Data Availability?
Transport Layer Security (TLS) and Same Origin Policy (SOP) are both policies proposed for this.
What is Browser Security?
These are responsible for the monitoring, evaluation and demonstration of the degree of compliance with regulatory requirements, coordination of external auditing and internal policy requirements in addition to the customers' business and organization's objectives.
What are Cloud Service Providers (CSP)?
This system leverages on RESTful Web Services to provide monitoring services.
What is Cloud Management System (CMS)?
This involves the stealing and using of the account details of a legitimate user for disreputable purposes using techniques like fraud and phishing.
What is Account Hijacking?
This refers to the process of ensuring that cloud users' data is protected from unauthorized modification, thus assuring that the stored data has not been manipulated in any way by any unauthorized parties.
What is Data Integrity?
This is the primary objective of an access control mechanism due to wide range of accessibility to cloud data via the internet.
What is User Authentication?
This is a typical attack aimed at injecting a malicious service performance module into a legitimate instance of a virtual machine.
What is a Cloud Malware Injection Attack?
This Monitoring System is an open source monitoring solution developed for private clouds.
What is Private Cloud Monitoring Systems (PCMONS)?
These are exploitable program bugs in the operating system that can be exploited by attackers to gain full access to the host computer.
What are System Vulnerabilities?
This can lead to unauthorized third party or administrators gaining remote access to administer customer cloud services and can cause intentional damage to their data sources.
What is poor access and identity management procedures?
This authentication standard is commonly available and a more reliable authentication scheme than the password login verification check. It uses an IF-MAP standard to authorize users in real-time communication between the cloud provider and the consumer.
What is the Trusted Platform Module (TPM)?
This kind of attack causes the server's hardware resources to become completely exhausted such that the same hardware system is unable to perform any intended tasks.
What is a flooding attack?
This system is a composite and comprehensive cloud monitoring solution resulting from a rich integrated set of monitoring solutions.
What are Flexible Automated Cloud Monitoring Slices (Flex-ACMS)?