preview

Types Of Hackers And Cloud Computing Essay

Better Essays
Kinds of attackers in cloud computing Internal attackers An insider/ internal attacker has the below features: 1. Has been employed by the vendor of the cloud services, third party or the customer anchoring the cloud service operations. 2. Might have a present validated access to the services of cloud, data of the customer or anchored applications as well as infrastructure based on the role of the organization 3. Utilizes the present privileges to get a more access or anchor the third party for the execution of the attacks against the integrity, confidentiality as well as availability of information within the service of cloud External attackers An external attacker had the below characteristics: 1. Has not been employed by the vendor of the cloud, customer or even the third party which supports the cloud service operations. 2. There is no validated access to the services of cloud, the data of the customer or anchor the applications as well as the infrastructure 3. Taking advantage of the operational, technical, social engineering as well as process based loopholes for attacking the service provider of cloud, third party organization and even the customer for gaining more access for propagating attacks against integrity, confidentiality as well as information availability within the service of cloud. Despite the insider and the external cyber con artists can be conspicuously distinguished, their ability for executing successful attacks is which segregates them as a risk to
Get Access