Premium Resources

Benefits, Threats and Attacks on Cloud Computing

Economical

  • Infrastructure cost is greatly reduced.

  • Less maintenance cost

  • Less cost of ownership

  • Fewer capital Expenses

Operational

  • Flexibility

  • Resiliency

  • Efficiency

  • Backup and disaster recovery

  • Automatic updates

  • Scalable

  • Quick application deployment

Staffing

  • Less Staffing required

  • Less personal training

  • Sharing of resources

Security

  • Automatic patch application and updates.

  • Less cost on security configurations.

  • Swift responses received on security breaches.

  • Better disaster recovery.

  • Audit and monitoring did on provider’s side.

  • Better management of security systems.

Threats and attacks on cloud

  • Deletion without a backup

  • Data Breach

  • Hardware failures

  • Natural disasters

  • Authentication attacks

  • VM level attacks

  • Malicious insiders

  • Unknown risk profile

  • Vulnerable co-existents

  • Compliance risks

  • E-discovery is difficult across cross-borders.

  • Loss of the encoding key

  • Unauthorized access

  • Account, Service & Traffic Hijacking

  • Man-in-the-middle attacks

  • Denial-of-service attacks.

  • Cloud service provider may go out of business.

  • Cloud service provider may decide to hold the data as a hostage if there is a dispute.

  • Need to ensure that its private data is stored separately from others. If another client is the victim of a hack attack, it might affect the availability or integrity of the data of other companies located in the same environment.

  • Data transfer across borders makes the laws to be applied even more complicated and consequently resulting in the private information to be even more vulnerable.

  • SQL injection attacks allow attackers to gain unauthorized access to a database.

  • Cross Site Scripting (XSS)

  • Cryptanalysis attacks

  • Side channel attacks

  • Social engineering attacks

  • DNS attacks

Disclaimer

PMI®, PMBOK®, PMP® and PMI-ACP® are registered marks of the Project Management Institute, Inc.

The Swirl logo™ is a trade mark of AXELOS Limited.

ITIL® is a registered trade mark of AXELOS Limited, used under permission of AXELOS Limited. All rights reserved.

PRINCE2® is a registered trade mark of AXELOS Limited, used under permission of AXELOS Limited. All rights reserved.

IASSC® is a registered trade mark of International Association for Six Sigma Certification.

Certified ScrumMaster® (CSM) is a registered trade mark of SCRUM ALLIANCE®

CISSP® is a registered mark of The International Information Systems Security Certification Consortium (ISC)2.

CCNA® is a trademark of Cisco.

Microsoft and MS Project are the registered trademarks of the Microsoft Corporation.

SAP Trademark(s) is/are the trademark(s) or registered trademark(s) of SAP SE in Germany.