Cloud computing is predicted to be the future technology. This paradigm is considered to be offering infinite resources and comprehensive security, due to the application of modern techniques and highly skilled personnel employed. Despite of highly skilled manpower is looking after the cloud; cybercriminals have managed to attack cloud. This work undertakes the study of threats that exist in cloud computing, the type of industries on target of cybercriminals. In addition, we have carried out the detailed study on the industries which are targeted and the method employed by the cybercriminals to target these industries. This work will be extremely helpful to researchers and enterprises to know the type of cyber attack occurring in this newly evolved paradigm and to evolve the new methods to counter them.
Keywords
Cyber security, cloud attack, cybercrime, resource protection
1 Introduction
Enterprises and individual users are outsourcing their services on the web, instead of maintaining the resources of their own. Outsourcing of technical resources enables the organization to concentrate on business need instead of technical aspect, which is looked after by the expert of the IT area. To facilitate such users, a web based paradigm known as cloud computing has emerged and offering the services on utility model [p3]. The major goal of Cloud computing is to reduce the operating cost, increase throughput, increase the reliability and availability [p10].
To cater the wide variety of users, cloud is offering three types of services. These services include Infrastructure as a Service (IaaS), Platform as a Service (PaaS) and Software as a Service (SaaS) ( Mell & Grance, 2011). In IaaS users are offered the computing capabilities such as pr...
... middle of paper ...
...0]B. Hayes, Cloud computing, Communications of the ACM 51 (7) (2008).
[p11] Andrzej Goscinski, Michael Brock. Toward dynamic and attribute based publication, discovery and selection for cloud computing. Future Generation Computer Systems 26 (2010) 947-970
[p12] Vaquero L.M., Rodero-Merino L, Caceres J., Lindner M. A break in the clouds: towards a cloud definition. In: ACMSIGCOMM, editor. Computer communication review 2009. New York: ACM Press; 2009. pp. 50–5. (for grid virtualization)
[p13] Boss G, Malladi P, Quan D, Legregni L, Hall H. Cloud computing, 2009. http://www.ibm.com/developerswork/websphere/zones/hipods/ library.html. (for services types)
Mell, P. & Grance, T. (2011), "The NIST definition of cloud computing", special Publication 800-145, National Institute of Standards and Technology, available at http://csrc.nist.gov/ publications/ PubsSPs.html#800-145.
Cloud is the result of a decade research in the field of distributing computing , utility computing, virtualization , grid computing and more recently software, network services and web technology which is changeable evolution on demanding technology and services also as looking to the rapid growth of cloud computing which have changed the global computing infrastructure as well as the concept of computing resources toward cloud infrastructure. The important and interest of cloud computing increasing day by day and this technology receives more and more attention in the world (Jain, 2014) the mostly widely used definition of cloud computing is introduced by NIST “as a model for enabling a convenient on demand network access
Valerdi, Ricardo. "The Cloud Systems." Industrial Engineer n.d.: 28. ABI/INFORM Complete. Web. 1 May 2014. .
7. “What cloud computing really means.” By Eric Knorr, Galen Gruman. Accessed. 21 November 2013. < http://www.infoworld.com/d/cloud-computing/what-cloud-computing-really-means-031 >
A cloud can be a white, puffy object that aimlessly floats hundreds, if not thousands of feet in the air. Or a cloud can be gray and gloomy, signaling imminent showers or thunderstorms. However, the identity of a cloud is beginning to change in the modern era. In the modern era, Microsoft is attempting to redefine a cloud as being a service that electronically stores data from a large variety of sources. In particular, Microsoft advertises their new cloud service, Azure, in Fortune magazine, in an attempt to appeal to businesses that require a cloud service to store data, and to meet their consumer’s needs on the web. Though the most peculiar part of the advertisement is the comparison of weather phenomena and Microsoft’s
Rest assured that there are many other cyber crime attack methods that can be employed but, this paper will specifically a...
The data breach at Target had a massive impact on cyber security. According to Lauren Abdel-Razzaq, we live in a world where consumers don’t even think twice about paying with a credit or debit card or buying items online or with mobile devices (2014). However, data breaches have become a major threat and continue to impact companies all over the world. Companies should take information security as seriously as possible. We don’t live in a perfect world. Anything can happen at any time, even if a company has the most sophisticated security system in place. It is how a company reacts to a data breach that will make or break them.
To understand how cloud computing can be of value to an organization, it is important to us that we understand the cloud and its components. There are three different types of cloud computing services referred to as Infrastructure as a Service (IaaS), Software as a Service (SaaS) and Platform as a Service (PaaS). IaaS delivers cloud computing infrastructure servers, storage, network and operating systems as an on-demand service. SaaS is about software deploying over the Internet. PaaS allows a creation of web applications without the complexity of buying and maintaining the software and infrastructure. In this paper, I will suggest that Innovartus Technology Inc should use IaaS as a replacement for PaaS because IaaS is a rapidly developing field with resources such as better services, cost variability, utility pricing model and dynamic scaling.
Prof. Dr. Christof Weinhardt, Dipl.-Inform.-Wirt Arun Anandasivam, Dr. Benjamin Blau,Dipl.-Inform. Nikolay Borissov, Dipl.-Math. Thomas Meinl, Dipl.-Inform.-Wirt Wibke Michalk, Dr. Jochen Stößer "Cloud Computing A Classification, Business Models, and Research Directions - Springer." Cloud Computing A Classification, Business Models, and Research Directions - Springer. Business & Information Systems Engineering, 01 Oct. 2009. Web. 30 June 2014.
Max Thielen Last year Target fell victim to a massive cyber attack that compromised data on millions of its customers. The breach lasted from November 27 to December 15. During that time, information on 40 million debit and credit accounts was stolen. In addition, Target would later report that another 70 million customers’ names, phone numbers, and mailing addresses had been stolen (Whitney). A piece of malware that retails on the black market for around $2,000 is believed to be the culprit for the stolen data.
Cloud computing facilitates sharing of computing and storage resources with the aim of reducing computing expenses in organizations. Moreover, cloud computing facilitates information sharing among individuals within a cloud. Despite being advantageous, data stored in a cloud is usually prone to hacking and other security issues. This paper addresses the various mitigation measures that organizations are using to ensure that data stored in the cloud is secure.
The use of cloud services reduces costs and proves beneficial to companies especially those operati...
Every day millions in some cases billions of dollars are made by businesses from income brought in by online sale of products and services. As businesses continually develop and expand their client base with online products and services so does the desire by criminals to exploit vulnerabilities in their e-commerce setup. The mass worldwide internet usage growth within the last 20 years has been “an approximate 16 million users in 1995 to an estimated 2,937 million in March of 2014” As the importance of e-commerce increases so does the need to protect the technological infrastructure that will carry out online transactions for each business regardless of its size. I will attempt to highlight and review the history of a few cyber crimes to show the progression of the crimes within the last 30-40 years. I also plan to review how the economy and consumers are impacted by cyber crimes. Finally I will make an effort to contribute with information gathering on how to lower the risk of a cyber attack from and individual user to a large scale business.
In cloud computing, the word cloud is used as a metaphor for “the internet”. So the cloud computing means “a type of internet-based computing”, where different services such as servers, storage and applications are delivered to an organization’s computers and devices through the internet.
Cybercrime refers to all forms of crime conducted through a computer or a mobile device using computer networks. It is thus the use of a computer with the aim of intercepting and manipulating content, disrupting communication, stealing or generally destroying others’ information or hardware through a network. Although cybercrime is a worldwide problem and affects both small and big companies, small companies are affected more from the dangers of cybercrime. The rapid advancement in technology is causing tremendous problems to businesses in terms of more sophisticated cyber-attacks. This project is interesting and beneficial because it enlightens one on the dangers of cybercrime, thus preparing individuals to know how to prevent attacks while online, how to reduce the effects of a cyber-attack and how to prevent future