Module-5
Threat Agents
Fundamental Cloud Security
Basic Terms and Concepts
Confidentiality
Integrity
Authenticity
Availability
Confidentiality
Confidentiality
Integrity
Authenticity
non-repudiation
Prof of interactions
Availability
Availability of cloud services
cloud provider and the cloud carrier
Threat
Violation to security
Breach privacy
modes
Vulnerability
weakness
Causes???
1. configuration deficiencies,
2. security policy weaknesses,
3. user errors,
4. hardware or firmware flaws,
5. software bugs, and
6. poor security architecture
Risk
possibility of loss or harm
Measured from level of threats and possible known vulnerabilities
How to determine risk ?
1. the probability of a threat occurring to exploit vulnerabilities in the IT
resource
2. the expectation of loss upon the IT resource being compromised
Security Controls
prevent or respond to security threats or to avoid risks
Security policy contains:
1. set of rules and practices
2. service,
3. security plan for IT resources
Security Mechanisms
framework that protects IT resources, information, and services
Security Policies
Set of rules and regulations
Threat Agents
Entity s capable of carrying out an attack
internally or externally, from humans or software programs
Threat Agents
Threat Agents
Anonymous Attacker
cloud service consumer without permissions
bypassing user accounts
stealing user credentials
Malicious Service Agent
Intercept and forward the network traffic
may also exist as an external program
Trusted Attacker
attacker shares IT resources as the cloud consumer
exploit legitimate credentials
launch their attacks from within a cloud’s trust boundaries
Malicious Insider
human threat agents relation to the cloud provider
Who are they?
Priveleged for access the resources
Cloud Security Threats
Traffic Eavesdropping
intercepted by a malicious service agent
information gathering
compromise the confidentiality of the data
undetected for extended periods of time
Traffic Eavesdropping
Malicious Intermediary
messages are intercepted and altered
compromising the message’s confidentiality and/or integrity
Denial of Service
overload IT resources
Degrade server –if attack is succeeded.
1. Repeated communication requests.
2. Reduced responsiveness
3. Consume excessive memory and processing resources
Denial of Service
Insufficient Authorization
Attacker get access permission by mistake
Insufficient Authorization
weak authentication-weak passwords,
weak authentication
Virtualization Attack
Additional Considerations