Preview

Cloud Computing Threats and Vulnerabilities

Best Essays
Open Document
Open Document
2426 Words
Grammar
Grammar
Plagiarism
Plagiarism
Writing
Writing
Score
Score
Cloud Computing Threats and Vulnerabilities
Cloud Computing Threats and Vulnerabilities

University of Maryland University College

Table of Contents
I. Introduction: What is cloud computing and why is it important?
II. What are Cloud Computing’s Threats and Vulnerabilities?
III. Threat/Vulnerability Occurrence Likelihood, Risk Reduction and Customer Satisfaction
A. “Abuse and Nefarious Use of the Cloud” / “Session Riding and Hijacking”
B. “Insecure Interfaces and APIs” / “Virtual Machine (VM) Escape”.
C. “Malicious Insiders” / “Reliability and Availability of Service”
D. “Shared/Virtualized Technology Issues”/ “Insecure Cryptography”
E. “Data Loss or Leakage” / Data Protection and Portability”
F. “Vendor Lock-in” / “Account or Service Hijacking”
G. “Internet Dependency” / “Unknown Risk Profile”
IV. Conclusions

I. Introduction: What is cloud computing and why is it important? Cloud computing involves distributed computing over the public internet or similar private computer network. Cloud computing, which means your data and software are stored on servers owned and maintained by a third party, is becoming increasingly commonplace. This means that business owners need not purchase or lease computer software for each employee. Instead of installing a suite of software for each computer, it is only necessary to load a single application to permit employees to log into a Web-based service that provides all the computer programs the employees need to perform their tasks. The remote machines, accessed via the Web and owned by another company, can provide word processing, e-mail, research, complex data analysis and many other functions provided by computer programs. Even law firms are taking advantage of the cost savings, flexibility, and agility benefits of using cloud computing services. (Black, 2012).

II. What are Cloud Computing’s Threats and Vulnerabilities?

Cloud Computing Threats and Vulnerabilities



References: Black, N. (2012, September). The ethics of cloud computing for lawyers. GPSolo eReport. Cloud Security Alliance. (March 2010). Top Threats to Cloud Computing V1.0. Retrieved from https://cloudsecurityalliance.org/topthreats/csathreats.v1.0.pdf Montalbano, E. (2011, May 17). DARPA seeks more resilient cloud infrastructure. Information Week Government CERT. (2012). The CERT insider threat. Retrieved from http://cert.org/insider_threat/ Crabbe, N Crane, K. (2013). Nearly 15,000 Shands patients could be identity theft targets. The Gainesville Sun. Retrieved from http://www.gainesville.com/article/20130403/ARTICLES/130409896 Goedert, J Health Leaders Media. (2013). Johns Hopkins Hospital has July security breach, data recovered. Retrieved from http://www.healthleadersmedia.com/content/HOM-76229/Johns-Hopkins-Hospital-has-July-security-breach-data-recovered.html Himma, K.E. (2006). Legal, social and ethical issues of the Internet. In H. Bidgoli (Ed.), Handbook of information security, volume 2 Jacksonville Business Journal. (2008). UF warns patients of security breach. Retrieved from http://www.bizjournals.com/jacksonville/stories/2008/05/19/daily9.html Johns Hopkins Medicine Kabay, M.E., & Robertson, B., Akella, M., & Lang, D.T. (2009). Using social psychology to implement security policies. In Bosworth, et al (Eds.), Computer security handbook. New York, NY: John Wiley & Sons Kay, L Kinzie, S. (2007). Lost computer tapes had details on 135,000 workers, patients. Washington Post. Retrieved from http://www.washingtonpost.com/wp-dyn/content/article/2007/02/07/AR2007020701004.html Messmer, E., (2008) Office of Inadequate Security. (2010). Five indicted in Johns Hopkins Hospital ID theft ring. Retrieved from http://www.databreaches.net/?p=14347 O’Harrow, R Socol Piers Resnick & Dym, Ltd. (2013). Professional details: Steven H. Cohen. Retrieved from http://www.hsplegal.com/lawyers/Steven_Cohen/ Treen, D Vendormate. (2009). New year policy resolutions. Retrieved from http://vendorcompliance.vendormate.com/tag/university-of-chicago-medical-center/

You May Also Find These Documents Helpful

  • Good Essays

    The proposed system to be implemented will have the feature of logging into a web portal where employees can input data and run reports from. The current data that was housed within excel spreadsheets will now be imported into the web portal. After employee data has been imported into the new system managers will now have the ability to have employee profiles that include resumes, employee files, timesheet information, and salary etc. Riordan Manufacturing’s current human resource software integration with the client-server architecture will meet the system requirements in order to complete the project.…

    • 775 Words
    • 4 Pages
    Good Essays
  • Satisfactory Essays

    Fernando Salazar, 28 who was the ring leader of identity theft at Montefior Medical Center in New York. Salazar purchase 250 patient medical record at $3.00 a file with the help of an ex-clerk worker Monique Walker who had access to the files. Salazar and his accomplice were able to open up credit cards and purchase $50,000 luxury…

    • 59 Words
    • 1 Page
    Satisfactory Essays
  • Best Essays

    There are many benefits of using software applications in the work place. The simple workflow will improve everyday operations. Staff within the organization can spend less time coordinating activities and more time helping those in need. The use of software applications can optimize the ability to smoothly and securely share clients’ information across multiple programs or agencies. This sharing is done in a client-centric way and enables professionals to focus on the clients.…

    • 1156 Words
    • 5 Pages
    Best Essays
  • Satisfactory Essays

    Cm220 - Final Project

    • 3514 Words
    • 15 Pages

    State of California Department of Justice (N.D.) Identity Theft. Office of the Attorney General: Retrieved from http://ag.ca.gov/idtheft/index.php…

    • 3514 Words
    • 15 Pages
    Satisfactory Essays
  • Good Essays

    Cloud Computing: Fact vs Fog

    • 9067 Words
    • 37 Pages

    News of Cloud is everywhere, and its predominance in IT is a foregone conclusion. In fact, the push to adopt Cloud has been so strong that risks inherent in this model have largely been ignored The recent economic turmoil and the promise of Cloud leading a renaissance of the tech sector are shaping the perspective and appetite for Cloud rather than the readiness of the technology itself. Cloud is a powerful tool for mobilizing data; however, there are no regulations, standards, or assurances of data protection from a technical perspective Major breaches at Google, Salesforce.com, and Amazon, have exposed the fragility of the Cloud delivery model, and the fundamental issues of data security, privacy, and standards that have yet to be addressed. Though price points gained in Cloud can be significant, businesses should weigh advantages against the hidden costs of compromised data Analyst sentiment seems to be the sole voice of reason. Principal analysts from Forrester, Gartner, and Yankee cite major security concerns with Cloud. Hackers have also highlighted the vulnerabilities of Cloud and issued a manifesto of mayhem against it (Black Hat 2009 – Clobbering the Cloud by SensePost) Assessing your organization’s readiness for Cloud should include the evaluation of hybrid models, hybrid architectures, integration constraints, and innovative data protection…

    • 9067 Words
    • 37 Pages
    Good Essays
  • Good Essays

    Identity theft is an important crime in society today and it needs to be heavily enforced and prosecuted. According to Transunion.com, As of 2015, 9.9 million Americans are victims of identity theft, with an incident happening on average every 19 seconds. This proves just how important of a crime identity theft is and that it should be better protected and have harsher consequences. The legal definition of identity theft according to Dakota Family Bank and Foundations of Computer Society is “the fraudulent acquisition and use of a person's private identifying information, usually for financial gain.” Identity theft is in relation to the crime of stealing as if someone is committing Identity Theft, then they are taking the name of someone…

    • 928 Words
    • 4 Pages
    Good Essays
  • Powerful Essays

    Cloud computing comes into focus only when we think about what IT always needs: a way to increase capacity or add capabilities on the fly without investing in new infrastructure, training new personnel, or licensing new software. Cloud computing encompasses any subscription-based or pay-per-use service that, in real time over the Internet, extends IT's existing capabilities.…

    • 4246 Words
    • 17 Pages
    Powerful Essays
  • Best Essays

    grown by 21% (Gartner, 2012). It is predicted that the compound annual growth rate of…

    • 1740 Words
    • 8 Pages
    Best Essays
  • Best Essays

    Perkins, M. (2010). Emerging Ethical Issues in the 21st Century. Retrieved February 16, 2011 from www.perkinsfirm.com/ethics_in_cyberspace.html…

    • 1475 Words
    • 6 Pages
    Best Essays
  • Powerful Essays

    Healthcare Fraud and Abuse

    • 3859 Words
    • 16 Pages

    On August 31, 2010, in Los Angeles, California, the former chief executive officer of City of Angels Medical Center was sentenced to 24 months in prison for paying illegal kickbacks for referrals of patients who were recruited in downtown’s “Skid Row” district. The physician was also ordered to pay more than $4.1 million in restitution to the Medicare and Medi-Cal programs. He pleaded guilty in December 2008 to defrauding Medicare and Medi-Cal by recruiting homeless persons from the Skid Row and providing them with unnecessary health services (Examples of 1).…

    • 3859 Words
    • 16 Pages
    Powerful Essays
  • Satisfactory Essays

    Baase, Sara. 2008. A Gift of Fire: Social, Legal and Ethical Issues for Computing and the Internet. 3rd ed. New Jersey: Pearson/Prentice Hall…

    • 313 Words
    • 2 Pages
    Satisfactory Essays
  • Good Essays

    References: Importance of Ethics on the Internet. (2006, October 23). Retrieved March 16, 2008, from http://pwebs.net/marketing/ethics/articles/internetethics.htm…

    • 643 Words
    • 3 Pages
    Good Essays
  • Good Essays

    Cited: Forge, Gregory H. "The Ethical Implications of The Internet." Sociology 61, no. 1 (March 2007): 135–150.…

    • 1050 Words
    • 5 Pages
    Good Essays
  • Good Essays

    Cloud Computing

    • 4616 Words
    • 19 Pages

    Cloud computing is an emerging computing technology that uses the internet and central remote servers to maintain data and applications. Cloud computing allows consumers and businesses to use applications without installation and access their personal files at any computer with internet access. This technology allows for much more efficient computing by centralizing storage, memory, processing and bandwidth. Cloud computing is broken down into three segments: "applications," "platforms," and "infrastructure." Each segment serves a different purpose and offers different products for businesses and individuals around the world. In June 2009, a study conducted by VersionOne found that 41% of senior IT professionals actually don 't know what cloud computing is and two-thirds of senior finance professionals are confused by the concept[ highlighting the young nature of the technology. In Sept 2009, an Aberdeen Group study found that disciplined companies achieved on average an 18% reduction in their IT budget from cloud computing and a 16% reduction in data center power costs.…

    • 4616 Words
    • 19 Pages
    Good Essays
  • Powerful Essays

    Gould, Carol C. (ed.) (1989). The Information Web: Ethical and Social Implications of Computer Networking. (Boulder, Colorado : Westview Press).…

    • 1571 Words
    • 7 Pages
    Powerful Essays