Professional Documents
Culture Documents
Cloud Computing
Cloud Computing
Cloud Computing
Q1.
Ans 1
Q3 (b)
Ans 3 (b)
1. Introduction. A threat is an illegal activity that can cause damages, such as
loss of information and data corruption to a cloud provider organisation
2. Types of Threats. There are three types of threats :-
(a) Unintentional or accidental threats.
(b) Natural Events.
(c) Intentional threats.
3. Unintentional or accidental threats.
(a) It is an activity that occurs accidentally and its occurrence is not
dependent on any entity.
(b) It can occur due to exposure of confidential information or unauthorised
modification of information.
e.g – accidental loss of CD/ DVD/ HDD containing classified information,
Leaving the system unattended after logging in to server and thereby exposing
the system to theft of info etc
4. Physical or Natural threats.
(a) Physical threats come from things like bombs, fires, and floods.
(b) They can damage your computer or corrupt your information. Physical
threats can also cause injuries.
E,g – Damage to Firewall due to short circuit rendering the firewall unusable
and entire network exposed, Damage of Network attached Storage due to fire
thereby having loss of data etc.
5. Intentional Threats.
(a) The activity has been intentionally performed.
(b) The entity has performed the activity with an aim to violate security of
the computer system and network.
e.g. Traffic Eavesdropping, Malicious Intermediary, Denial of Service,
Virtualisation Attack, Virus, Malware, Trojans etc
6. Conclusion. Security in cloud is of utmost importance irrespective of the cloud
architecture being used by the organisations. Cybersecurity is a growing concern for
businesses of all sizes. Unfortunately, there’s no one-size-fits-all answer when it
comes to managing cyber risks, as the risk posed by different types of attacks will vary
greatly.