chapter  3
52 Pages

Threats and Risks to Cloud Infrastructure and Risk Mitigation Strategies

WithRavi Das, Preston de Guise

Cyber security threats to Cloud Infrastructure can transpire from both within and outside of businesses, corporations, and organizations. There is currently a new trend in Cloud infrastructure security threats: namely, cyber attackers want to hold computer hostage until literally pay a ransom payment. This kind of attack is known as ransomware. Phishing involves sending an email with either a malicious file or link. It is important to note that among all the malware injection attacks, the Structured Query Language injection attack and the cross-site scripting attacks are the two most common forms that can be launches against a Cloud computing infrastructure. Wrapping attacks make use of the XML signature wrapping to exploit a weakness when web servers validate signed requests. Online cyber attackers could also use stolen passwords to launch malicious attacks against the subscriber base of the social media sites.