ABSTRACT

Cyber security threats to Cloud Infrastructure can transpire from both within and outside of businesses, corporations, and organizations. There is currently a new trend in Cloud infrastructure security threats: namely, cyber attackers want to hold computer hostage until literally pay a ransom payment. This kind of attack is known as ransomware. Phishing involves sending an email with either a malicious file or link. It is important to note that among all the malware injection attacks, the Structured Query Language injection attack and the cross-site scripting attacks are the two most common forms that can be launches against a Cloud computing infrastructure. Wrapping attacks make use of the XML signature wrapping to exploit a weakness when web servers validate signed requests. Online cyber attackers could also use stolen passwords to launch malicious attacks against the subscriber base of the social media sites.