Вы находитесь на странице: 1из 9

Cloud Storage

Vulnerability
Mateen Jangda, Aryan Belde, and Chase
Waddington
Cybersecurity Incidents of 2016
In 2016, hackers attacked hospitals, which are known to have less security than
businesses. These hospitals also maintain life-saving systems that ensure the
safety of its patients. The most famous attack was against Hollywood
Presbyterian Hospital, which the hackers got a ransom of $17,000 for the hospital
to regain access of the locked files.
Cybersecurity Incidents of 2016 (continued)
Also in 2016, the Democratic National Convention was hacked, and leaked over
19,000 emails which cause the chair Debbie Wasserman Schultz. This could have
also affected the outcome of the national election.
Cloud Vulnerability Concerns for The future
1. Data breaches over the past couple years have multiplied and left people
vulnerable to fraud. Cloud storage introduces many different avenues of
attack.

2. Data loss is another big concern, and causes loss of valuable data. This is
typically caused by loss of the encryption key, which renders the data
unretrievable.
Cloud Storage Vulnerability types
Session Riding: When an attacker rides the session of another user in order to
act like the user. This could happen if the hacker copies the users cookie, and
acts like the user to access their files.

Insecure Cryptography: This is when the encryption is not strong, and can be
broken. An example of this is if the random numbers in the encryption arent
random enough, and the key can be brute forced.

Data Portability: When data is being transferred from one service to another, the
data can be lost in the process, which means that all the users data may be lost.
Example of Cloud Data Vulnerability
In 2013, one of the worlds biggest data breaches happened. More than one
billion yahoo accounts information was hacked from the cloud. All files, user
names, passwords, and account information was stolen leaving many people in
danger. The scary thing is that Yahoo didnt even know about it until years later.
How to Combat Cybersecurity Attacks
1. Use a private cloud (a limited number of people have access to it)

2. Strengthen your passwords (use a variety of letters, numbers, and symbols)

3. Secure your data transfer channels

4. Know the software you're using


The Impact Of Cloud Storage Vulnerability
Cloud storage vulnerability has effects both economically and on business.
Organizations share memory databases which are very close to each other. This
creates a point of attack for hackers since a successful hack can allow them to
obtain confidential files from multiple organizations. In addition, these hackers can
get a ton of the funds that go towards supporting these organizations. This could
cause the organization to experience a steep drop in the employment rate which
would negatively impact the economy of a certain place.
Citations
What is a Cyberattack? - Definition from Techopedia. (n.d.). Retrieved February 16, 2017, from
https://www.techopedia.com/definition/24748/cyberattack

4 Ways to Prevent Cyber Security Attacks in the Cloud. (2014, July 17). Retrieved February 16, 2017, from
http://www.squiresgroup.com/2014/05/16/14964-ways-to-prevent-cyber-security-attacks-in-the-cloud/

The top cloud computing threats and vulnerabilities in an enterprise environment. (n.d.). Retrieved February 16, 2017, from
http://www.cloudcomputing-news.net/news/2014/nov/21/top-cloud-computing-threats-and-vulnerabilities-enterprise-environment/

Rashid, F. Y. (2016, March 11). The dirty dozen: 12 cloud security threats. Retrieved February 16, 2017, from
http://www.infoworld.com/article/3041078/security/the-dirty-dozen-12-cloud-security-threats.html

9 Worst Cloud Security Threats. (n.d.). Retrieved from


http://www.informationweek.com/cloud/infrastructure-as-a-service/9-worst-cloud-security-threats/d/d-id/1114085

Perlroth, V. G. (2016, December 14). Yahoo Says 1 Billion User Accounts Were Hacked. Retrieved from
https://www.nytimes.com/2016/12/14/technology/yahoo-hack.html?_r=0

Вам также может понравиться