9 Notorious Threats to Cloud Computing Security


#3 Service Traffic Hijacking:

Service traffic hijacking is where an attacker gains access to your credentials, he or she can eavesdrop on your activities and transactions, manipulate data, return falsified information, and redirect your clients to illegitimate sites. "Your account or services instances may become a new base for the attacker. From here, they may leverage the power of your reputation to launch subsequent attacks," according to the report.

"Organizations should look to prohibit the sharing of account credentials between users and services, and they should leverage strong two-factor authentication techniques where possible," according to CSA.

#4 Insecure Interfaces and APIs:

Today IT administrators mostly rely on interfaces for cloud, management issues and monitoring. Also they have started considering APIs as an integral element to security and other services. After building these services, organizations are known for implementing add-on elements. This introduces the complexity of the new layered API; it also increases risk, as organizations may be required to relinquish their credentials to third parties in order to enable their agency," the report notes.

According to CSA, organizations mainly suffer from security attacks due to weak interfaces and untrusted APIs, as they pose threats to confidentiality, integrity, availability and accountability.

Also Read: 10 Pioneers Of Cloud Computing

Also Read: IBM to Renew its Biggest Indian IT Contract, Faces Stiff Competition