Skip to content

KINGSANIT CYBERPEDIA

Menu
  • Cyber Security Fundamentals
    • Security Principles
    • Information Security
  • Hacking
    • Reconnaissance
      • Footprinting
      • Scanning
      • Enumeration
      • Vulnerability Analysis
    • Privilege Escalation
    • Ethical Hacking
  • Governance, Risk And Compliance (GRC)
    • Risk Management
  • Security Architecture And Engineering
    • Cryptography
    • Identity Access Management
  • Security Operations
    • Security Assessment
      • Vulnerability Management
        • Threat Intelligence
    • Intrusion Detection And Prevention
  • Cyber Security Attacks and Threats
    • DoS
    • Password Hacking
    • Web Attacks
    • Web Applications Attacks
    • WI-FI Wireless Attacks
    • Bluetooth Attacks
  • Computer Networks And Internet
    • LAN Switching
    • Networking Protocols
    • Internet
  • Information Technology
    • Database
    • Web
  • Computer Architecture And Organization
  • Operating Systems
    • Programming
Menu

Cloud Attacks

Posted on by

Cloud Computing has revolutionized IT infrastructure with scalability, availability, and flexibility. Cloud Infrastructure is provisioned with automation and orchestration. This has brought a new set of Cyber Security Attacks to enterprise IT infrastructure that uses cloud computing resources. The following are the cyber security attacks:

Data Exfiltration – The attacker gets the access of un-authorized of data from the cloud due to misconfiguration, credential theft or malware.

Account Hijacking – Also known as cloud jacking where the attacker compromises and gets access of cloud account.

DoS and DDoS – Attackers perform DoS and DDoS attack on the cloud infrastructure making the computing resources un-available to the consumers.

API Attacks – Cloud uses API (application programming interface) extensively communication and data transfer with peer applications and other IT infrastructure. Attackers exploit the weakness in API and get access to the information passing through the API.

Supply Chain Attacks – The attackers targets and exploits the vulnerabilities in the 3rd party hardware and software present in the cloud either deployed by the service provider and consumer.

Recent Posts

  • Cloud Attacks
  • Serverless Computing
  • Virtualization
  • Hypervisor
  • Containers
© 2026 KINGSANIT CYBERPEDIA | Powered by Minimalist Blog WordPress Theme