top of page

Cloud is Also Potentially Vulnerable: A deep dive into the cloud.

Cloud Hacking is one of the most intriguing fields there is. As cloud computing becomes more prominent, the possibility of hacking someone's server directly through their internet connection has increased. But do you know what it means?

If you followed the news over the last few years, you will have heard of cloud hacking. The major concern regarding cyber security is that a company's data can be accessed without their knowledge or consent and changed without their consent. This may lead to financial loss, unexpected expenses, identity theft, reputation loss, etc.

Cloud hacking is the act of illegally accessing a data center's servers from the Internet. This can be done from anywhere in the world and gives you full control of an organization's online accounts such as Gmail, Yahoo Mail, and even Twitter.

So, What is Cloud Service?

NIST defines the cloud as a technology that has the following characteristics:

  • On-demand self-service

  • Broad network access

  • Resource pooling

  • Rapid elasticity

  • Measured service

What are the cloud deployment models?

  • Private cloud: It is used for serving a single organization.

  • Public cloud: It is used for serving multiple customers and organizations.

  • Hybrid cloud: It is a combination of a private cloud and a public cloud infrastructure.

  • Multi-cloud: multiple managed services or multiple public cloud infrastructures.

What are the cloud service models?

  • Infrastructure as a Service (IaaS): the most fundamental one where customers can select the virtual machine size, select a pre-configured operating system, and deploy software inside the virtual machine instance according to business needs

  • Platform as a Service (PaaS): varies from managed database services to managed application services

  • Software as a Service (SaaS): the one which is most widely used, a fully managed software environment where, as a customer, you usually open a web browser, log in to an application, and consume services.

That is it for this time. We will meet in another write-up.

Till then happy Hacking.

130 views0 comments
bottom of page