THE THREATS FROM USING CLOUD SERVICES IN THE FIELD OF CYBER SECURITY
DOI:
https://doi.org/10.28925/2663-4023.2024.26.704Keywords:
Cyber Protection, Cloud Services, Cloud Technologies, Cloud Computing, Cyber Security, VPN, InfrastructureAbstract
The article discusses the advantages and disadvantages of using cloud services, as well as the potential for cybercriminals to exploit both the weaknesses and strengths of cloud environments to gain access to confidential information stored in the cloud. Cloud services are tools that enable remote work and, depending on the needs, can be utilized as infrastructure, platforms, or software. Despite the measures taken by cloud providers to ensure the security and reliability of the services they offer, the use of cloud services remains one of the potential weak points in the organization of corporate cybersecurity. One of the trends in the development of cloud services is the widespread use of artificial intelligence to create intuitive and automated solutions, which, in turn, introduces additional cybersecurity risks. Therefore, the use of cloud services requires thorough research of technologies and defense strategies, as well as the identification of vulnerabilities specific to certain cloud providers, which is the focus of this article. The author describes a study involving the use of the Google Cloud service to attempt a DDoS attack on targets from a predefined list, using the MHDDOS_PROXY exploit. To carry out such an attack, aiming to disrupt the availability of targeted resources, cybercriminals can similarly use any cloud service. However, the attack algorithm will only differ in its configuration settings compared to the steps outlined in the testing process. Exploits, available on the internet, the use of cloud service infrastructure, and precompiled lists of addresses can serve as mechanisms for executing cyberattacks. Preventive measures for organizing cybersecurity in enterprises and when working with cloud services include fine-tuning firewalls, filtering traffic with software and hardware tools, cloud migration, load balancing between resources, and the use of vulnerability scanners.
Downloads
References
lkevich, N. C. (2021). Cloud Technologies in education. Educational and Methodological Guide for Students of the Faculty of Physics and Mathematics.
Mell, P., & Grance, T. (2011). The NIST Definition of Cloud Computing. Recommendations of the National Institute of Standards and Technology: NIST Special Publication.
Cloud Computing Services - Amazon Web Service (AWS). (n. d.). https://aws.amazon.com/
Perform the build in the cloud using the account Azure. (n. d.). https://azure.microsoft.com/
The new way to cloud starts here. (n. d.). https://cloud.google.com/
Alibaba Cloud Security Acceleration. (n. d.). https://www.alibabacloud.com/en?_p_lc=7
IBM Cloud: AI-ready, secure and hybrid by design. (n. d.). https://www.ibm.com/cloud
De Novo is a reference provider of VMWare cloud infrastructure. (n. d.). https://denovo.ua/
Cloud infrastructure for any tasks. (n. d.). https://gigacloud.ua/
Radenković, B., & Kočović, P. (2015). From Mainframe to Cloud. Cloud Technology. 116–145. https://doi.org/10.4018/978-1-4666-6539-2.ch006
Lee, G. (2010). Cloud Computing: Principles, Systems and Applications. Springer.
Dotson, C. (2019). Practical Cloud Security: A Guide for Secure Design and Deployment. O’REILLY.
Tanenbaum, A., Wetherall, D. (2021). Computer Networks. Global Edition. Pearson.
Vavilenkova, A. (2023). Methods and Models for Countering Cyberattacks. Kyiv: NA SSU.
Published
How to Cite
Issue
Section
License
Copyright (c) 2024 Анастасія Вавіленкова
This work is licensed under a Creative Commons Attribution-NonCommercial-ShareAlike 4.0 International License.