- OpenStack Cloud Security
- Fabio Alessandro Locati
- 264字
- 2021-07-16 13:28:19
The different kinds of security threats
As we have seen in the previous chapter, when we speak about security, we can mean multiple things. Also, as we have just seen that private and public clouds present different kinds of security issues. We are now going to analyze the various attacks that you can encounter when administering an OpenStack cloud.
Possible attackers
Let's start by identifying the possible attackers we can face. They can be pided in different ways based on their goals; in this case, we will distinguish them as the following:
- Automated attacks/Script kiddies: Automated vulnerability scanning/exploitation.
- Motivated inpiduals: This includes multiple kinds of attackers, such as small-scale industrial espionage, rogue or malicious employees, or disaffected customers. They act alone.
- Highly capable groups: These groups often refer to themselves as Hacktivist and are not typically commercially funded, but can pose a serious threat to service providers and cloud operators. Many groups of hackers have organized themselves lately, such as Lulzsec and Anonymous.
- Organized hackers: These are groups of hackers who are usually highly capable. These groups are financially driven and able to fund in-house to exploit development and target research. Multiple groups fall in this category, from the Russian Business Network to the various organized groups that undertake industrial espionage.
- Intelligence agencies/services: They usually have capabilities greater than any other attacker, because they can bend rules without breaking them and can be authorized to violate rules. Intelligence agencies and other governmental players are comparable to organized hackers, but usually have far more money they can spend on those operations, making them more effective.
推薦閱讀
- HornetQ Messaging Developer’s Guide
- OpenStack Cloud Computing Cookbook(Third Edition)
- DevOps with Kubernetes
- 零基礎PHP學習筆記
- Docker技術(shù)入門與實戰(zhàn)(第3版)
- Java高并發(fā)核心編程(卷2):多線程、鎖、JMM、JUC、高并發(fā)設計模式
- 簡單高效LATEX
- Designing Hyper-V Solutions
- 名師講壇:Java微服務架構(gòu)實戰(zhàn)(SpringBoot+SpringCloud+Docker+RabbitMQ)
- IBM Cognos Business Intelligence 10.1 Dashboarding cookbook
- Go語言編程
- 計算機應用基礎教程(Windows 7+Office 2010)
- 動手打造深度學習框架
- 零代碼實戰(zhàn):企業(yè)級應用搭建與案例詳解
- Node.js實戰(zhàn):分布式系統(tǒng)中的后端服務開發(fā)