Nt1310 Unit 3.1 Research Paper

660 Words2 Pages

3.1 Network security Challenges

1. SQL injections: Hackers inject a malicious code in order to gain unauthorized access to databases to manipulate the contents, retrieve confidential data or even take control of the web server.

2. Cross-site scripting: Hackers inject malicious scripts, such as JavaScript, VBScript and ActiveX into a web page to execute the scripts on victim’s web browser. The attack could be used for illegal activities to access the victim’s information.

3. Man in the Middle attacks: In this attack, an entity tries to intrude in an ongoing conversation between a cloud server and a client to insert false information and to access information about important data being transferred between them.

4. Sniffer Attacks: These …show more content…

Data Integrity: Sensitive data stored in cloud computing environment emerges as a major issue with regard to security in a cloud based system. Since anyone can access data from the cloud as the data may be public, private or sensitive. So concurrently, many cloud computing users and providers access and modify data. Thus there is a need of some mechanism to ensure data integrity in cloud computing.

2. Data Loss and Leakage: Data loss is a common problem in cloud computing. Data can be lost or damaged due to miss happening, natural disaster, and fire and there will be a loss of information. Data is always in danger of being lost or stolen by unauthorized access. Due to above situation, data may be inaccessible to users.

3. Data Confidentiality: Confidentiality means that only the authorized and intended users are given permission to access the data. Cloud Computing system offers applications and infrastructures which operate on public networks. Therefore, maintaining confidential data of user’s secret in the cloud is a necessity.

4. Losing control over data: Exporting data means losing significant control over data. Large organization don’t want to run a software delivered in the cloud that risk their data through interaction with some other software

More about Nt1310 Unit 3.1 Research Paper

Open Document