Cloud computing security: Difference between revisions

Content deleted Content added
m Deduplicate reference
Reverted 1 edit by 61.246.33.206 (talk): Still spam
 
(5 intermediate revisions by 4 users not shown)
Line 104:
 
=== Unauthorized Access to Management interface ===
Due to the autonomous nature of the cloud, consumers are often given management interfaces to monitor their databases. By having controls in such a congregated ___location and by having the interface be easily accessible for convenience for users, there is a possibility that a single actor could gain access to the cloud's management interface; giving them a great deal of control and power over the database.<ref name="Grobauer Walloschek & Stocker 2011">{{cite journal |last1=Grobauer |first1=Bernd |last2=Walloschek |first2=Tobias |last3=Stocker |first3=Elmar |title=Understanding Cloud Computing Vulnerabilities |journal=IEEE Security & Privacy |date=March 2011 |volume=9 |issue=2 |pages=50–57 |doi=10.1109/MSP.2010.115 |s2cid=1156866 }}</ref>
 
=== Data Recovery Vulnerabilities ===