Content deleted Content added
m Deduplicate reference |
Reverted 1 edit by 61.246.33.206 (talk): Still spam |
||
(5 intermediate revisions by 4 users not shown) | |||
Line 104:
=== Unauthorized Access to Management interface ===
Due to the autonomous nature of the cloud, consumers are often given management interfaces to monitor their databases. By having controls in such a congregated ___location and by having the interface be easily accessible for convenience for users, there is a possibility that a single actor could gain access to the cloud's management interface; giving them a great deal of control and power over the database.<ref name="Grobauer Walloschek & Stocker 2011">{{cite journal |last1=Grobauer |first1=Bernd |last2=Walloschek |first2=Tobias |last3=Stocker |first3=Elmar |title=Understanding Cloud Computing Vulnerabilities |journal=IEEE Security & Privacy |date=March 2011 |volume=9 |issue=2 |pages=50–57 |doi=10.1109/MSP.2010.115 |s2cid=1156866 }}</ref>
=== Data Recovery Vulnerabilities ===
|