Cloud computing security: Difference between revisions

Content deleted Content added
Citation bot (talk | contribs)
Alter: template type, journal. Add: url, isbn, pages, date, title, chapter, s2cid, authors 1-2. | Use this bot. Report bugs. | Suggested by Chris Capoccia | #UCB_toolbar
ce
Line 131:
The attacks that can be made on cloud computing systems include [[Man-in-the-middle attack|man-in-the middle]] attacks, [[phishing]] attacks, authentication attacks, and malware attacks. One of the largest threats is considered to be malware attacks, such as [[Trojan horse (computing)|Trojan horses]].
 
Recent research conducted in 2022 has revealed that the Trojan horse injection method is a serious problem with harmful impacts on cloud computing systems. A Trojan attack on cloud systems tries to insert an application or service into the system that can impact the cloud services by changing or stopping the functionalities. When the cloud system identifies the attacks as legitimate, the service or application is performed which can damage and infect the cloud system.<ref>{{cite journal |last1=Kanaker |first1=Hasan |last2=Abdel Karim |first2=Nader |last3=A.B. Awwad |first3=Samer |last4=H.A. Ismail |first4=Nurul |last5=Zraqou |first5=Jamal |last6=M. F. Al ali |first6=Abdulla |title=Trojan Horse Infection Detection in Cloud Based Environment Using Machine Learning |journal=International Journal of Interactive Mobile Technologies (IJIM) |date=20 December 2022 |volume=16 |issue=24 |pages=81–106 |doi=10.3991/ijim.v16i24.35763 |doi-access=free }}</ref>
 
==Encryption==