End User Attacks and Web hosting

There are several end user attacks on the web that hackers try to use to attack websites which are important to note while web hosting.  The first in the list is injection attacks are SQL (structured Query Language Injection) where a database is modified by injecting a code into the database query. Others include DDos (distributed denial of service) which overwhelms a website; Brute force used to crack username and password on a website; Cross site scripting where malicious scripts are injected into a harmless website. Get the hostgator coupon to enable you get free codes and deals from Hostgator.com, the leading company in webhosting.

Attacks While Using Cloud Technology on Web site 

End user attacks on cloud technology include phishing, fraud and exploitation of software vulnerabilities still work and can threaten the cloud service infrastructure. Phishing and fraud are attempt to steal the identity of a legitimate user, such as usernames, passwords, and credit card details. How does phishing occur? The user sends an email with a link which appears to be for a legitimate website, his username and password will be sent to the attacker who can use them to attack the cloud. An email can also be sent to the user that pretends to come from the cloud provider and ask the user to supply his username and password for maintenance purposes. To counter this, the use of Spam filters, plug in spam blocker in the internet browser and training user not to respond to any spoofed email is used.

webhosting

Network Security Alerts on Website using Cloud Technology

Cloud technology depends on existing network infrastructure which are LAN, MAN and WAN. This makes cloud computing to be exposed to the same security attacks. Users outside the cloud can still attack the cloud or a malicious inside user can still attack the cloud using the CSP. This can be done by interrupting the data to/from the cloud. The only way to counter this is to strengthen the security of the cloud computing.

Cloud Technology and exploitation of software vulnerabilities

Exploitation of software vulnerabilities refers to any flaw or weakness that can be found in an operating system or software that leads to security breaches. With this breach, an attack will find a way of implanting a malware for own use. Examples of this cloud technology attacks are: buffer overflow where the OS or software hangs and uncontrolled format string can be used to crash a program or to execute a malicious code. To counter this, software manufacturers normally release regular updates to address these flaws. It is important to frequently update the system with the latest security updates to mitigate these attacks. 

Conclusion of Website Security Attack on the Cloud

Cloud technology is an emerging technology in the IT world. It serves as a very attractive solution when the infrastructure or the IT personnel are not in a position to counter a problem or are too expensive. Though it is good, it has its own drawbacks which are mainly found in the security area and the vulnerability of the cloud computing. Unlike the traditional solutions where threats come from two known sources inside or outside the network, cloud computing security threats might originate from different sources thus, application, network and user level.

Leave a Reply

Your email address will not be published. Required fields are marked *