官术网_书友最值得收藏!

The different kinds of security threats

As we have seen in the previous chapter, when we speak about security, we can mean multiple things. Also, as we have just seen that private and public clouds present different kinds of security issues. We are now going to analyze the various attacks that you can encounter when administering an OpenStack cloud.

Possible attackers

Let's start by identifying the possible attackers we can face. They can be pided in different ways based on their goals; in this case, we will distinguish them as the following:

  • Automated attacks/Script kiddies: Automated vulnerability scanning/exploitation.
  • Motivated inpiduals: This includes multiple kinds of attackers, such as small-scale industrial espionage, rogue or malicious employees, or disaffected customers. They act alone.
  • Highly capable groups: These groups often refer to themselves as Hacktivist and are not typically commercially funded, but can pose a serious threat to service providers and cloud operators. Many groups of hackers have organized themselves lately, such as Lulzsec and Anonymous.
  • Organized hackers: These are groups of hackers who are usually highly capable. These groups are financially driven and able to fund in-house to exploit development and target research. Multiple groups fall in this category, from the Russian Business Network to the various organized groups that undertake industrial espionage.
  • Intelligence agencies/services: They usually have capabilities greater than any other attacker, because they can bend rules without breaking them and can be authorized to violate rules. Intelligence agencies and other governmental players are comparable to organized hackers, but usually have far more money they can spend on those operations, making them more effective.
主站蜘蛛池模板: 中阳县| 安化县| 凤冈县| 内乡县| 永昌县| 务川| 寿宁县| 元阳县| 靖安县| 大宁县| 德清县| 大庆市| 黔西县| 石家庄市| 海门市| 杭州市| 绍兴县| 徐州市| 曲沃县| 宕昌县| 武宣县| 望江县| 西城区| 古交市| 宾川县| 合山市| 林芝县| 通许县| 山西省| 泸水县| 广水市| 乌拉特前旗| 龙川县| 讷河市| 海兴县| 新蔡县| 宽甸| 钦州市| 台安县| 长葛市| 洱源县|