{"id":1347,"date":"2024-11-11T11:06:55","date_gmt":"2024-11-11T18:06:55","guid":{"rendered":"https:\/\/wpsites.ucalgary.ca\/jacobson-cpsc\/?p=1347"},"modified":"2024-11-11T11:06:59","modified_gmt":"2024-11-11T18:06:59","slug":"teaching-aide-security-in-cloud-network","status":"publish","type":"post","link":"https:\/\/wpsites.ucalgary.ca\/jacobson-cpsc\/2024\/11\/11\/teaching-aide-security-in-cloud-network\/","title":{"rendered":"(Teaching Aide) Security in Cloud Network"},"content":{"rendered":"\n<p>YouTube video of the Project (Security in Cloud Network) : <a href=\"https:\/\/youtu.be\/Vter7O_6r6c\">https:\/\/youtu.be\/Vter7O_6r6c<\/a><\/p>\n\n\n\n<p><br>In the world of rapid evolution, cloud computing is a heavily relied cloud based solution for industries, organizations and personal users. Cloud is used for storing, processing and managing data along with properties like scalability, cost savings, and increased accessibility. With the benefits also comes the harm.<\/p>\n\n\n\n<p>This project covers some of threats in short and one threat in detail to spread awareness about the attacks, its vulnerabilities and its prevention measures.<\/p>\n\n\n\n<p>Hope you like it.<\/p>\n\n\n\n<p>Thank you.<\/p>\n\n\n\n<p>References Used in Our Project : <\/p>\n\n\n\n<p>Introduction references :&nbsp;<\/p>\n\n\n\n<p>[8] HPE What is Network in the cloud?<\/p>\n\n\n\n<p><a href=\"https:\/\/www.hpe.com\/emea_europe\/en\/what-is\/network-in-the-cloud.html\">https:\/\/www.hpe.com\/emea_europe\/en\/what-is\/network-in-the-cloud.html<\/a><\/p>\n\n\n\n<p>[9] red hat &#8211; types of clouds&nbsp; <a href=\"https:\/\/www.redhat.com\/en\/topics\/cloud-computing\/public-cloud-vs-private-cloud-and-hybrid-cloud\">https:\/\/www.redhat.com\/en\/topics\/cloud-computing\/public-cloud-vs-private-cloud-and-hybrid-cloud<\/a><\/p>\n\n\n\n<p>Overview of some Cloud Threats References :&nbsp;<\/p>\n\n\n\n<p><a href=\"https:\/\/fidelissecurity.com\/threatgeek\/network-security\/common-network-vulnerabilities-and-threats\/#:~:text=5%20Types%20of%20Network%20Security%20Threats%201%201.,5%205.%20SQL%20injection%20and%20other%20cyber-attacks%20\">https:\/\/fidelissecurity.com\/threatgeek\/network-security\/common-network-vulnerabilities-and-threats\/#:~:text=5%20Types%20of%20Network%20Security%20Threats%201%201.,5%205.%20SQL%20injection%20and%20other%20cyber-attacks%20<\/a><\/p>\n\n\n\n<p><a href=\"https:\/\/www.checkpoint.com\/cyber-hub\/network-security\/what-is-network-security\/top-network-security-issues-threats-and-concerns\">https:\/\/www.checkpoint.com\/cyber-hub\/network-security\/what-is-network-security\/top-network-security-issues-threats-and-concerns<\/a><\/p>\n\n\n\n<p><a href=\"https:\/\/www.akamai.com\/glossary\/what-is-cloud-network-security\">https:\/\/www.akamai.com\/glossary\/what-is-cloud-network-security<\/a><\/p>\n\n\n\n<p><a href=\"https:\/\/www.investopedia.com\/terms\/d\/denial-service-attack-dos.asp\">https:\/\/www.investopedia.com\/terms\/d\/denial-service-attack-dos.asp<\/a><\/p>\n\n\n\n<p><a href=\"https:\/\/www.researchgate.net\/publication\/322815452_Simulation_and_analysis_of_DoS_attack_in_cloud_environment\">https:\/\/www.researchgate.net\/publication\/322815452_Simulation_and_analysis_of_DoS_attack_in_cloud_environment<\/a><\/p>\n\n\n\n<p><a href=\"https:\/\/www.linkedin.com\/pulse\/analyzing-monumental-ddos-attacks-github-2018-2015-baek--sq27c\">https:\/\/www.linkedin.com\/pulse\/analyzing-monumental-ddos-attacks-github-2018-2015-baek&#8211;sq27c<\/a><\/p>\n\n\n\n<p><a href=\"https:\/\/www.sentinelone.com\/cybersecurity-101\/cloud-security\/security-risks-of-cloud-computing\">https:\/\/www.sentinelone.com\/cybersecurity-101\/cloud-security\/security-risks-of-cloud-computing<\/a><\/p>\n\n\n\n<p><a href=\"https:\/\/learn.microsoft.com\/en-us\/azure\/firewall\/firewall-faq\">https:\/\/learn.microsoft.com\/en-us\/azure\/firewall\/firewall-faq<\/a><\/p>\n\n\n\n<p><a href=\"https:\/\/hadrian.io\/blog\/fortifying-the-frontline-how-hackers-exploit-misconfigured-firewalls\">https:\/\/hadrian.io\/blog\/fortifying-the-frontline-how-hackers-exploit-misconfigured-firewalls<\/a><\/p>\n\n\n\n<p><a href=\"https:\/\/dl.acm.org\/doi\/10.1145\/3546068#sec-3-2\">https:\/\/dl.acm.org\/doi\/10.1145\/3546068#sec-3-2<\/a><\/p>\n\n\n\n<p><a href=\"https:\/\/cams.mit.edu\/wp-content\/uploads\/capitalonedatapaper.pdf\">https:\/\/cams.mit.edu\/wp-content\/uploads\/capitalonedatapaper.pdf<\/a><\/p>\n\n\n\n<p><a href=\"https:\/\/www.fortinet.com\/resources\/cyberglossary\/security-misconfiguration\">https:\/\/www.fortinet.com\/resources\/cyberglossary\/security-misconfiguration<\/a><\/p>\n\n\n\n<p><a href=\"https:\/\/www.auvik.com\/franklyit\/blog\/insecure-network-protocols\">https:\/\/www.auvik.com\/franklyit\/blog\/insecure-network-protocols<\/a><\/p>\n\n\n\n<p><a href=\"https:\/\/www.wiz.io\/blog\/chaosdb-explained-azures-cosmos-db-vulnerability-walkthrough\">https:\/\/www.wiz.io\/blog\/chaosdb-explained-azures-cosmos-db-vulnerability-walkthrough<\/a><\/p>\n\n\n\n<p><a href=\"https:\/\/learn.microsoft.com\/en-us\/azure\/defender-for-cloud\/recommendations-reference-networking\">https:\/\/learn.microsoft.com\/en-us\/azure\/defender-for-cloud\/recommendations-reference-networking<\/a><\/p>\n\n\n\n<p>&nbsp;<a href=\"https:\/\/nordicdefender.com\/blog\/cloud-network-security-definition\">Cloud Network Security: Definition, Process &amp; Best Practices<\/a><\/p>\n\n\n\n<p><a href=\"https:\/\/www.cloudflare.com\/learning\/security\/glossary\/what-is-lateral-movement\">https:\/\/www.cloudflare.com\/learning\/security\/glossary\/what-is-lateral-movement<\/a><\/p>\n\n\n\n<p><a href=\"https:\/\/unit42.paloaltonetworks.com\/cloud-lateral-movement-techniques\">https:\/\/unit42.paloaltonetworks.com\/cloud-lateral-movement-techniques<\/a><\/p>\n\n\n\n<p><a href=\"https:\/\/sysdig.com\/blog\/lateral-movement-cloud-containers\">https:\/\/sysdig.com\/blog\/lateral-movement-cloud-containers<\/a><\/p>\n\n\n\n<p><a href=\"https:\/\/blogs.microsoft.com\/on-the-issues\/2021\/03\/02\/new-nation-state-cyberattacks\">https:\/\/blogs.microsoft.com\/on-the-issues\/2021\/03\/02\/new-nation-state-cyberattacks<\/a><\/p>\n\n\n\n<p><a href=\"https:\/\/www.wiz.io\/blog\/lateral-movement-risks-in-the-cloud-and-how-to-prevent-them-part-1-the-network-layer\">https:\/\/www.wiz.io\/blog\/lateral-movement-risks-in-the-cloud-and-how-to-prevent-them-part-1-the-network-layer<\/a><\/p>\n\n\n\n<p><a href=\"https:\/\/www.aquasec.com\/cloud-native-academy\/cloud-attacks\/lateral-movement\">https:\/\/www.aquasec.com\/cloud-native-academy\/cloud-attacks\/lateral-movement<\/a><\/p>\n\n\n\n<p>Cloud Security Tools and Technologies :&nbsp;<\/p>\n\n\n\n<p><a href=\"https:\/\/www.sentinelone.com\/cybersecurity-101\/cloud-security\/why-is-cloud-security-important\/\">Why is Cloud Security Important? Key Benefits &amp; Risks<\/a><\/p>\n\n\n\n<p><a href=\"https:\/\/www.crowdstrike.com\/en-us\/cybersecurity-101\/cloud-security\/\">What Is Cloud Security? | CrowdStrike<\/a><\/p>\n\n\n\n<p><a href=\"https:\/\/www.cloudwards.net\/cloud-deployment-models\/\">What Are the 5 Cloud Deployment Models [Explained &amp; Compared]<\/a><\/p>\n\n\n\n<p><a href=\"https:\/\/cloudsecurityalliance.org\/blog\/2023\/09\/14\/understanding-the-shared-responsibility-model-for-cloud-security-how-to-avoid-coverage-gaps-and-confusion\">The Shared Responsibility Model for Cloud Security | CSA<\/a><\/p>\n\n\n\n<p><a href=\"https:\/\/www.pluralsight.com\/resources\/blog\/cloud\/5-pillars-cloud-security\">https:\/\/www.pluralsight.com\/resources\/blog\/cloud\/5-pillars-cloud-security<\/a><\/p>\n\n\n\n<p><a href=\"https:\/\/learn.microsoft.com\/en-us\/entra\/fundamentals\/introduction-identity-access-management\">What is identity and access management (IAM)? &#8211; Microsoft Entra | Microsoft Learn<\/a><\/p>\n\n\n\n<p><a href=\"https:\/\/www.ibm.com\/topics\/identity-access-management\">What is Identity and Access Management (IAM)? | IBM<\/a><\/p>\n\n\n\n<p><a href=\"https:\/\/learn.microsoft.com\/en-us\/compliance\/assurance\/assurance-encryption\">Encryption and key management overview &#8211; Microsoft Service Assurance | Microsoft Learn<\/a><\/p>\n\n\n\n<p><a href=\"https:\/\/www.ibm.com\/topics\/key-management\">What Is Key Management? | IBM<\/a><\/p>\n\n\n\n<p><a href=\"https:\/\/www.fortinet.com\/resources\/cyberglossary\/what-is-siem\">What is SIEM? How does it work? | Fortinet<\/a><\/p>\n\n\n\n<p><a href=\"https:\/\/www.microsoft.com\/en-us\/security\/business\/security-101\/what-is-siem\">What Is SIEM? | Microsoft Security<\/a><\/p>\n\n\n\n<p><a href=\"https:\/\/www.microsoft.com\/en-us\/security\/business\/security-101\/what-is-identity-access-management-iam\">What is Identity Access Management (IAM)? | Microsoft Security<\/a><\/p>\n\n\n\n<p><a href=\"https:\/\/www.ibm.com\/topics\/identity-access-management\">What is Identity and Access Management (IAM)? | IBM<\/a><\/p>\n\n\n\n<p><a href=\"https:\/\/www.ibm.com\/topics\/threat-intelligence\">What is Threat Intelligence? | IBM<\/a><\/p>\n\n\n\n<p><a href=\"https:\/\/www.fortinet.com\/resources\/cyberglossary\/what-is-endpoint-security\">What is Endpoint Security? How Does It Work? | Fortinet<\/a><\/p>\n\n\n\n<p><a href=\"https:\/\/www.analyticsinsight.net\/tech-news\/cloud-migration-challenges-and-how-to-overcome-them\">Cloud Migration Challenges and How to Overcome Them<\/a><\/p>\n\n\n\n<p><a href=\"https:\/\/www.esecurityplanet.com\/cloud\/cloud-security-threats\/\">Top Cloud Security Issues: Threats, Risks, Challenges &amp; Solutions<\/a><\/p>\n\n\n\n<p><a href=\"https:\/\/www.wiz.io\/academy\/cloud-security-challenges\">https:\/\/www.wiz.io\/academy\/cloud-security-challenges<\/a><\/p>\n\n\n\n<p><a href=\"https:\/\/www.crowdstrike.com\/en-us\/cybersecurity-101\/cloud-security\/cloud-security-risks\/\">12 Cloud Security Issues: Risks, Threats &amp; Challenges | CrowdStrike<\/a><\/p>\n\n\n\n<p><a href=\"https:\/\/engineering.fb.com\/2021\/10\/05\/networking-traffic\/outage-details\/\">More details about the October 4 outage &#8211; Engineering at Meta<\/a><\/p>\n\n\n\n<p><a href=\"https:\/\/blog.cloudflare.com\/october-2021-facebook-outage\/\">Understanding how Facebook disappeared from the Internet<\/a><\/p>\n\n\n\n<p><a href=\"https:\/\/rcpmag.com\/articles\/2020\/01\/22\/azure-misconfiguration-exposes-250-million.aspx\">Azure Misconfiguration Exposes 250 Million Microsoft Customer Accounts &#8212; Redmond Channel Partner<\/a><\/p>\n\n\n\n<p><a href=\"https:\/\/www.genx.ca\/lessons-from-the-cloud-misconfiguration-exposing-250-million-of-microsoft-customer-records\">Lessons from Microsoft&#8217;s Azure Misconfiguration<\/a><\/p>\n\n\n\n<p><a href=\"https:\/\/www.capitalone.com\/digital\/facts2019\/\">2019 Capital One Cyber Incident | What Happened | Capital One<\/a><\/p>\n\n\n\n<p><a href=\"https:\/\/krebsonsecurity.com\/2019\/07\/capital-one-data-theft-impacts-106m-people\">https:\/\/krebsonsecurity.com\/2019\/07\/capital-one-data-theft-impacts-106m-people<\/a><\/p>\n\n\n\n<p>DDOS Attack in Detail references :&nbsp;<\/p>\n\n\n\n<p>[1] research gate- Distributed Denial-of-Service (DDoS) Attacks and Defense Mechanisms in Various Web-Enabled Computing Platforms: Issues, Challenges, and Future Research Directions : <a href=\"https:\/\/www.researchgate.net\/publication\/363114413_Distributed_Denial-of-Service_DDoS_Attacks_and_Defense_Mechanisms_in_Various_Web-Enabled_Computing_Platforms_Issues_Challenges_and_Future_Research_Directions\">https:\/\/www.researchgate.net\/publication\/363114413_Distributed_Denial-of-Service_DDoS_Attacks_and_Defense_Mechanisms_in_Various_Web-Enabled_Computing_Platforms_Issues_Challenges_and_Future_Research_Directions<\/a><\/p>\n\n\n\n<p>[4] N. Agrawal and S. Tapaswi, &#8220;Defense mechanisms against DDoS attacks in a cloud computing environment: State-of-the-art and research challenges,&#8221;<a href=\"https:\/\/ieeexplore.ieee.org\/document\/8794618\">https:\/\/ieeexplore.ieee.org\/document\/8794618<\/a> , 2019.&nbsp;<\/p>\n\n\n\n<p>[5] N. Agrawal and S. Tapaswi, A Lightweight Approach to Detect the Low\/High Rate IP Spoofed Cloud DDoS Attacks <a href=\"https:\/\/ieeexplore.ieee.org\/abstract\/document\/8315365\">https:\/\/ieeexplore.ieee.org\/abstract\/document\/8315365<\/a><\/p>\n\n\n\n<p>[6] Joshi, B., Vijayan, A. S., &amp; Joshi, B. K. (2012, January). Securing cloud computing environment against DDoS attacks.<\/p>\n\n\n\n<p><a href=\"https:\/\/ieeexplore.ieee.org\/document\/6158817\">https:\/\/ieeexplore.ieee.org\/document\/6158817<\/a><\/p>\n\n\n\n<p>[7] Mitigating DDoS Attacks in Cloud Computing Environments: Challenges and Strategies <a href=\"https:\/\/www.researchgate.net\/publication\/377599351_Mitigating_DDoS_Attacks_in_Cloud_Computing_Environments_Challenges_and_Strategies\">https:\/\/www.researchgate.net\/publication\/377599351_Mitigating_DDoS_Attacks_in_Cloud_Computing_Environments_Challenges_and_Strategies<\/a><\/p>\n\n\n\n<p>[19] R. K. Deka, D. K. Bhattacharyya, and J. K. Kalita, &#8220;Ddos attacks: Tools, mitigation approaches, and probable impact on private cloud environment,&#8221; <em>Big Data Analytics for Internet of Things, <\/em>pp. 285- 319, 2021.<\/p>\n\n\n\n<p>[20] &nbsp; &nbsp; &nbsp; &nbsp; B. B. Gupta and A. Dahiya, <em>Distributed Denial of<\/em><\/p>\n\n\n\n<p><em>Service (DDoS) Attacks: Classification, Attacks,Challenges and Countermeasures<\/em>: CRC press, 2021.<\/p>\n\n\n\n<p>&nbsp;[22] A. Odeh, &#8220;Taxonomy of Cluster-Based Target<\/p>\n\n\n\n<p>Tracking System in Wireless Sensor Networks,&#8221;<em>International Journal of Sensors Wireless Communications and Control, <\/em>vol. 10, pp.<\/p>\n\n\n\n<p>649- 658, 2020.&nbsp;<\/p>\n\n\n\n<p>[9] ResearchGate &#8211; A Survey on Mitigation Techniques Against DDoS Attacks on Cloud Computing Architecture<\/p>\n\n\n\n<p><a href=\"https:\/\/www.researchgate.net\/publication\/336923078_A_Survey_on_Mitigation_Techniques_Against_DDoS_Attacks_on_Cloud_Computing_Architecture\">https:\/\/www.researchgate.net\/publication\/336923078_A_Survey_on_Mitigation_Techniques_Against_DDoS_Attacks_on_Cloud_Computing_Architecture<\/a><\/p>\n\n\n\n<p>&nbsp;[2] <a href=\"https:\/\/www.sciencedirect.com\/science\/article\/pii\/S2665917423003276\">https:\/\/www.sciencedirect.com\/science\/article\/pii\/S2665917423003276<\/a><\/p>\n","protected":false},"excerpt":{"rendered":"<p>YouTube video of the Project (Security in Cloud Network) : https:\/\/youtu.be\/Vter7O_6r6c In the world of rapid evolution, cloud computing is a heavily relied cloud based solution for industries, organizations and personal users. Cloud is used for storing, processing and managing data along with properties like scalability, cost savings, and increased accessibility. With the benefits also &hellip; <\/p>\n<p class=\"link-more\"><a href=\"https:\/\/wpsites.ucalgary.ca\/jacobson-cpsc\/2024\/11\/11\/teaching-aide-security-in-cloud-network\/\" class=\"more-link\">Continue reading<span class=\"screen-reader-text\"> &#8220;(Teaching Aide) Security in Cloud Network&#8221;<\/span><\/a><\/p>\n","protected":false},"author":686,"featured_media":0,"comment_status":"open","ping_status":"open","sticky":false,"template":"","format":"standard","meta":{"ngg_post_thumbnail":0,"footnotes":""},"categories":[1],"tags":[36],"class_list":["post-1347","post","type-post","status-publish","format-standard","hentry","category-uncategorized","tag-isec603-teaching-aide","entry"],"featured_image_src":null,"featured_image_src_square":null,"author_info":{"display_name":"Krupali Kanubhai Patel","author_link":"https:\/\/wpsites.ucalgary.ca\/jacobson-cpsc\/author\/krupali-kanubhai-patel\/"},"_links":{"self":[{"href":"https:\/\/wpsites.ucalgary.ca\/jacobson-cpsc\/wp-json\/wp\/v2\/posts\/1347","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/wpsites.ucalgary.ca\/jacobson-cpsc\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/wpsites.ucalgary.ca\/jacobson-cpsc\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/wpsites.ucalgary.ca\/jacobson-cpsc\/wp-json\/wp\/v2\/users\/686"}],"replies":[{"embeddable":true,"href":"https:\/\/wpsites.ucalgary.ca\/jacobson-cpsc\/wp-json\/wp\/v2\/comments?post=1347"}],"version-history":[{"count":1,"href":"https:\/\/wpsites.ucalgary.ca\/jacobson-cpsc\/wp-json\/wp\/v2\/posts\/1347\/revisions"}],"predecessor-version":[{"id":1349,"href":"https:\/\/wpsites.ucalgary.ca\/jacobson-cpsc\/wp-json\/wp\/v2\/posts\/1347\/revisions\/1349"}],"wp:attachment":[{"href":"https:\/\/wpsites.ucalgary.ca\/jacobson-cpsc\/wp-json\/wp\/v2\/media?parent=1347"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/wpsites.ucalgary.ca\/jacobson-cpsc\/wp-json\/wp\/v2\/categories?post=1347"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/wpsites.ucalgary.ca\/jacobson-cpsc\/wp-json\/wp\/v2\/tags?post=1347"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}