ITM 820 Lecture Notes - Lecture 5: Point-To-Point Tunneling Protocol, Platform As A Service, Network Security
Document Summary
4 topics: cloud characteristics, cloud computing is based on earlier tech a. i. Cloud computing is a type of it outsourcing. Incompatibility , e. g java vs . net: nos (network operating system) vulnerability linux, windows, paas update/upgrade, e. g upgrading windows r1 -> r2, data leak, software based data leak a. i. Sql injection: hardware based data leak b. i. Memory**: vm data may be leaked through shared storage or shared router/switch. Server memory is shared by many other processes in the form of blocks of memory cells. High priority processes may occupy space shared by low/normal priority processes, data leak may happen. Hardware, network, storage may be attacked e. g ddos attack on a server will cause serious problems for vm"s residing on that server make sure sla agreement addresses this issue. Note: any problems linked to iaas has a direct impact on other layers (saas & paas) Cloud security management: secure hypervisor (controls all vm"s)