Journal of Computer Engineering & Information TechnologyISSN : 2324-9307

Reach Us +1 850 754 6199

Research Article, J Comput Eng Inf Technol Vol: 4 Issue: 2

Identifying Vulnerabilities in Cloud Computing Using Penetration Test

Matias RPS1* and Raimundo PC1*
1Estácio – Ceut, Teresina, Brazil
2University Federal do Maranhão, Brazil
Corresponding author :Matias RPS
Estácio – Ceut, Teresina, Brasil
E-mail: [email protected], [email protected]
Received: June 16, 2015 Accepted: July 24, 2015 Published: July 31, 2015
Citation: Matias RPS, Raimundo PC (2015) Fuzzy Controller Design for Refrigerators. J Comput Eng Inf Technol 4:2. doi:10.4172/2324-9307.1000130

Abstract

Identifying Vulnerabilities in Cloud Computing Using Penetration Test

Cloud computing appears as one of the hottest fields of information technology and make this computational model one of most interesting to invaders. In this paper, we will present some of the strategies used by Cyber attackers attempting to successful invasion of Cloud servers, as also in various computer applications to their interests. Providing overview of hacking techniques, understand the ways and the main threats needed to identifies and resolve the issue. With the growing popularity of this computational model, the number of attackers tends to grow too. As well as the complexity of the systems is increasing, the tools used for invasion also have developed. Bringing it to Cloud Computing, we have to consider the information of thousands users that in some way can be used for leakage or elicit activities.

Keywords: Cloud computing; Cyber-attack; Attackers

Track Your Manuscript

Share This Page