z-logo
open-access-imgOpen Access
Vulnerability Assessment and Penetration Testing Approach Towards Cloud-Based Application and Related Services
Author(s) -
Anjani Kumar Tiwari,
Jatin Patel,
Priyanka Sharma
Publication year - 2021
Publication title -
international journal of scientific research in science, engineering and technology
Language(s) - English
Resource type - Journals
eISSN - 2395-1990
pISSN - 2394-4099
DOI - 10.32628/ijsrset218346
Subject(s) - cloud computing , hacker , exploit , computer science , computer security , cloud computing security , cloud testing , vulnerability (computing) , vulnerability management , software , vulnerability assessment , operating system , psychology , psychological resilience , psychotherapist
Cloud solutions provide a powerful computing platform that enables individuals and Cloud users to perform a wide range of tasks, such as using an online storage system, implementing business applications, developing customized computer software, and establishing a realistic network environment. The number of people using cloud services has increased dramatically in recent years, and a massive amount of data has been stored in cloud computing environments. As a result, data breaches in cloud services are increasing year after year as a result of hackers who are constantly attempting to exploit cloud architecture's security vulnerabilities. In this paper, we investigate and analyse real-world cloud attacks in order to demonstrate the techniques used by hackers against cloud computing systems and how to prevent such malicious activities.

The content you want is available to Zendy users.

Already have an account? Click here to sign in.
Having issues? You can contact us here