
Vulnerability Assessment and Penetration Testing Approach Towards Cloud-Based Application and Related Services
Author(s) -
Anjani Kumar Tiwari,
Jatin Patel,
Priyanka Sharma
Publication year - 2021
Publication title -
international journal of scientific research in science, engineering and technology
Language(s) - English
Resource type - Journals
eISSN - 2395-1990
pISSN - 2394-4099
DOI - 10.32628/ijsrset218346
Subject(s) - cloud computing , hacker , exploit , computer science , computer security , cloud computing security , cloud testing , vulnerability (computing) , vulnerability management , software , vulnerability assessment , operating system , psychology , psychological resilience , psychotherapist
Cloud solutions provide a powerful computing platform that enables individuals and Cloud users to perform a wide range of tasks, such as using an online storage system, implementing business applications, developing customized computer software, and establishing a realistic network environment. The number of people using cloud services has increased dramatically in recent years, and a massive amount of data has been stored in cloud computing environments. As a result, data breaches in cloud services are increasing year after year as a result of hackers who are constantly attempting to exploit cloud architecture's security vulnerabilities. In this paper, we investigate and analyse real-world cloud attacks in order to demonstrate the techniques used by hackers against cloud computing systems and how to prevent such malicious activities.