All Tags
AWS
algorithm-design
architecture
cloud-principles
cost-reduction
data-centric
data-compression
data-processing
deployment
design
edge-computing
energy-footprint
hardware
libraries
locality
machine-learning
management
measured
migration
model-optimization
model-training
performance
queries
rebuilding
scaling
services
strategies
template
workloads
Tactic: Security threat
Tactic sort:
Dark Tactic
Type: Unsustainable Pattern
Category: cloud-computing
Tags:
Title
Security threat
Description
There are multiple security concerns in cloud computing. One of them, is when the cloud user grants unsupervised access to her own device. This may lead to sensitive information leak if either the cloud provider misuses his access rights or does not provide enough security to prevent third-party attacks. These two issues are related to two of the top threats to cloud computing.
Participant
cloud-user, cloud-provider
Related artifact
Cloud utility services (automatic updates)
Context
Normal operation
Feature
Data protection
Tactic intent
Granting unsupervised access to own device (by cloud user)
Intent measure
Security breaches
Countermeasure
Examples can be found in the important body of work about cloud security issues and solutions (see the paper for references).