All Tags
AWS
ai
algorithm-design
architecture
browser
cloud
cloud-efficiency
cloud-principles
cost-reduction
data-centric
data-compression
data-processing
deployment
design
documentation
edge-computing
email-sharing
energy-efficiency
energy-footprint
enterprise-optimization
green-ai
hardware
libraries
llm
locality
machine-learning
maintainability
management
measured
microservices
migration
mobile
model-optimization
model-training
multi-objective
network-traffic
parameter-tuning
performance
queries
rebuilding
scaling
services
storage-optimization
strategies
tabs
template
testing
workloads
Tactic: Security threat
Tactic sort:
Dark Tactic
Type: Unsustainable Pattern
Category: cloud-computing
Tags:
Title
Security threat
Description
There are multiple security concerns in cloud computing. One of them, is when the cloud user grants unsupervised access to her own device. This may lead to sensitive information leak if either the cloud provider misuses his access rights or does not provide enough security to prevent third-party attacks. These two issues are related to two of the top threats to cloud computing.
Participant
cloud-user, cloud-provider
Related artifact
Cloud utility services (automatic updates)
Context
Normal operation
Feature
Data protection
Tactic intent
Granting unsupervised access to own device (by cloud user)
Intent measure
Security breaches
Countermeasure
Examples can be found in the important body of work about cloud security issues and solutions (see the paper for references).
Source
*The Dark Side of Cloud and Edge Computing* by Klervie Toczé, Maël Madon, Muriel Garcia and Patricia Lago (DOI: https://doi.org/10.21428/bf6fb269.9422c084)Graphical representation