草庐IT

云计算第六章

愚生浅末 2023-03-28 原文

Fundamental Cloud Security基本云安全

Basic Terms and Concepts

§ Information security protects the integrity of and access to computer systems and data.
信息安全:保护计算机系统和数据的完整性和对它们的访问。
§ IT security measures aim to defend against threats and interference that arise from both malicious intent and unintentional user error.
IT安全措施:防御由于恶意的企图和无心的用户错误造成的威胁和干扰

Confidentiality 保密性

  • Confidentiality is the characteristic of something being made accessible only to authorized parties
    信息只被授权用户使用
  • Within cloud environments, confidentiality primarily pertains to restricting access to data in transit and storage.

Integrity 完整性

  • Integrity is the characteristic of not having been altered by an unauthorized party.
  • a cloud consumer can be guaranteed that the data it transmits to a cloud service matches the data received by that cloud service.

Authenticity 真实性

  • Authenticity is the characteristic of something having been provided by an authorized source.
    信息是由经过授权的源提供的这一特性
  • Authentication in non-repudiable(不可否认) interactions provides proof that these interactions are uniquely linked to an authorized source.

Availability 可用性

  • Availability is the characteristic of being accessible and usable during a specified time period.
    在特定的时间段内可以访问和可以使用的特性

Threat 威胁

  • A threat is a potential security violation that can challenge defenses in an attempt to breach privacy and/or cause harm.
    一种潜在的安全性违反,企图侵犯隐私和/或造成伤害,以此可以挑战防御。

1.Both manually and automatically instigated(激起) threats are designed to exploit (利用 )known weaknesses, also referred to as vulnerabilities(漏洞 ).
2.A threat that is carried out results in an attack.

Vulnerability 漏洞

A vulnerability is a weakness that can be exploited either because it is protected by ①insufficient(不足的) security controls, or because ②existing security controls are overcome by an attack.
漏洞是一种可能被利用的弱点

IT resource vulnerabilities can have a range of causes, including configuration deficiencies(缺陷), security policy weaknesses, user errors, hardware or firmware(固件) flaws, software bugs, and poor security architecture.

Risk 风险

Risk is the possibility of loss or harm arising from performing an activity.
风险是指执行一个行为带来损失或危害的可能性。

Risk is typically measured according to① its threat level and the② number of possible or known vulnerabilities.

Two metrics(标准) :

the probability of a threat occurring to exploit vulnerabilities in the IT resource 威胁的可能性
the expectation of loss upon the IT resource being compromised损失预期

Security Controls 安全控制

Security controls are countermeasures(对策) used to prevent or respond to security threats and to reduce or avoid risk.

安全控制是用来预防或应对安全威胁,减少或避免风险的对策。

maximum protection of sensitive and critical IT resources.

Security Mechanisms 安全机制

Countermeasures are typically described in terms of security mechanisms, which are components comprising a defensive framework that protects IT resources, information, and services.

对策通常以安全机制的形式来描述,安全机制是构成保护IT资源、信息和服务的防御框架的组件部分。

Security Policies安全策略

A security policy establishes a set of security rules and regulations.
安全策略建立了一套安全规则和规章。

For example, the positioning(定位) and usage of security controls and mechanisms can be determined by security policies.

Threat Agents 威胁作俑者

A threat agent is an entity that ①poses a threat because it is capable of ②carrying out an attack.
一个威胁作俑者是一个构成威胁的实体

Cloud security threats can originate either internally or externally①, from ②humans or software programs.

↻Anonymous Attacker 匿名攻击者
↻Malicious Service Agent恶意服务作俑者
↻Trusted Attacker 授信的攻击者
↻Malicious Insider 恶意的内部人员

Anonymous Attacker 匿名攻击者

An anonymous attacker is a non-trusted cloud service consumer without permissions in the cloud .
云中没有权限、不被信任的云服务用户

匿名攻击者是不被信任的威胁作俑者,通常试图从云边界的外部进行攻击。

It typically exists as
①an external software program that launches network-level attacks through public networks.(方式)
anonymous attackers often resort to(采取)
②committing acts like bypassing user accounts or stealing user credentials, while using methods that either
③ensure anonymity or require substantial resources for prosecution(检举)(匿名的含义)

Malicious Service Agent恶意服务作俑者

A malicious service agent is able to intercept and forward the network traffic that flows within a cloud . 能够拦截和转发云中的网络流量

恶意服务作俑者截取网络通信,试图恶意地使用或篡改数据

It typically exists as①a service agent (or a program pretending to be a service agent) with compromised(损坏) or malicious logic.
It may also exist as ②an external program able to remotely intercept and potentially corrupt(破坏)message contents.

Trusted Attacker 授信的攻击者

A trusted attacker shares IT resources in the same cloud environment as ①the cloud consumer and attempts to exploit legitimate credentials to ②target cloud providers and the cloud tenants with whom they share IT resources

①与同一云环境中的云用户共享IT资源 ②试图利用合法的证书来把云提供者以及与他们共享IT 资源的云租户 作为攻击目标

trusted attackers usually launch their attacks from ①within a cloud’s trust boundaries by abusing legitimate credentials or via the appropriation(挪用) of sensitive and confidential information
Trusted attackers (also known as② malicious tenants)恶意租户

Malicious Insider 恶意的内部人员

Malicious insiders are ①human threat agents acting on behalf of or in relation to ②the cloud provider.
恶意的内部人员是人为的威胁和云提供者有关的代理者
是试图滥用对云资源范围的访问特权的人

They are typically current or former employees or third parties with access to the cloud provider’s premises.
现任或前任雇员或者能够访问云提供者资源第三方
This type of threat agent carries tremendous damage potential 会带来巨大的破坏可能性

Note 注释:
A notation(符号) used to represent a general form of human-driven attack is the workstation combined with a lightning(闪电) bolt

表示通过工作站发起攻击的记号

Cloud Security Threats云安全威胁

↻Traffic Eavesdropping 流量窃听
↻Malicious Intermediary恶意媒介
↻Denial of Service 拒绝服务
↻Insufficient Authorization 授权不足
↻Virtualization Attack 虚拟化攻击
↻Overlapping Trust Boundaries 信任边界重叠

Traffic Eavesdropping 流量窃听

Traffic eavesdropping occurs when data being transferred to or within a cloud (①usually from the cloud consumer to the cloud provider) is passively intercepted by a ②malicious service agent for illegitimate information gathering purposes .
数据在传输过程被动地被恶意的服务作用者截获,非法的收集信息

The aim of this attack is to directly compromise(破坏) the confidentiality .
it can more easily go undetected for extended periods of time.

Malicious Intermediary恶意媒介

The malicious intermediary threat arises when messages are intercepted and altered by a malicious service agent.
此威胁是指消息被恶意服务作用者截获并被篡改

compromising(破坏)the message’s confidentiality and/or integrity.
also insert harmful data into the message before forwarding it to its destination.

Denial of Service 拒绝服务

The ①objective of the denial of service (DoS) attack is to ②overload IT resources to the point where they cannot function properly.
IT资源陷于瘫痪或不可用 =>无法提供正常的服务

Insufficient Authorization 授权不足

The insufficient authorization attack occurs when access is granted to an attacker erroneously(错误地)or too broadly.
错误地授予了攻击者的访问权限或者授权太宽泛

Resulting in the attacker getting access to IT resources that are normally protected.

A variation of this attack, known as weak authentication(弱认证), can result when weak password or shared accounts are used to protect IT resources.
一种变种称为弱认证

Virtualization Attack 虚拟化攻击

A virtualization attack exploits ①vulnerabilities(漏洞)in the virtualization platform to jeopardize(危害) its confidentiality(保密性), integrity (完整性), and/or availability (可用性).

An authorized cloud service consumer carries out a virtualization attack by ①abusing its administrative access to a virtual server to② exploit the underlying hardware

Overlapping Trust Boundaries 信任边界重叠

If physical IT resources within a cloud are shared by different cloud service consumers, these cloud service consumers have overlapping trust boundaries.

Malicious cloud service consumers can target shared IT resources with the intention of compromising cloud consumers or other IT resources that share the same trust boundary.

--恶意的云服务用户可以把目标设定为共享的IT资源,意图损害其他共享同样信任边界的云服务用户或IT资源
--重叠的信任边界潜藏了一个威胁,攻击者可以利用多个云用户共享的基于云的IT资源。

Summary

Basic Terms and Concepts

  • Confidentiality 保密性
  • Integrity 完整性
  • Authenticity 真实性
  • Availability 可用性
  • Threat 威胁
  • Vulnerability 漏洞
  • Risk 风险
  • Security Controls 安全控制
  • Security Mechanisms 安全机制
  • Security Policies安全策略

Threat Agents 威胁作俑者

  • Anonymous Attacker 匿名攻击者
  • Malicious Service Agent恶意服务作用者
  • Trusted Attacker 授信的攻击者
  • Malicious Insider 恶意的内部人员

Cloud Security Threats云安全威胁

  • Traffic Eavesdropping 流量窃听→保密性
  • Malicious Intermediary恶意媒介→保密性,完整性
  • Denial of Service 拒绝服务→可用性
  • Insufficient Authorization 授权不足→保密性,完整性
  • Virtualization Attack 虚拟化攻击→保密性,完整性,可用性
  • Overlapping Trust Boundaries 信任边界重叠→保密性,完整性,可用性

欢迎访问我的个人博客:https://kohler19.gitee.io/

欢迎关注公众号“愚生浅末”

有关云计算第六章的更多相关文章

  1. ruby-on-rails - 使用一系列等级计算字母等级 - 2

    这里是Ruby新手。完成一些练习后碰壁了。练习:计算一系列成绩的字母等级创建一个方法get_grade来接受测试分数数组。数组中的每个分数应介于0和100之间,其中100是最大分数。计算平均分并将字母等级作为字符串返回,即“A”、“B”、“C”、“D”、“E”或“F”。我一直返回错误:avg.rb:1:syntaxerror,unexpectedtLBRACK,expecting')'defget_grade([100,90,80])^avg.rb:1:syntaxerror,unexpected')',expecting$end这是我目前所拥有的。我想坚持使用下面的方法或.join,

  2. 计算机毕业设计ssm+vue基本微信小程序的小学生兴趣延时班预约小程序 - 2

    项目介绍随着我国经济迅速发展,人们对手机的需求越来越大,各种手机软件也都在被广泛应用,但是对于手机进行数据信息管理,对于手机的各种软件也是备受用户的喜爱小学生兴趣延时班预约小程序的设计与开发被用户普遍使用,为方便用户能够可以随时进行小学生兴趣延时班预约小程序的设计与开发的数据信息管理,特开发了小程序的设计与开发的管理系统。小学生兴趣延时班预约小程序的设计与开发的开发利用现有的成熟技术参考,以源代码为模板,分析功能调整与小学生兴趣延时班预约小程序的设计与开发的实际需求相结合,讨论了小学生兴趣延时班预约小程序的设计与开发的使用。开发环境开发说明:前端使用微信微信小程序开发工具:后端使用ssm:VU

  3. ruby - 如何计算 Liquid 中的变量 +1 - 2

    我对如何计算通过{%assignvar=0%}赋值的变量加一完全感到困惑。这应该是最简单的任务。到目前为止,这是我尝试过的:{%assignamount=0%}{%forvariantinproduct.variants%}{%assignamount=amount+1%}{%endfor%}Amount:{{amount}}结果总是0。也许我忽略了一些明显的东西。也许有更好的方法。我想要存档的只是获取运行的迭代次数。 最佳答案 因为{{incrementamount}}将输出您的变量值并且不会影响{%assign%}定义的变量,我

  4. ruby - 使用 Ruby,计算 n x m 数组的每一列中有多少个 true 的简单方法是什么? - 2

    给定一个nxmbool数组:[[true,true,false],[false,true,true],[false,true,true]]有什么简单的方法可以返回“该列中有多少个true?”结果应该是[1,3,2] 最佳答案 使用转置得到一个数组,其中每个子数组代表一列,然后将每一列映射到其中的true数:arr.transpose.map{|subarr|subarr.count(true)}这是一个带有inject的版本,应该在1.8.6上运行,没有任何依赖:arr.transpose.map{|subarr|subarr.in

  5. arrays - 计算数组中的匹配元素 - 2

    给定两个大小相等的数组,如何找到不考虑位置的匹配元素的数量?例如:[0,0,5]和[0,5,5]将返回2的匹配项,因为有一个0和一个5共同;[1,0,0,3]和[0,0,1,4]将返回3的匹配项,因为0有两场,1有一场;[1,2,2,3]和[1,2,3,4]将返回3的匹配项。我尝试了很多想法,但它们都变得相当粗糙和令人费解。我猜想有一些不错的Ruby习惯用法,或者可能是一个正则表达式,可以很好地回答这个解决方案。 最佳答案 您可以使用count完成它:a.count{|e|index=b.index(e)andb.delete_at

  6. ruby-on-rails - 如何计算 Ruby/Rails 中 JSON 对象的数量 - 2

    Ruby中如何“一般地”计算以下格式(有根、无根)的JSON对象的数量?一般来说,我的意思是元素可能不同(例如“标题”被称为其他东西)。没有根:{[{"title":"Post1","body":"Hello!"},{"title":"Post2","body":"Goodbye!"}]}根包裹:{"posts":[{"title":"Post1","body":"Hello!"},{"title":"Post2","body":"Goodbye!"}]} 最佳答案 首先,withoutroot代码不是有效的json格式。它将没有包

  7. ruby - 如何计算自 Ruby 中给定日期以来的周数? - 2

    目标我正在尝试计算自给定日期以来周的距离,而无需跳过任何步骤。我更喜欢用普通的Ruby来做,但ActiveSupport无疑是一个可以接受的选择。我的代码我写了以下内容,这似乎可行,但对我来说似乎还有很长的路要走。require'date'DAYS_IN_WEEK=7.0defweeks_sincedate_stringdate=Date.parsedate_stringdays=Date.today-dateweeks=days/DAYS_IN_WEEKweeks.round2endweeks_since'2015-06-15'#=>32.57ActiveSupport的#weeks

  8. 最新版人脸识别小程序 图片识别 生成二维码签到 地图上选点进行位置签到 计算签到距离 课程会议活动打卡日常考勤 上课签到打卡考勤口令签到 - 2

    技术选型1,前端小程序原生MINA框架cssJavaScriptWxml2,管理后台云开发Cms内容管理系统web网页3,数据后台小程序云开发云函数云开发数据库(基于MongoDB)云存储4,人脸识别算法基于百度智能云实现人脸识别一,用户端效果图预览老规矩我们先来看效果图,如果效果图符合你的需求,就继续往下看,如果不符合你的需求,可以跳过。1-1,登录注册页可以看到登录页有注册入口,注册页如下我们的注册,需要管理员审核,审核通过后才可以正常登录使用小程序1-2,个人中心页登录成功以后,我们会进入个人中心页我们在个人中心页可以注册人脸,因为我们做人脸识别签到,需要先注册人脸才可以进行人脸比对,进

  9. ruby - 如何计算两个字符串共有的字符数? - 2

    如何计算两个字符串之间的字符交集?例如(假设我们有一个名为String.intersection的方法):"abc".intersection("ab")=2"hello".intersection("hallo")=4好的,男孩女孩们,感谢你们的大量反馈。更多示例:"aaa".intersection("a")=1"foo".intersection("bar")=0"abc".intersection("bc")=2"abc".intersection("ac")=2"abba".intersection("aa")=2一些补充说明:维基百科定义intersection如下:Int

  10. python - 如何计算文件中唯一字符的数量? - 2

    给定一个包含各种语言字符的UTF-8文件,我如何计算它包含的唯一字符的数量,同时排除选定数量的符号(例如:“!”、“@”、"#",".")从这个算起? 最佳答案 这是一个bash解决方案。:)bash$perl-CSD-ne'BEGIN{$s{$_}++forsplit//,q(!@#.)}$s{$_}++||$c++forsplit//;END{print"$c\n"}'*.utf8 关于python-如何计算文件中唯一字符的数量?,我们在StackOverflow上找到一个类似的问题

随机推荐