Skip to Main Content
Hacking: The Next Generation
book

Hacking: The Next Generation

by Nitesh Dhanjani, Billy Rios, Brett Hardin
August 2009
Beginner content levelBeginner
298 pages
9h 5m
English
O'Reilly Media, Inc.
Content preview from Hacking: The Next Generation

Chapter 5. Cloud Insecurity: Sharing the Cloud with Your Enemy

Cloud computing is seen as the next generation of computing. The benefits, cost savings, and business justifications for moving to a cloud-based environment are compelling. Cloud computing is the culmination of the increased computing power, available bandwidth, and need for businesses to focus on their non-IT core competencies. Cloud offerings typically consist of thousands of machines working in parallel and sharing the load seamlessly to provide the scalability and power that have become the hallmark of cloud-based offerings. Various cloud providers make the power of these massive clouds available to the public. This computing power is unparalleled and unlike anything previously encountered. With cloud offerings, even the smallest organizations can scale to meet any demand.

In an ideal world, organizations “share” the cloud, logically separated from each other by the cloud provider, operating independently of each other in a sandbox, pulling resources only when needed, and respecting the separation put in place by the cloud provider. In the real world, applications uploaded to the cloud are trying to break out of their sandbox, attempting to gain access to other applications and hardware and trying to consume resources. The next-generation hacker understands that he has complete control of what the cloud runs; he knows cloud security is immature and developing. The next-generation hacker is positioning himself to take ...

Become an O’Reilly member and get unlimited access to this title plus top books and audiobooks from O’Reilly and nearly 200 top publishers, thousands of courses curated by job role, 150+ live events each month,
and much more.
Start your free trial

You might also like

Building a Modern Security Program

Building a Modern Security Program

Zane Lackey, Rebecca Huehls
Network Security Hacks

Network Security Hacks

Andrew Lockhart
Ransomware

Ransomware

Allan Liska, Timothy Gallo

Publisher Resources

ISBN: 9780596806309Errata Page