31.08.2022 Views

Cyber Defense eMagazine September Edition for 2022 #CDM

#CYBERDEFENSEMAG @CyberDefenseMag by @Miliefsky a world-renowned cyber security expert and the Publisher of Cyber Defense Magazine as part of the Cyber Defense Media Group as well as Yan Ross, Editor-in-Chief and many more writers, partners and supporters who make this an awesome publication! Thank you all and to our readers! OSINT ROCKS! #CDM #CDMG #OSINT #CYBERSECURITY #INFOSEC #BEST #PRACTICES #TIPS #TECHNIQUES

#CYBERDEFENSEMAG @CyberDefenseMag by @Miliefsky a world-renowned cyber security expert and the Publisher of Cyber Defense Magazine as part of the Cyber Defense Media Group as well as Yan Ross, Editor-in-Chief and many more writers, partners and supporters who make this an awesome publication! Thank you all and to our readers! OSINT ROCKS! #CDM #CDMG #OSINT #CYBERSECURITY #INFOSEC #BEST #PRACTICES #TIPS #TECHNIQUES

SHOW MORE
SHOW LESS

You also want an ePaper? Increase the reach of your titles

YUMPU automatically turns print PDFs into web optimized ePapers that Google loves.

trustworthiness and accountability. Moreover, misconfigured cloud systems must be fixed on priority.<br />

Regular analysis <strong>for</strong> providing authorization and validation to certain personnel should be conducted.<br />

This will prevent data and financial losses. Moreover, it will maintain the credibility among your customers<br />

<strong>for</strong> keeping their data and in<strong>for</strong>mation safe from potential threats.<br />

• Ensuring proper security of APIs<br />

Application programming interfaces (APIs) allow two applications to connect, interact, and transmit data.<br />

These APIs provide an access of software plat<strong>for</strong>ms to third parties. Owing to weak authentication at the<br />

gateways of these APIs, the sensitive data may become vulnerable to hackers. Many hackers are always<br />

focused on exploiting APIs and steal the user data. In June 2021, LinkedIn reported that its APIs were<br />

utilized to steal the data of nearly 500 million users. The data was put on dark web <strong>for</strong> sale. For prevention<br />

of such leaks, cloud security providers must ensure that there is an integrated security. Moreover, there<br />

must be proper management, monitoring, and security of “front door” of the cloud. There should be<br />

avoidance of reuse of API key along with the usage of standard and open API frameworks. The utility<br />

programs that override the network, systems, and applications must be restricted. The access to APIs<br />

must be segregated and the access to specific users needs to be provided <strong>for</strong> preventing data tampering<br />

and disclosure.<br />

• Awareness and prevention of denial-of-service attacks<br />

Though scalability is one of the crucial benefits of the cloud, it may become a liability if the cloud system<br />

is overloaded and stops its operation. This may become one of the crucial cloud security risks. Many<br />

hackers are not trying to gain access to the system, but trying to stop the working of the system. This will<br />

frustrate users as they will not be able to utilize the system. This type of attack is known as denial-ofservice<br />

attack (DoS) and it disrupts the workflow. Sony's online PlayStation store was attacked in a similar<br />

manner in 2014. The brute <strong>for</strong>ce attack was utilized in this hack attempt and the online store was down<br />

<strong>for</strong> nearly a day. Many organizations that have their workloads on the cloud will be attacked in the same<br />

way to stop their daily operations.<br />

Such DoS attacks can be prevented in various ways including updating intrusion detection systems,<br />

blocking IP addresses, and firewall traffic inspection. The system must be able to determine anomalies<br />

when users try to access the system and early warning needs to be provided. On the basis of anomalies<br />

in credentials and behavioral aspects, the system can provide early alarm to ensure cloud security.<br />

Moreover, the suspicious IP addresses should be blocked. Security teams can also inspect the incoming<br />

traffic. The source and destination of incoming traffic can be inspected and firewall can be placed by<br />

differentiating the good and bad traffic.<br />

Such security measures can be taken to prevent the cloud systems from hackers and cyber-criminals.<br />

The cloud adoption will surely increase in the next years and the need to deploy stringent security<br />

measures to prevent different types of attacks will rise consequently. With increased awareness,<br />

<strong>Cyber</strong> <strong>Defense</strong> <strong>eMagazine</strong> – <strong>September</strong> <strong>2022</strong> <strong>Edition</strong> 149<br />

Copyright © <strong>2022</strong>, <strong>Cyber</strong> <strong>Defense</strong> Magazine. All rights reserved worldwide.

Hooray! Your file is uploaded and ready to be published.

Saved successfully!

Ooh no, something went wrong!