Cloud Computing Models and Vulnerabilities Raining on the Trendy New Parade Alex Stamos, Andrew

Subscribers:
5,970
Published on ● Video Link: https://www.youtube.com/watch?v=q_DcVkAvxMM



Duration: 1:01:35
6 views
0


Cloud Computing Models and Vulnerabilities: Raining on the Trendy New Parade

Cloud computing is an unstoppable meme at the CIO level, and will dominate corporate IT planning for the next several years. Although they do offer the promise of cost savings for many organizations, the basic ideas behind abstracting out the corporate datacenter greatly complicates the tasks of securing and auditing these systems. While there has been excellent research into low-level hypervisor and virtualization bugs, there has been little public discussion of the “big picture” problems for cloud computing. These include virtualized network devices, browser same-origin issues, credential management and many interesting legal challenges.

Our goal with this talk will be to explore the different attack scenarios that exist in the cloud computing world and to provide a comparison between the security models of the leading cloud computing platforms. We will discuss how current attacks against applications and infrastructure are changed with cloud computing, as well as introduce the audience to new types of vulnerabilities that are unique to cloud computing. Attendees will learn how to analyze the threat posed to them by cloud computing platforms as either providers or consumers of software built on these new platforms. Our platforms for discussion include Salesforce.com, Google Apps, Microsoft Office Live, Google AppEngine, Microsoft Azure, Amazon EC2, and Sun.

Black Hat - USA - 2009
Hacking conference
#hacking, #hackers, #infosec, #opsec, #IT, #security




Other Videos By All Hacking Cons


2021-12-28More Tricks for Defeating SSL Moxie Marlinspike Black Hat - USA - 2009
2021-12-28Fast & Furious Reverse Engineering with TitanEngine Mario Vuksan, Tomislav Pericin
2021-12-28Hacker Court 1 2 Panel Black Hat - USA - 2009
2021-12-28Metasploit Telephony Druid Black Hat - USA - 2009
2021-12-28Clobbering the Cloud Haroon Meer, Nick Arvanitis, Marco Slaviero
2021-12-28Netscreen of the Dead Graeme Neilson Black Hat - USA - 2009
2021-12-28Fight Against 1 Day Exploits Jeongwook Oh Black Hat - USA - 2009
2021-12-28Hacker Court 2 2 Panel Black Hat - USA - 2009
2021-12-28Our Favorite XSS Filters and How to Attack Them Eduardo Vela Nava, David Lindsay
2021-12-28A 16 bit Rootkit and Second Generation Zigbee Chips Travis Goodspeed
2021-12-28Cloud Computing Models and Vulnerabilities Raining on the Trendy New Parade Alex Stamos, Andrew
2021-12-28Re-conceptualizing Security Bruce Schneier Black Hat - USA - 2009
2021-12-28Hacking the Smart Grid Tony Flick Black Hat - USA - 2009
2021-12-28A Black Hat Vulnerability Risk Assessment Panel Black Hat - USA - 2009
2021-12-28Cloudburst Hacking 3D and Breaking Out of VMware Kostya Kortchinsky Black Hat - USA - 2009
2021-12-28How Economics and Information Security Affects Cyber Crime Peter Guerra Black Hat - USA - 2009
2021-12-28I Just Found 10 Million SSNs Alessandro Acquisti Black Hat - USA - 2009
2021-12-28Computer Crime Year in Review Jennifer Granick Black Hat - USA - 2009
2021-12-28Advanced Mac OS X Rootkits Dino Dai Zovi Black Hat - USA - 2009
2021-12-28Lockpicking Forensics Datagram Black Hat - USA - 2009
2021-12-28Internet Special Ops Andrew Fried, Paul Vixie, Christopher Lee Black Hat - USA - 2009



Tags:
data
hacker
security
computer
cyber
internet
technology
hacking
attack
digital
virus
information
hack
online
crime
password
code
web
concept
thief
scam
fraud
malware
secure
phishing
software
access
safety
firewall
communication
business
privacy
binary
account
spy
programmer
program
spyware
hacked
hacking conference
conference
learn
how to
2022
2021
cybersecurity
owned
break in
google
securing
exploit
exploitation
recon
social engineering
ALEX STAMOS
ANDREW BECHERER
NATHAN WILCOX