There are some general approaches too that can safeguard the system from external threats. Information security is a major area of concern specifically for IAAS platform since it deals with efficient sharing of information or resources.Microsoft has developed a wide array of servers over the years. Each of these servers has witnessed some form of vulnerability. The file sharing permission is a common form of vulnerability which Windows Server has been exposed to and it has resulted in multiple opportunities for hackers. Microsoft had restricted support to Windows Server 2003, which has given birth to security risks.There were unpatched vulnerabilities linked with Windows Server 2003 since Microsoft had eliminated end-of-support. The cybersecurity dangers can be correlated with such vulnerability. This kind of unsupported software system of Windows Server 2003 is associated with risk of viruses. There is a wide range of negative consequences such as loss of system resources, integrity, confidentiality, and business assets and data availability. Windows Server 2008 is also affected by certain vulnerabilities that are caused by Hyper-V server. This kind of vulnerability occurs when specific machine instructions are not properly encoded within guest virtual machines. The loophole invalidation would result in a non-responsive Hyper-V server application. Hackers would easily exploit the system when they are aware of such vulnerability prevalent within Windows Server 2008. The deficit of malware protection can also be one of the vulnerabilities, which has been observed in Windows Server 2003. However, the intensity of this vulnerability is comparatively less than Windows Server 2008, where functions might stop responding. Windows Server 2012 is also faced with some vulnerability that results in an unauthorized modification, service disruption, and unauthorized information disclosure. This vulnerability is also termed as CVE-2014-6324 and is located in the Windows KDC or Kerberos Key Distribution Centre.
Armbrust, M., Fox, A., Griffith, R., Joseph, A. D., Katz, R., Konwinski, A. and Zaharia, M., 2010. A view of cloud computing. Communications of the ACM, 53(4), pp. 50-58.
Brohi, S. N. and Bamiah, M. A., 2011. Challenges and benefits for adopting the paradigm of cloud computing. Int. J. Adv. Eng. Sci. Technol, 2, pp. 286-290.
Buyya, R., Yeo, C. S., Venugopal, S., Broberg, J. and Brandic, I., 2009. Cloud computing and emerging IT platforms: Vision, hype, and reality for delivering computing as the 5th utility. Future Generation computer systems, 25(6), pp. 599-616.
Computing, C., 2011. Cloud computing privacy concerns on our doorstep. Communications of the ACM, 54(1), pp. 125-138.
Doelitzscher, F., Sulistio, A., Reich, C., Kuijs, H. and Wolf, D., 2011. Private cloud for collaboration and e-Learning services: from IaaS to SaaS. Computing, 91(1), pp. 23-42.
Dondossola, G., Szanto, J., Masera, M. and Nai Fovino, I., 2008. Effects of intentional threats to power substation control systems. International Journal of Critical Infrastructures, 4(1-2), pp. 129-143.
Iosup, A., Prodan, R. and Epema, D., 2014. Iaas cloud benchmarking: approaches, challenges, and experience. In Cloud Computing for Data-Intensive Applications. New York: Springer.
Jajodia, S. and Noel, S., 2010. Topological vulnerability analysis. In Cyber Situational Awareness. New York: Springer.
Jamsa, K., 2011. Cloud Computing: SaaS, PaaS, IaaS, virtualization, business models, mobile, security and more. London: Jones & Bartlett Publishers.
Liu, Q. and Zhang, Y., 2008. TFTP vulnerability finding technique based on fuzzing. Computer Communications, 31(14), pp. 3420-3426.
Mell, P. and Grance, T., 2009. The NIST definition of cloud computing. National Institute of Standards and Technology, 53(6), p. 50.
Moreno-Vozmediano, R., Montero, R. S. and Llorente, I. M., 2012. IaaS cloud architecture: From virtualized datacenters to federated cloud infrastructures. Computer, (12), pp. 65-72.
Provos, N., Rajab, M. A. and Mavrommatis, P., 2009. Cybercrime 2.0: when the cloud turns dark. Communications of the ACM, 52(4), pp. 42-47.
So, K., 2011. Cloud computing security issues and challenges. International Journal of Computer Networks, 3(5), pp. 98-145.
Sotirov, A. and Dowd, M., 2008. Bypassing browser memory protections in Windows Vista. New York: Blackhat.
Vaquero, L. M., Rodero-Merino, L. and Morán, D., 2011. Locking the sky: a survey on IaaS cloud security. Computing, 91(1), pp. 93-118.
Woo, S. W., Joh, H., Alhazmi, O. H. and Malaiya, Y. K., 2011. Modeling vulnerability discovery process in Apache and IIS HTTP servers. Computers & Security, 30(1), pp. 50-62.
Zhang, Q., Cheng, L. and Boutaba, R., 2010. Cloud computing: state-of-the-art and research challenges. Journal of internet services and applications, 1(1), pp. 7-18.
Please type your essay title, choose your document type, enter your email and we send you essay samples