Exploitation of the Cloud: Comparing the Perspectives of Cybercriminals and Cybersecurity Experts

Pei-Ting Lee, Purdue University

Abstract

As the rise of cloud technology bring about new possibilities to businesses and individuals alike, it also provides cybercriminals with new forms of weapons. The accessibility and availability of computing resources that have induced consumers to increasingly shift their data to the cloud can also be exploited by cybercriminals to facilitate attacks. Therefore, it is important to understand the different ways the cloud environment can be abused by cybercriminals. Analyzing the most commonly reported misuse of the cloud from the cybercriminals' point of view can allow cloud service providers to reevaluate their policies and infrastructure to decrease, if not prevent, abuse of the cloud. The responses collected from cybercriminals and cybersecurity experts indicated cloud storage to be the cloud service most often used for illegal purposes. Furthermore, the anonymity provided by the ease in creating fake accounts and the low price of services were reported as major factors influencing cybercriminals in choosing to use the cloud.

Degree

M.S.

Advisors

Seigfred-Spellar, Purdue University.

Subject Area

Information Technology

Off-Campus Purdue Users:
To access this dissertation, please log in to our
proxy server
.

Share

COinS