Response Mounika

You might also like

You are on page 1of 2

1

Response

Hey Mounika Ramineni,

You significantly answered the questions and were an interesting read. Data wiping

renders data inaccessible but would not delete it. On the other hand, it is the act of overwriting

the information about a specific hard drive to the point where the source document is

inaccessible (Olvecky & Gabriska, 2018). This assures that the firm in issue is properly securely

disposing of all IT resources, ensuring that user data is not revealed to a third-party provider. The

hypervisor especially functions in a stealth manner. It operates underneath the machine in case of

hyperjacking, making it even more challenging to identify and more probable obtain control to

computer infrastructure where it may influence the functioning of the whole institution or

organization (W & Prabakaran, 2020). If the attacker receives possession of the hypervisor,

they can alter everything linked to that network. An intruder would also attempt to manage one

VM by infiltrating another virtual machine housed on the same device in Guest hopping attacks.

Forensic and VM functional testing to monitor cloud security are among the potential

countermeasures of Guest hopping attacks (Dong & Lei, 2019). These assaults outperform

advanced technologies, necessitating immediate protection for enterprises. Cloud security

implements various layers of controls inside the network architecture to ensure the sustainability

and reliability of cloud-based resources such as sites and internet apps. Organizations must

manage DDoS protection, maximum resilience, data protection, and legislative conformity in

their cloud-based security supplier, whether in the public or personal cloud (Islam, 2017).

References
2

Dong, Y., & Lei, Z. (2019). An Access Control Model for Preventing Virtual Machine Hopping

Attack. Future Internet, 11(3), 82. https://doi.org/10.3390/fi11030082

Islam, N. (2017). Review on Benefits and Security Challenges of Cloud Computing.

International Journal of Computer Science and Information Technologies, 8(2), 224–228.

http://ijcsit.com/docs/Volume%208/vol8issue2/ijcsit2017080219.pdf

Jones, A., & Afrifa, I. (2020). An Evaluation Of Data Erasing Tools. The Journal of Digital

Forensics, Security and Law, 15(1). https://doi.org/10.15394/jdfsl.2020.1615

W, B. D., & Prabakaran, D. S. (2020). Detecting Hyperjacking in cloud based virtual

environment. International Journal of Advanced Science and Technology, 29(9s), 2740–

2744. http://sersc.org/journals/index.php/IJAST/article/view/15440

You might also like