{"id":386,"date":"2018-06-22T11:06:46","date_gmt":"2018-06-22T03:06:46","guid":{"rendered":"http:\/\/www.sniper97.cn\/?p=386"},"modified":"2018-06-22T11:06:46","modified_gmt":"2018-06-22T03:06:46","slug":"%e7%ac%ac%e5%85%ad%e7%ab%a0-%e5%9f%ba%e6%9c%ac%e4%ba%91%e5%ae%89%e5%85%a8","status":"publish","type":"post","link":"http:\/\/www.sniper97.cn\/index.php\/note\/cloud-computing-concepts%ef%bc%8ctechnology-and-architecture\/386\/","title":{"rendered":"\u7b2c\u516d\u7ae0 \u57fa\u672c\u4e91\u5b89\u5168"},"content":{"rendered":"<h2>6.1 \u57fa\u672c\u5c5e\u4e8e\u4e0e\u6982\u5ff5<\/h2>\n<p>IT\u5b89\u5168\u63aa\u65bd\u65e8\u5728\u9632\u5fa1\u7531\u4e8e<strong>\u6076\u610f\u7684\u4f01\u56fe(malicious intent)<\/strong>\u548c<strong>\u65e0\u5fc3\u7684\u7528\u6237\u9519\u8bef\uff08unintentional user error\uff09<\/strong>\u9020\u6210\u7684<strong>\u5a01\u80c1\uff08threat\uff09<\/strong>\u548c<strong>\u5e72\u6270\uff08interference<\/strong>\uff09\u3002<\/p>\n<h3>6.1.1\u4fdd\u5bc6\u6027\uff08confidentiality\uff09<\/h3>\n<p>\u662f\u6307\u4e8b\u7269\u53ea\u6709\u88ab\u6388\u6743\u65b9\u624d\u80fd\u8bbf\u95ee\u7684\u7279\u6027\u3002<br \/>\n<b>Confidentiality \u00a0is the characteristic of something being made accessible only to authorized parties.<\/b><br \/>\n\u5728\u4e91\u73af\u5883\u4e2d\uff0c\u4fdd\u5bc6\u6027\u4e3b\u8981\u662f\u5173\u4e8e\u5bf9\u4f20\u8f93\u548c\u5b58\u50a8\u7684\u6570\u636e\u8fdb\u884c\u8bbf\u95ee\u9650\u5236\u7684\u3002<\/p>\n<h3>6.1.2\u5b8c\u6574\u6027\uff08integrity\uff09<\/h3>\n<p>\u662f\u6307\u672a\u88ab\u672a\u6388\u6743\u65b9\u7be1\u6539\u7684\u7279\u6027\u3002<br \/>\n<strong>Integrity\u00a0is the characteristic of not having been altered by an unauthorized party.\u00a0\u00a0<\/strong><\/p>\n<h3>6.1.3\u771f\u5b9e\u6027\uff08authenticity\uff09<\/h3>\n<p>\u662f\u6307\u4e8b\u7269\u662f\u7531\u7ecf\u8fc7\u6388\u6743\u7684\u6e90\u63d0\u4f9b\u7684\u8fd9\u4e00\u7279\u6027\u3002<br \/>\n<b>Authenticity \u00a0is the characteristic of something having been provided by an authorized source.<\/b><br \/>\n\u8fd9\u4e2a\u6982\u5ff5\u5305\u62ec\u4e0d\u53ef\u5426\u8ba4\u6027\uff0c\u4e5f\u5c31\u662f\u4e00\u65b9\u4e0d\u80fd\u5426\u8ba4\u6216\u8d28\u7591\u4e00\u6b21\u4ea4\u4e92\u7684\u771f\u5b9e\u6027\u3002<\/p>\n<h3>6.1.4\u53ef\u7528\u6027\uff08availability\uff09<\/h3>\n<p>\u662f\u6307\u5728\u7279\u5b9a\u7684\u65f6\u95f4\u6bb5\u5185\u53ef\u4ee5\u8bbf\u95ee\u548c\u53ef\u4ee5\u4f7f\u7528\u7684\u7279\u6027\u3002<br \/>\n<b>\u00a0Availability\u00a0is the characteristic of being accessible and usable during a specified time period.<\/b><\/p>\n<h3>6.1.5\u5a01\u80c1\uff08threat\uff09<\/h3>\n<p>\u662f\u6f5c\u5728\u7684\u5b89\u5168\u6027\u8fdd\u53cd\uff0c\u53ef\u4ee5\u8bd5\u56fe\u7834\u574f\u9690\u79c1\u5e76\/\u6216\u5bfc\u81f4\u5371\u5bb3\uff0c\u4ee5\u6b64\u6311\u6218\u9632\u62a4\u3002<br \/>\n<strong> A\u00a0threat\u00a0is a potential security violation that can challenge defenses in an attempt to breach privacy and\/or cause harm.<\/strong><\/p>\n<h3>6.1.6\u6f0f\u6d1e\uff08vulnerability\uff09<\/h3>\n<p>\u662f\u4e00\u79cd\u53ef\u80fd\u88ab\u5229\u7528\u7684\u5f31\u70b9\uff0c\u53ef\u80fd\u662f\u56e0\u4e3a\u5b89\u5168\u63a7\u5236\u4fdd\u62a4\u4e0d\u591f\uff0c\u4e5f\u53ef\u80fd\u662f\u56e0\u4e3a\u653b\u51fb\u51fb\u8d25\u4e86\u73b0\u6709\u7684\u5b89\u5168\u63a7\u5236\u3002<br \/>\n<strong>A\u00a0vulnerability\u00a0is a weakness that can be exploited either because it is protected by insufficient security controls, or because existing security controls are overcome by an attack.<\/strong><\/p>\n<h3>6.1.7\u98ce\u9669\uff08risk\uff09<\/h3>\n<p>\u662f\u6307\u6267\u884c\u4e00\u4e2a\u884c\u4e3a\u5e26\u6765\u635f\u5931\u6216\u5371\u5bb3\u7684\u53ef\u80fd\u6027\u3002<br \/>\n<strong>\u00a0Risk\u00a0is the possibility of loss or harm arising from performing an activity. Risk is typically measured according to its threat level and the number of possible or known vulnerabilities.<\/strong><br \/>\n\u786e\u5b9aIT\u8d44\u6e90\u7684\u98ce\u9669\u7684\u4e24\u4e2a\u6807\u51c6\uff1a<br \/>\n\uff081\uff09\u5a01\u80c1\u5229\u7528IT\u8d44\u6e90\u4e2d\u6f0f\u6d1e\u7684\u6982\u7387<br \/>\n\uff082\uff09\u5982\u679cIT\u8d44\u6e90\u88ab\u635f\u5bb3\uff0c\u9884\u671f\u4f1a\u9020\u6210\u7684\u635f\u5931\u3002<\/p>\n<h3>6.1.8\u5b89\u5168\u63a7\u5236<\/h3>\n<p>\u662f\u7528\u6765\u9884\u9632\u6216\u54cd\u5e94\u5b89\u5168\u5a01\u80c1\u4ee5\u53ca\u964d\u4f4e\u6216\u907f\u514d\u98ce\u9669\u7684\u5bf9\u7b56\u3002<br \/>\n<b>Security controls are countermeasures used to prevent or respond to security threats and to reduce or avoid risk.<\/b><\/p>\n<h3>6.1.9\u5b89\u5168\u673a\u5236<\/h3>\n<p>\u5b89\u5168\u673a\u5236\u662f\u6784\u6210\u4fdd\u62a4IT\u8d44\u6e90\u3001\u4fe1\u606f\u548c\u670d\u52a1\u7684\u670d\u52a1\u7684\u9632\u5fa1\u6846\u67b6\u7684\u7ec4\u6210\u90e8\u5206\u3002<\/p>\n<h3>6.1.10\u5b89\u5168\u7b56\u7565<\/h3>\n<p>\u5b89\u5168\u7b56\u7565\u5efa\u7acb\u4e86\u4e00\u5957\u5b89\u5168\u89c4\u5219\u548c\u89c4\u7ae0\u3002<br \/>\n&nbsp;<\/p>\n<h2>6.2\u5a01\u80c1\u4f5c\u7528\u8005<\/h2>\n<p>\u5a01\u80c1\u4f5c\u7528\u8005\uff08threat agent\uff09\u662f\u5f15\u53d1\u5a01\u80c1\u7684\u5b9e\u4f53\uff0c\u56e0\u4e3a\u5b83\u80fd\u591f\u5b9e\u65bd\u653b\u51fb\u3002<\/p>\n<h4>6.2.1 \u533f\u540d\u653b\u51fb\u8005\uff08anonymous attacker\uff09<\/h4>\n<p>\u533f\u540d\u653b\u51fb\u8005\u662f\u4e91\u4e2d\u6ca1\u6709\u6743\u9650\u3001\u4e0d\u88ab\u4fe1\u4efb\u7684\u4e91\u670d\u52a1\u7528\u6237\u3002\u901a\u5e38\u662f\u4e00\u4e2a\u5916\u90e8\u8f6f\u4ef6\u7a0b\u5e8f\uff0c\u901a\u8fc7\u516c\u7f51\u53d1\u52a8\u7f51\u7edc\u653b\u51fb\u3002<\/p>\n<h4>6.2.2\u6076\u610f\u670d\u52a1\u4f5c\u7528\u8005\uff08malicious service agent\uff09<\/h4>\n<p>\u6076\u610f\u670d\u52a1\u4f5c\u7528\u8005\u80fd\u622a\u53d6\u5e76\u8f6c\u53d1\u4e91\u5185\u7684\u7f51\u7edc\u6d41\u91cf\u3002<\/p>\n<h4>6.2.3\u6388\u4fe1\u7684\u653b\u51fb\u8005\uff08trusted attacker\uff09<\/h4>\n<p>\u53c8\u79f0\u6076\u610f\u7684\u79df\u6237\uff08malicious tenant\uff09\u3002<br \/>\n\u6388\u6743\u7684\u653b\u51fb\u8005\u4e0e\u540c\u4e00\u4e91\u73af\u5883\u4e2d\u7684\u4e91\u7528\u6237\u5171\u4eabIT\u8d44\u6e90\uff0c\u8bd5\u56fe\u5229\u7528\u5408\u6cd5\u7684\u8bc1\u4e66\u6765\u628a\u4e91\u63d0\u4f9b\u8005\u4ee5\u53ca\u4e0e\u4ed6\u4eec\u5171\u4eabIT\u8d44\u6e90\u7684\u4e91\u79df\u6237\u4f5c\u4e3a\u653b\u51fb\u76ee\u6807\u3002<\/p>\n<h4>6.2.4\u6076\u610f\u7684\u5185\u90e8\u4eba\u5458\uff08malicious insider\uff09<\/h4>\n<p>\u662f\u4eba\u4e3a\u7684\u5a01\u80c1\u4f5c\u7528\u8005\uff0c\u4ed6\u4eec\u7684\u884c\u4e3a\u4ee3\u8868\u4e91\u63d0\u4f9b\u8005\u6216\u8005\u4e0e\u4e4b\u6709\u5173\u3002<br \/>\n\u901a\u5e38\u662f\u73b0\u4efb\u6216\u524d\u4efb\u7684\u96c7\u5458\uff0c\u6216\u8005\u80fd\u591f\u8bbf\u95ee\u4e91\u63d0\u4f9b\u8005\u8d44\u6e90\u8303\u56f4\u7684\u7b2c\u4e09\u65b9\u3002<br \/>\n&nbsp;<\/p>\n<h2>6.3\u4e91\u5b89\u5168\u5a01\u80c1<\/h2>\n<h4>6.3.1\u6d41\u91cf\u7a83\u542c\uff08traffic eavesdropping\uff09<\/h4>\n<p>\u662f\u6307\u5f53\u6570\u636e\u5728\u4f20\u8f93\u5230\u4e91\u4e2d\u6216\u5728\u4e91\u5185\u90e8\u4f20\u8f93\u65f6\u88ab\u6076\u610f\u7684\u670d\u52a1\u4f5c\u7528\u8005\u88ab\u52a8\u7684\u622a\u83b7\uff0c\u7528\u4e8e\u975e\u6cd5\u7684\u4fe1\u606f\u6536\u96c6\u7684\u76ee\u7684\u3002<br \/>\n\u8fd9\u79cd\u653b\u51fb\u7684\u76ee\u7684\u5c31\u662f\u76f4\u63a5\u7834\u574f\u6570\u636e\u7684\u4fdd\u5bc6\u6027\uff0c\u4e5f\u53ef\u80fd\u7834\u574f\u4e86\u4e91\u7528\u6237\u548c\u4e91\u63d0\u4f9b\u8005\u4e4b\u95f4\u5173\u7cfb\u7684\u4fdd\u5bc6\u6027\u3002<br \/>\n\u7531\u4e8e\u8fd9\u79cd\u653b\u51fb\u88ab\u52a8\u7684\u672c\u8d28\uff0c\u8fd9\u79cd\u653b\u51fb\u66f4\u5bb9\u6613\u957f\u65f6\u95f4\u8fdb\u884c\u800c\u4e0d\u88ab\u53d1\u73b0\u3002<\/p>\n<h4>6.3.2\u6076\u610f\u5a92\u4ecb\uff08malicious intermediary\uff09<\/h4>\n<p>\u6076\u610f\u5a92\u4ecb\u5a01\u80c1\u662f\u6307\u4fe1\u606f\u88ab\u6076\u610f\u670d\u52a1\u4f5c\u7528\u8005\u622a\u83b7\u5e76\u4e14\u88ab\u7be1\u6539\uff0c\u56e0\u6b64\u53ef\u80fd\u4f1a\u88ab\u7834\u574f\u4fe1\u606f\u7684\u4fdd\u5bc6\u6027\u548c\u5b8c\u6574\u6027\u3002<\/p>\n<h4>6.3.3\u62d2\u7edd\u670d\u52a1<\/h4>\n<p>\u62d2\u7edd\u670d\u52a1\uff08DoS\uff09\u653b\u51fb\u7684\u76ee\u6807\u662f\u4f7fIT\u8d44\u6e90\u8fc7\u8f7d\u81f3\u65e0\u6cd5\u6b63\u786e\u8fd0\u884c\u3002<\/p>\n<h4>6.3.4\u6388\u6743\u4e0d\u8db3<\/h4>\n<p>\u6388\u6743\u4e0d\u8db3\u653b\u51fb\u662f\u6307\u9519\u8bef\u5730\u6388\u4e88\u653b\u51fb\u8005\u8bbf\u95ee\u6743\u9650\u6216\u8005\u6388\u6743\u592a\u5bbd\u6cdb\uff0c\u5bfc\u81f4\u653b\u51fb\u8005\u80fd\u591f\u8bbf\u95ee\u5230\u672c\u5e94\u8be5\u53d7\u5230\u4fdd\u62a4\u7684IT\u8d44\u6e90\u3002<\/p>\n<h4>6.3.5\u865a\u62df\u5316\u653b\u51fb<\/h4>\n<p>\u865a\u62df\u5316\u653b\u51fb\u5229\u7528\u7684\u662f\u865a\u62df\u5316\u5e73\u53f0\u4e2d\u7684\u6f0f\u6d1e\u6765\u5371\u5bb3\u865a\u62df\u5316\u5e73\u53f0\u7684\u4fdd\u5bc6\u6027\u3001\u5b8c\u6574\u6027\u548c\u53ef\u7528\u6027\u3002<br \/>\n<strong><span style=\"text-align: left; color: #555555; text-transform: none; text-indent: 0px; letter-spacing: normal; font-family: 'Roboto','Helvetica Neue',Helvetica,Arial,sans-serif; font-size: 16px; font-style: normal; font-variant: normal; text-decoration: none; word-spacing: 0px; display: inline !important; white-space: normal; cursor: text; orphans: 2; float: none; -webkit-text-stroke-width: 0px; background-color: transparent;\">\u865a\u62df\u5316\u653b\u51fb\u5229\u7528\u7684\u662f\u865a\u62df\u5316\u73af\u5883\u4e2d\u7684\u6f0f\u6d1e\uff0c\u83b7\u5f97\u4e86\u5bf9\u5e95\u5c42\u7269\u7406\u786c\u4ef6\u672a\u88ab\u6388\u6743\u7684\u8bbf\u95ee\u3002<\/span><\/strong><br \/>\n<b>A virtualization attack exploits vulnerabilities within virtualized environments to gain unauthorized access to underlying physical hardware.<\/b><\/p>\n<h4>6.3.6\u4fe1\u4efb\u8fb9\u754c\u91cd\u53e0<\/h4>\n<p>\u5982\u679c\u4e91\u4e2d\u7684\u7269\u7406IT\u8d44\u6e90\u662f\u7531\u4e0d\u540c\u7684\u4e91\u670d\u52a1\u7528\u6237\u5171\u4eab\u7684\uff0c\u90a3\u4e48\u8fd9\u4e9b\u4e91\u670d\u52a1\u7528\u6237\u7684\u4fe1\u4efb\u8fb9\u754c\u662f\u91cd\u53e0\u7684\u3002<br \/>\n<strong><span style=\"text-align: left; color: #555555; text-transform: none; text-indent: 0px; letter-spacing: normal; font-family: 'Roboto','Helvetica Neue',Helvetica,Arial,sans-serif; font-size: 16px; font-style: normal; font-variant: normal; text-decoration: none; word-spacing: 0px; display: inline !important; white-space: normal; cursor: text; orphans: 2; float: none; -webkit-text-stroke-width: 0px; background-color: transparent;\">\u91cd\u53e0\u7684\u4fe1\u4efb\u8fb9\u754c\u6f5c\u85cf\u4e86\u4e00\u79cd\u5a01\u80c1\uff0c\u653b\u51fb\u8005\u53ef\u4ee5\u5229\u7528\u591a\u4e2a\u4e91\u7528\u6237\u5171\u4eab\u7684\u3001\u57fa\u4e8e\u4e91\u7684IT\u8d44\u6e90\u3002<\/span><\/strong><br \/>\n<strong> Overlapping trust boundaries represent a threat whereby attackers can exploit cloud-based IT resources shared by multiple cloud consumers.<\/strong><\/p>\n<h2>6.4\u5176\u4ed6\u8003\u91cf<\/h2>\n<h4>6.4.1\u6709\u7f3a\u9677\u7684\u5b9e\u73b0<\/h4>\n<p>\u4e91\u670d\u52a1\u90e8\u7f72\u4e0d\u5408\u89c4\u8303\u7684\u8bbe\u8ba1\uff0c\u5b9e\u73b0\u6216\u914d\u7f6e\u4f1a\u6709\u4e0d\u5229\u7684\u540e\u679c\uff0c\u800c\u4e0d\u4ec5\u4ec5\u662f\u8fd0\u884c\u65f6\u7684\u5f02\u5e38\u548c\u5931\u6548\u3002<\/p>\n<h4>6.4.2\u5b89\u5168\u7b56\u7565\u4e0d\u4e00\u81f4<\/h4>\n<p>\u5f53\u4e91\u7528\u6237\u628aIT\u8d44\u6e90\u653e\u5230\u516c\u6709\u4e91\u63d0\u4f9b\u8005\u90a3\u91cc\u65f6\uff0c\u5c31\u9700\u8981\u63a5\u53d7\u4e91\u63d0\u4f9b\u8005\u63d0\u4f9b\u7684\u4fe1\u606f\u5b89\u5168\u65b9\u6cd5\u4e0e\u4f20\u7edf\u7684\u65b9\u6cd5\u53ef\u80fd\u4f1a\u4e0d\u5b8c\u5168\u76f8\u540c\uff0c\u751a\u81f3\u4e0d\u76f8\u4f3c\u3002<\/p>\n<h4>6.4.3\u5408\u7ea6(Contrast)<\/h4>\n<p>&nbsp;<\/p>\n<h4>6.4.4\u98ce\u9669\u7ba1\u7406(Risk Management)<\/h4>\n<p>\u4e3b\u8981\u7684\u5de5\u4f5c\uff1a<br \/>\n\uff081\uff09\u98ce\u9669\u8bc4\u4f30\uff08risk assessment\uff09<br \/>\n\uff082\uff09\u98ce\u9669\u5904\u7406\uff08risk treatment\uff09<br \/>\n\uff083\uff09\u98ce\u9669\u63a7\u5236\uff08risk control\uff09<br \/>\n<img loading=\"lazy\" decoding=\"async\" class=\"alignnone wp-image-625 size-full\" src=\"http:\/\/www.sniper97.cn\/wp-content\/uploads\/2018\/06\/6-1-1.png\" alt=\"\" width=\"516\" height=\"371\" \/><br \/>\n\u5173\u952e\u70b9\u603b\u7ed3\uff1a<br \/>\n\uff081\uff09\u4fdd\u5bc6\u6027\u3001\u5b8c\u6574\u6027\u3001\u771f\u5b9e\u6027\u548c\u53ef\u7528\u6027\u662f\u53ef\u4ee5\u4e0e\u8861\u91cf\u5b89\u5168\u6027\u76f8\u5173\u8054\u7684\u7279\u6027\u3002<br \/>\n\uff082\uff09\u5a01\u80c1\u3001\u6f0f\u6d1e\u548c\u98ce\u9669\u662f\u4e0e\u8861\u91cf\u548c\u8bc4\u4f30\u4e0d\u5b89\u5168\u6027\u6216\u5b89\u5168\u6027\u7f3a\u4e4f\u76f8\u5173\u8054\u7684\u3002<br \/>\n\uff083\uff09\u5b89\u5168\u63a7\u5236\u3001\u673a\u5236\u548c\u7b56\u7565\u662f\u4e0e\u5efa\u7acb\u652f\u6301\u6539\u8fdb\u5b89\u5168\u6027\u7684\u5bf9\u7b56\u548c\u4fdd\u62a4\u6d4b\u8bd5\u76f8\u5173\u8054\u7684\u3002<br \/>\n\uff084\uff09\u533f\u540d\u653b\u51fb\u8005\u662f\u4e0d\u88ab\u4fe1\u4efb\u7684\u5a01\u80c1\u653b\u51fb\u8005\uff0c\u901a\u5e38\u8bd5\u56fe\u4ece\u4e91\u5916\u754c\u7684\u5916\u90e8\u8fdb\u884c\u653b\u51fb\u3002<br \/>\n\uff085\uff09\u6076\u610f\u670d\u52a1\u4f5c\u7528\u8005\u622a\u53d6\u7f51\u7edc\u901a\u4fe1\uff0c\u8bd5\u56fe\u6076\u610f\u7684\u7be1\u6539\u6216\u4f7f\u7528\u6570\u636e\u3002<br \/>\n\uff086\uff09\u6388\u6743\u7684\u653b\u51fb\u8005\u662f\u7ecf\u8fc7\u6388\u6743\u7684\u4e91\u670d\u52a1\u7528\u6237\uff0c\u5177\u6709\u5408\u6cd5\u7684\u8bc1\u4e66\uff0c\u4ed6\u4eec\u4f1a\u4f7f\u7528\u8fd9\u4e9b\u8bc1\u4e66\u6765\u8bbf\u95ee\u57fa\u4e8e\u4e91\u7684IT\u8d44\u6e90\u3002<br \/>\n\uff087\uff09\u6076\u610f\u7684\u5185\u90e8\u4eba\u5458\u662f\u8bd5\u56fe<span style=\"display: inline !important; float: none; background-color: transparent; color: #555555; font-family: 'Roboto','Helvetica Neue',Helvetica,Arial,sans-serif; font-size: 16px; font-style: normal; font-variant: normal; font-weight: 400; letter-spacing: normal; orphans: 2; text-align: left; text-decoration: none; text-indent: 0px; text-transform: none; -webkit-text-stroke-width: 0px; white-space: normal; word-spacing: 0px;\">\u6ee5\u7528\u5bf9\u4e91\u8d44\u6e90\u8303\u56f4\u7684\u8bbf\u95ee\u7279\u6743\u7684\u4eba\u3002<\/span><br \/>\n\uff088\uff09\u6d41\u91cf\u7a83\u542c\u548c\u6076\u610f\u5a92\u4ecb\u653b\u51fb\u901a\u5e38\u662f\u7531\u622a\u53d6\u7f51\u7edc\u6d41\u91cf\u7684\u6076\u610f\u670d\u52a1\u4f5c\u7528\u8005\u5b9e\u65bd\u7684\u3002<br \/>\n\uff089\uff09\u62d2\u7edd\u670d\u52a1\u653b\u51fb\u7684\u53d1\u751f\u662f\u5f53\u76ee\u6807IT\u8d44\u6e90\u7531\u4e8e\u8bf7\u6c42\u8fc7\u591a\u800c\u8d1f\u8f7d\u8fc7\u91cd\uff0c\u8fd9\u4e9b\u8bf7\u6c42\u610f\u5728\u4f7fIT\u8d44\u6e90\u6027\u80fd\u9677\u4e8e\u762b\u75ea\u6216\u4e0d\u53ef\u7528\u3002\u6388\u6743\u4e0d\u8db3\u653b\u51fb\u662f\u6307\u9519\u8bef\u5730\u6388\u4e88\u4e86\u653b\u51fb\u8005\u8bbf\u95ee\u6743\u9650\u6216\u662f\u6743\u9650\u592a\u5bbd\u6cdb\uff0c\u6216\u662f\u4f7f\u7528\u4e86\u5f31\u5bc6\u7801\u3002<br \/>\n\uff0810\uff09\u865a\u62df\u5316\u653b\u51fb\u5229\u7528\u7684\u662f\u865a\u62df\u5316\u73af\u5883\u4e2d\u7684\u6f0f\u6d1e\uff0c\u83b7\u5f97\u4e86\u5bf9\u5e95\u5c42\u7269\u7406\u786c\u4ef6\u672a\u88ab\u6388\u6743\u7684\u8bbf\u95ee\u3002\u91cd\u53e0\u7684\u4fe1\u4efb\u8fb9\u754c\u6f5c\u85cf\u4e86\u4e00\u79cd\u5a01\u80c1\uff0c\u653b\u51fb\u8005\u53ef\u4ee5\u5229\u7528\u591a\u4e2a\u4e91\u7528\u6237\u5171\u4eab\u7684\u3001\u57fa\u4e8e\u4e91\u7684IT\u8d44\u6e90\u3002<br \/>\n\uff0811\uff09\u4e91\u7528\u6237\u9700\u8981\u610f\u8bc6\u5230\uff0c\u90e8\u7f72\u6709\u7f3a\u9677\u7684\u57fa\u4e8e\u4e91\u7684\u89e3\u51b3\u65b9\u6848\u53ef\u80fd\u4f1a\u5f15\u5165\u5b89\u5168\u98ce\u9669\u3002<br \/>\n\uff0812\uff09\u5728\u9009\u62e9\u4e91\u63d0\u4f9b\u5382\u5546\u65f6\uff0c\u7406\u89e3\u4e91\u63d0\u4f9b\u8005\u5982\u4f55\u5b9a\u4e49\u548c\u5f3a\u52a0\u6240\u6709\u6743\uff0c\u4ee5\u53ca\u53ef\u80fd\u7684\u4e0d\u517c\u5bb9\u7684\u4e91\u5b89\u5168\u7b56\u7565\uff0c\u662f\u5f62\u6210\u8bc4\u4f30\u6807\u51c6\u7684\u5173\u952e\u90e8\u5206\u3002<br \/>\n\uff0813\uff09\u5728\u4e91\u7528\u6237\u548c\u4e91\u63d0\u4f9b\u8005\u7b7e\u7f72\u7684\u6cd5\u5f8b\u534f\u8bae\u4e2d\uff0c\u9700\u8981\u660e\u786e\u5b9a\u4e49\u548c\u4e92\u76f8\u7406\u89e3\u5bf9\u6f5c\u5728\u7684\u5b89\u5168\u6cc4\u9732\u7684\u8d23\u4efb\u3001\u514d\u8d23\u548c\u8d23\u95ee\u3002<br \/>\n\uff0814\uff09\u5bf9\u4e8e\u4e91\u7528\u6237\u6765\u8bf4\uff0c\u5728\u7406\u89e3\u5177\u4f53\u9488\u5bf9\u67d0\u4e2a\u7279\u5b9a\u4e91\u73af\u5883\u7684\u5b89\u5168\u76f8\u5173\u7684\u53ef\u80fd\u7684\u95ee\u9898\u4e4b\u540e\uff0c\u5bf9\u8bc6\u522b\u51fa\u7684\u98ce\u9669\u8fdb\u884c\u76f8\u5e94\u7684\u8bc4\u4f30\u662f\u5f88\u91cd\u8981\u7684\u3002<br \/>\n&nbsp;<br \/>\n\u5178\u578b\u4f8b\u9898\uff1a<br \/>\n<b><span style=\"margin: 0px; color: #000000; font-family: 'Times New Roman'; font-size: 12pt; font-style: normal; font-weight: bold;\"><span style=\"font-family: \u5b8b\u4f53;\">\u4e00\u3001\u5224\u65ad\u9898<\/span><\/span><\/b><b><\/b><br \/>\n<span style=\"margin: 0px; color: #000000; font-family: 'Times New Roman'; font-size: 12pt; font-style: normal;\">1. Authenticity<\/span><span style=\"margin: 0px; color: #000000; font-family: 'Times New Roman'; font-size: 12pt;\">\u00a0\u00a0<\/span><span style=\"margin: 0px; color: #000000; font-family: 'Times New Roman'; font-size: 12pt;\">is the characteristic of something being made accessible only to authorized parties.<\/span><span style=\"margin: 0px; color: #000000; font-family: 'Times New Roman'; font-size: 12pt;\">\u00a0( \u00a0 F )<\/span><br \/>\n<strong>(Confidentiality \u00a0is the characteristic of something being made accessible only to authorized parties.)<\/strong><br \/>\n<span style=\"margin: 0px; color: #000000; font-family: 'Times New Roman'; font-size: 12pt; font-style: normal;\">2. Integrity<\/span><span style=\"margin: 0px; color: #000000; font-family: 'Times New Roman'; font-size: 12pt;\">\u00a0<\/span><span style=\"margin: 0px; color: #000000; font-family: 'Times New Roman'; font-size: 12pt;\">is the characteristic of not having been altered by an unauthorized party. \u00a0(\u00a0 T \u00a0 )<\/span><br \/>\n<span style=\"margin: 0px; color: #000000; font-family: 'Times New Roman'; font-size: 12pt;\">3.<\/span><span style=\"margin: 0px; color: #000000; font-family: 'Times New Roman'; font-size: 12pt; font-style: normal;\">\u00a0Confidentiality<\/span><span style=\"margin: 0px; color: #000000; font-family: 'Times New Roman'; font-size: 12pt;\">\u00a0<\/span><span style=\"margin: 0px; color: #000000; font-family: 'Times New Roman'; font-size: 12pt;\">is the characteristic of something having been provided by an authorized source.<\/span><span style=\"margin: 0px; color: #000000; font-family: 'Times New Roman'; font-size: 12pt;\">\u00a0(\u00a0 F\u00a0 )<\/span><br \/>\n<strong>(Authenticity \u00a0is the characteristic of something having been provided by an authorized source.)<\/strong><br \/>\n<span style=\"margin: 0px; color: #000000; font-family: 'Times New Roman'; font-size: 12pt;\">4.<\/span><span style=\"margin: 0px; color: #000000; font-family: 'Times New Roman'; font-size: 12pt; font-style: normal;\">\u00a0Availability<\/span><span style=\"margin: 0px; color: #000000; font-family: 'Times New Roman'; font-size: 12pt;\">\u00a0<\/span><span style=\"margin: 0px; color: #000000; font-family: 'Times New Roman'; font-size: 12pt;\">is the characteristic of being accessible and usable during all time period.<\/span><span style=\"margin: 0px; color: #000000; font-family: 'Times New Roman'; font-size: 12pt;\">\u00a0(\u00a0 F\u00a0 )<\/span><br \/>\n<strong>(\u00a0Availability\u00a0is the characteristic of being accessible and usable during a specified time period.)<\/strong><br \/>\n<span style=\"margin: 0px; color: #000000; font-family: 'Times New Roman'; font-size: 12pt;\">5. A<\/span><span style=\"margin: 0px; color: #000000; font-family: 'Times New Roman'; font-size: 12pt;\">\u00a0<\/span><span style=\"margin: 0px; color: #000000; font-family: 'Times New Roman'; font-size: 12pt; font-style: normal;\">threat<\/span><span style=\"margin: 0px; color: #000000; font-family: 'Times New Roman'; font-size: 12pt;\">\u00a0<\/span><span style=\"margin: 0px; color: #000000; font-family: 'Times New Roman'; font-size: 12pt;\">is a potential security violation that can challenge defenses in an attempt to breach privacy and\/or cause harm. ( \u00a0 T\u00a0 )<\/span><br \/>\n<span style=\"margin: 0px; color: #000000; font-family: 'Times New Roman'; font-size: 12pt;\">6. A<\/span><span style=\"margin: 0px; color: #000000; font-family: 'Times New Roman'; font-size: 12pt;\">\u00a0<\/span><span style=\"margin: 0px; color: #000000; font-family: 'Times New Roman'; font-size: 12pt; font-style: normal;\">vulnerability<\/span><span style=\"margin: 0px; color: #000000; font-family: 'Times New Roman'; font-size: 12pt;\">\u00a0<\/span><span style=\"margin: 0px; color: #000000; font-family: 'Times New Roman'; font-size: 12pt;\">is a weakness that can be exploited either because it is protected by insufficient security controls, or because existing security controls are overcome by an attack. ( T\u00a0 )<\/span><br \/>\n<span style=\"margin: 0px; color: #000000; font-family: 'Times New Roman'; font-size: 12pt;\">7.<\/span><span style=\"margin: 0px; color: #000000; font-family: 'Times New Roman'; font-size: 12pt; font-style: normal;\">\u00a0Risk<\/span><span style=\"margin: 0px; color: #000000; font-family: 'Times New Roman'; font-size: 12pt;\">\u00a0<\/span><span style=\"margin: 0px; color: #000000; font-family: 'Times New Roman'; font-size: 12pt;\">is the possibility of loss or harm arising from performing an activity. Risk is typically measured according to its threat level and the number of possible or known vulnerabilities.<\/span><span style=\"margin: 0px; color: #000000; font-family: 'Times New Roman'; font-size: 12pt;\">\u00a0<\/span><span style=\"margin: 0px; color: #000000; font-family: 'Times New Roman'; font-size: 12pt;\">( \u00a0 T )<\/span><br \/>\n<span style=\"margin: 0px; color: #000000; font-family: 'Times New Roman'; font-size: 12pt;\">8.<\/span><span style=\"margin: 0px; color: #000000; font-family: 'Times New Roman'; font-size: 12pt;\">\u00a0Security policies are countermeasures used to prevent or respond to security threats and to reduce or avoid risk. <\/span><br \/>\n<span style=\"margin: 0px; color: #000000; font-family: 'Times New Roman'; font-size: 12pt;\">\u00a0( F \u00a0 )<\/span><br \/>\n<strong>(Security controls are countermeasures used to prevent or respond to security threats and to reduce or avoid risk. )<\/strong><\/p>\n<p align=\"justify\"><span style=\"margin: 0px; color: #000000; font-family: 'Times New Roman'; font-size: 12pt;\">9. A virtualization attack exploits vulnerabilities within physical environments to gain unauthorized access to underlying physical hardware. ( F \u00a0 )<\/span><\/p>\n<p align=\"justify\"><strong>(A virtualization attack exploits vulnerabilities within virtualized environments to gain unauthorized access to underlying physical hardware.)<\/strong><\/p>\n<p><span style=\"margin: 0px; color: #000000; font-family: 'Times New Roman'; font-size: 12pt;\">10. Overlapping trust boundaries represent a threat whereby attackers can exploit cloud-based IT resources shared by multiple cloud consumers. ( T \u00a0 )<\/span><br \/>\n<b><span style=\"margin: 0px; color: #000000; font-family: 'Times New Roman'; font-size: 12pt; font-weight: bold;\"><span style=\"font-family: \u5b8b\u4f53;\">\u4e8c\u3001\u9009\u62e9\u9898<\/span><\/span><\/b><b><\/b><br \/>\n<span style=\"margin: 0px; color: #000000; font-family: 'Times New Roman';\">1.<\/span><span style=\"margin: 0px; color: #000000; font-family: 'Times New Roman'; font-size: 12pt;\">\u00a0Confidentiality, integrity, authenticity, and availability are characteristics that can be associated with <\/span><u><span style=\"margin: 0px; color: #000000; font-family: 'Times New Roman'; font-size: 12pt; text-decoration: underline;\">\u00a0\u00a0 A \u00a0 \u00a0\u00a0 <\/span><\/u><span style=\"margin: 0px; color: #000000; font-family: 'Times New Roman'; font-size: 12pt;\">.<\/span><br \/>\n<span style=\"margin: 0px; color: #000000; font-family: 'Times New Roman'; font-size: 12pt;\"><strong>A. measuring security \u00a0\u00a0<\/strong>\u00a0\u00a0\u00a0B. measuring and assessing insecurity <\/span><br \/>\n<span style=\"margin: 0px; color: #000000; font-family: 'Times New Roman'; font-size: 12pt;\">C. establishing countermeasures and safeguards \u00a0\u00a0D.all<\/span><br \/>\n<span style=\"margin: 0px; color: #000000; font-family: 'Times New Roman'; font-size: 12pt;\">2.<\/span><u><span style=\"margin: 0px; color: #000000; font-family: 'Times New Roman'; font-size: 12pt; text-decoration: underline;\"> \u00a0 \u00a0\u00a0 D \u00a0 <\/span><\/u><span style=\"margin: 0px; color: #000000; font-family: 'Times New Roman'; font-size: 12pt;\">are associated with measuring and assessing insecurity, or the lack of security.<\/span><br \/>\n<span style=\"margin: 0px; color: #000000; font-family: 'Times New Roman'; font-size: 12pt;\">A.Threats \u00a0\u00a0B.Vulnerabilities \u00a0\u00a0C. Risks \u00a0<strong>\u00a0D.all<\/strong><\/span><br \/>\n<span style=\"margin: 0px; color: #000000; font-family: 'Times New Roman'; font-size: 12pt;\">3. <\/span><u><span style=\"margin: 0px; color: #000000; font-family: 'Times New Roman'; font-size: 12pt; text-decoration: underline;\">\u00a0\u00a0 D \u00a0 \u00a0\u00a0 <\/span><\/u><span style=\"margin: 0px; color: #000000; font-family: 'Times New Roman'; font-size: 12pt;\">are associated with establishing countermeasures and safeguards in support of improving security.<\/span><br \/>\n<span style=\"margin: 0px; color: #000000; font-family: 'Times New Roman'; font-size: 12pt;\">A.Security controls \u00a0B. Security mechanisms \u00a0C. Security policies \u00a0<strong>D.all<\/strong><\/span><br \/>\n<span style=\"margin: 0px; color: #000000; font-family: 'Times New Roman'; font-size: 12pt;\">4. <\/span><u><span style=\"margin: 0px; color: #000000; font-family: 'Times New Roman'; font-size: 12pt; text-decoration: underline;\">\u00a0 \u00a0 D \u00a0 \u00a0 <\/span><\/u><span style=\"margin: 0px; color: #000000; font-family: 'Times New Roman'; font-size: 12pt;\">is a non-trusted threat agent that usually attempts attacks from outside of a cloud\u2019s boundary.<\/span><br \/>\n<span style=\"margin: 0px; font-family: 'Times New Roman'; font-size: 12pt;\"><span style=\"color: #000000;\">A<\/span><\/span><span style=\"margin: 0px; color: #000000; font-family: 'Times New Roman'; font-size: 12pt;\">. A malicious insider \u00a0\u00a0\u00a0\u00a0\u00a0\u00a0B. A trusted attacker <\/span><br \/>\n<span style=\"margin: 0px; color: #000000; font-family: 'Times New Roman'; font-size: 12pt;\">C. A malicious service agent \u00a0<strong>D. An anonymous attacker<\/strong><\/span><br \/>\n<span style=\"margin: 0px; color: #000000; font-family: 'Times New Roman'; font-size: 12pt;\">5. <\/span><u><span style=\"margin: 0px; color: #000000; font-family: 'Times New Roman'; font-size: 12pt; text-decoration: underline;\">\u00a0 C \u00a0 \u00a0 \u00a0 <\/span><\/u><span style=\"margin: 0px; color: #000000; font-family: 'Times New Roman'; font-size: 12pt;\">intercepts network communication in an attempt to maliciously use or augment the data.<\/span><br \/>\n<span style=\"margin: 0px; font-family: 'Times New Roman'; font-size: 12pt;\"><span style=\"color: #000000;\">A<\/span><\/span><span style=\"margin: 0px; color: #000000; font-family: 'Times New Roman'; font-size: 12pt;\">. A malicious insider \u00a0\u00a0\u00a0\u00a0\u00a0\u00a0B. A trusted attacker <\/span><br \/>\n<span style=\"margin: 0px; color: #000000; font-family: 'Times New Roman'; font-size: 12pt;\"><strong>C. A malicious service agent<\/strong> \u00a0D. An anonymous attacker<\/span><br \/>\n<span style=\"margin: 0px; color: #000000; font-family: 'Times New Roman'; font-size: 12pt;\">6. <\/span><u><span style=\"margin: 0px; color: #000000; font-family: 'Times New Roman'; font-size: 12pt; text-decoration: underline;\">\u00a0 \u00a0\u00a0 B \u00a0 \u00a0<\/span><\/u><span style=\"margin: 0px; color: #000000; font-family: 'Times New Roman'; font-size: 12pt;\"> exists as an authorized cloud service consumer with legitimate credentials that it uses to exploit access to cloud-based IT resources.<\/span><br \/>\n<span style=\"margin: 0px; color: #000000; font-family: 'Times New Roman'; font-size: 12pt;\">A. A malicious insider \u00a0\u00a0\u00a0\u00a0\u00a0<strong>\u00a0B. A trusted attacker<\/strong> <\/span><br \/>\n<span style=\"margin: 0px; color: #000000; font-family: 'Times New Roman'; font-size: 12pt;\">C. A malicious service agent \u00a0D. An anonymous attacker<\/span><br \/>\n<span style=\"margin: 0px; color: #000000; font-family: 'Times New Roman'; font-size: 12pt;\">7.<\/span><u><span style=\"margin: 0px; color: #000000; font-family: 'Times New Roman'; font-size: 12pt; text-decoration: underline;\"> \u00a0\u00a0 A \u00a0 \u00a0 <\/span><\/u><span style=\"margin: 0px; color: #000000; font-family: 'Times New Roman'; font-size: 12pt;\">is a human that attempts to abuse access privileges to cloud premises.<\/span><br \/>\n<strong><span style=\"margin: 0px; font-family: 'Times New Roman'; font-size: 12pt;\"><span style=\"color: #000000;\">A<\/span><\/span><\/strong><span style=\"margin: 0px; color: #000000; font-family: 'Times New Roman'; font-size: 12pt;\"><strong>. A malicious insider \u00a0<\/strong>\u00a0\u00a0\u00a0\u00a0\u00a0B. A trusted attacker <\/span><br \/>\n<span style=\"margin: 0px; color: #000000; font-family: 'Times New Roman'; font-size: 12pt;\">C. A malicious service agent \u00a0D. An anonymous attacker<\/span><br \/>\n<span style=\"margin: 0px; color: #000000; font-family: 'Times New Roman'; font-size: 12pt;\">8. Traffic eavesdropping and malicious intermediary attacks are usually carried out by <\/span><u><span style=\"margin: 0px; color: #000000; font-family: 'Times New Roman'; font-size: 12pt; text-decoration: underline;\">\u00a0 \u00a0\u00a0 C \u00a0\u00a0 <\/span><\/u><span style=\"margin: 0px; color: #000000; font-family: 'Times New Roman'; font-size: 12pt;\">that intercept network traffic.<\/span><br \/>\n<span style=\"margin: 0px; font-family: 'Times New Roman'; font-size: 12pt;\"><span style=\"color: #000000;\">A<\/span><\/span><span style=\"margin: 0px; color: #000000; font-family: 'Times New Roman'; font-size: 12pt;\">. malicious insiders \u00a0\u00a0\u00a0\u00a0\u00a0\u00a0\u00a0\u00a0B. trusted attackers <\/span><br \/>\n<span style=\"margin: 0px; color: #000000; font-family: 'Times New Roman'; font-size: 12pt;\"><strong>C. malicious service agents<\/strong> \u00a0\u00a0D. anonymous attackers<\/span><br \/>\n<span style=\"margin: 0px; color: #000000; font-family: 'Times New Roman'; font-size: 12pt;\">9. A <\/span><u><span style=\"margin: 0px; color: #000000; font-family: 'Times New Roman'; font-size: 12pt; text-decoration: underline;\">\u00a0 A \u00a0 \u00a0 \u00a0\u00a0<\/span><\/u><span style=\"margin: 0px; color: #000000; font-family: 'Times New Roman'; font-size: 12pt;\"> attack occurs when a targeted IT resource is overloaded with requests in an attempt to cripple or render it unavailable.<\/span><br \/>\n<strong><span style=\"margin: 0px; font-family: 'Times New Roman'; font-size: 12pt;\"><span style=\"color: #000000;\">A<\/span><\/span><\/strong><span style=\"margin: 0px; color: #000000; font-family: 'Times New Roman'; font-size: 12pt;\"><strong>. denial of service<\/strong> \u00a0\u00a0\u00a0\u00a0\u00a0\u00a0\u00a0B. traffic eavesdropping <\/span><br \/>\n<span style=\"margin: 0px; color: #000000; font-family: 'Times New Roman'; font-size: 12pt;\">C. malicious intermediary \u00a0\u00a0D. insufficient authorization<\/span><br \/>\n<span style=\"margin: 0px; color: #000000; font-family: 'Times New Roman'; font-size: 12pt;\">10.The <\/span><u><span style=\"margin: 0px; color: #000000; font-family: 'Times New Roman'; font-size: 12pt; text-decoration: underline;\">\u00a0 \u00a0\u00a0 D \u00a0 \u00a0<\/span><\/u><span style=\"margin: 0px; color: #000000; font-family: 'Times New Roman'; font-size: 12pt;\"> attack occurs when access is granted to an attacker erroneously or too broadly, or when weak passwords are used.<\/span><br \/>\n<span style=\"margin: 0px; font-family: 'Times New Roman'; font-size: 12pt;\"><span style=\"color: #000000;\">A<\/span><\/span><span style=\"margin: 0px; color: #000000; font-family: 'Times New Roman'; font-size: 12pt;\">. denial of service \u00a0\u00a0\u00a0\u00a0\u00a0\u00a0\u00a0B. traffic eavesdropping <\/span><br \/>\n<span style=\"margin: 0px; color: #000000; font-family: 'Times New Roman'; font-size: 12pt;\">C. malicious intermediary \u00a0\u00a0<strong>D. insufficient authorization<\/strong><\/span><br \/>\n\u7b80\u7b54\u9898\uff1a<br \/>\n<span style=\"margin: 0px; font-family: 'Times New Roman'; font-size: 12pt;\"><span style=\"color: #000000;\">1. <\/span><\/span><b><span style=\"margin: 0px; color: #000000; font-family: 'Times New Roman'; font-size: 12pt; font-weight: bold;\">About the<\/span><\/b><span style=\"color: #000000;\"><b><i><span style=\"margin: 0px; font-family: 'Times New Roman'; font-size: 12pt; font-style: italic; font-weight: bold;\">\u00a0threat agents<\/span><\/i><\/b><b><span style=\"margin: 0px; font-family: 'Times New Roman'; font-size: 12pt; font-weight: bold;\">.<\/span><\/b><\/span><b><span style=\"margin: 0px; color: #000000; font-family: 'Times New Roman'; font-size: 12pt; font-weight: bold;\">\u00a0( 8 points )<\/span><\/b><br \/>\n<b><span style=\"margin: 0px; font-family: 'Times New Roman'; font-size: 12pt; font-weight: bold;\"><span style=\"color: #000000;\">a) What is<\/span><\/span><\/b><b><span style=\"margin: 0px; color: #000000; font-family: 'Times New Roman'; font-size: 12pt; font-weight: bold;\">\u00a0a<\/span><\/b><b><span style=\"margin: 0px; color: #000000; font-family: 'Times New Roman'; font-size: 12pt; font-weight: bold;\">\u00a0<\/span><\/b><b><i><span style=\"margin: 0px; color: #000000; font-family: 'Times New Roman'; font-size: 12pt; font-style: italic; font-weight: bold;\">threat agent<\/span><\/i><\/b><b><span style=\"margin: 0px; color: #000000; font-family: 'Times New Roman'; font-size: 12pt; font-weight: bold;\">\u00a0<\/span><\/b><b><span style=\"margin: 0px; color: #000000; font-family: 'Times New Roman'; font-size: 12pt; font-weight: bold;\"><span style=\"font-family: \u5b8b\u4f53;\">\uff1f<\/span><\/span><\/b><b><span style=\"margin: 0px; color: #000000; font-family: 'Times New Roman'; font-size: 12pt; font-weight: bold;\">( 2 points )<\/span><\/b><br \/>\n<span style=\"margin: 0px; font-family: 'Times New Roman'; font-size: 12pt;\"><span style=\"color: #000000;\">A\u00a0 threat agent is an entity that poses a threat because it is capable of carrying out an attack.<\/span><\/span><br \/>\n<b><span style=\"margin: 0px; color: #000000; font-family: 'Times New Roman'; font-size: 12pt; font-weight: bold;\">b) fill in the table.<\/span><\/b><b><span style=\"margin: 0px; color: #000000; font-family: 'Times New Roman'; font-weight: bold;\">\u00a0( 6 points )<\/span><\/b><b><\/b><\/p>\n<table border=\"1\" cellspacing=\"0\">\n<tbody>\n<tr>\n<td valign=\"top\" width=\"192\">\n<p align=\"center\"><b><span style=\"margin: 0px; color: #000000; font-family: 'Times New Roman'; font-style: normal; font-weight: bold;\"><span style=\"font-size: small;\">threat agent<\/span><\/span><\/b><i><\/i><\/p>\n<\/td>\n<td valign=\"top\" width=\"366\">\n<p align=\"center\"><b><span style=\"margin: 0px; color: #000000; font-family: 'Times New Roman'; font-size: 12pt; font-weight: bold;\">Defintion<\/span><\/b><b><\/b><\/p>\n<\/td>\n<\/tr>\n<tr>\n<td valign=\"top\" width=\"192\">\n<p align=\"center\"><span style=\"margin: 0px; color: #000000; font-family: 'Times New Roman'; font-size: 12pt;\">An<\/span><span style=\"font-size: small;\"><span style=\"margin: 0px; color: #000000; font-family: 'Times New Roman';\">\u00a0<\/span><i><span style=\"margin: 0px; color: #000000; font-family: 'Times New Roman'; font-style: italic;\">anonymous attacke<\/span><\/i><\/span><b><i><\/i><\/b><\/p>\n<\/td>\n<td valign=\"top\" width=\"366\">\n<p align=\"justify\"><b><span style=\"margin: 0px; color: #000000; font-family: 'Times New Roman'; font-weight: bold;\"><span style=\"font-size: small;\">\u00a0<\/span><\/span><\/b><\/p>\n<p><b><span style=\"color: #000000;\">is a non-trusted threat agent that usually attempts attacks from outside of a cloud\u2019s boundary<\/span><\/b><\/p>\n<p align=\"justify\"><b><span style=\"font-size: small;\">\u00a0<\/span><\/b><\/p>\n<p align=\"justify\"><b><span style=\"margin: 0px; color: #000000; font-family: 'Times New Roman'; font-size: 12pt; font-weight: bold;\">\u00a0<\/span><\/b><\/p>\n<\/td>\n<\/tr>\n<tr>\n<td valign=\"top\" width=\"192\">\n<p align=\"center\"><span style=\"margin: 0px; color: #000000; font-family: 'Times New Roman'; font-size: 12pt;\">A<\/span><span style=\"font-size: small;\"><span style=\"margin: 0px; color: #000000; font-family: 'Times New Roman';\">\u00a0<\/span><i><span style=\"margin: 0px; color: #000000; font-family: 'Times New Roman'; font-style: italic;\">malicious service agent<\/span><\/i><\/span><b><i><\/i><\/b><\/p>\n<\/td>\n<td valign=\"top\" width=\"366\">\n<p align=\"justify\"><span style=\"margin: 0px; color: #000000; font-family: 'Times New Roman';\"><span style=\"font-size: small;\">\u00a0<\/span><\/span><b><\/b><\/p>\n<p align=\"justify\"><b>Is able to intercept and forward the network traffic that flows within a cloud.<\/b><b><\/b><\/p>\n<p align=\"justify\"><b><span style=\"margin: 0px; color: #000000; font-family: 'Times New Roman'; font-size: 12pt; font-weight: bold;\">\u00a0<\/span><\/b><\/p>\n<\/td>\n<\/tr>\n<tr>\n<td valign=\"top\" width=\"192\">\n<p align=\"center\"><b><span style=\"margin: 0px; color: #000000; font-family: 'Times New Roman'; font-size: 12pt; font-weight: bold;\">\u00a0<\/span><\/b><\/p>\n<p align=\"center\"><b><i>A trust attacker<\/i><\/b><b><i><\/i><\/b><\/p>\n<\/td>\n<td valign=\"top\" width=\"366\">\n<p align=\"justify\"><span style=\"margin: 0px; color: #000000; font-family: 'Times New Roman'; font-size: 12pt;\">shares IT resources in the same cloud environment as the cloud consumer and attempts to exploit legitimate credentials to target cloud providers and the cloud tenants with whom they share IT resources<\/span><span style=\"margin: 0px; color: #000000; font-family: 'Times New Roman';\"><span style=\"font-size: small;\">\u00a0<\/span><\/span><\/p>\n<\/td>\n<\/tr>\n<tr>\n<td valign=\"top\" width=\"192\">\n<p align=\"center\"><b><i><span style=\"margin: 0px; color: #000000; font-family: 'Times New Roman'; font-style: italic; font-weight: bold;\"><span style=\"font-size: small;\">Malicious insiders<\/span><\/span><\/i><\/b><b><\/b><\/p>\n<\/td>\n<td valign=\"top\" width=\"366\">\n<p align=\"justify\"><span style=\"margin: 0px; color: #000000; font-family: 'Times New Roman';\"><span style=\"font-size: small;\">\u00a0<\/span><\/span><span style=\"margin: 0px; color: #000000; font-family: 'Times New Roman'; font-size: 12pt;\">are human threat agents acting on behalf of or in relation to the cloud provider.<\/span><\/p>\n<\/td>\n<\/tr>\n<\/tbody>\n<\/table>\n<p><b><span style=\"margin: 0px; color: #000000; font-family: 'Times New Roman'; font-size: 12pt; font-weight: bold;\">2. When does the following<\/span><\/b><span style=\"margin: 0px; font-family: 'Times New Roman'; font-size: 12pt;\"><span style=\"color: #000000;\">\u00a0<\/span><\/span><b><i><span style=\"margin: 0px; color: #000000; font-family: 'Times New Roman'; font-size: 12pt; font-style: italic; font-weight: bold;\">cloud security threat <\/span><\/i><\/b><b><span style=\"margin: 0px; color: #000000; font-family: 'Times New Roman'; font-size: 12pt; font-weight: bold;\">occur?( 8 points )<\/span><\/b><b><\/b><br \/>\n<b><span style=\"margin: 0px; font-family: 'Times New Roman'; font-size: 12pt; font-weight: bold;\"><span style=\"color: #000000;\">a)<\/span><\/span><\/b><b><i><span style=\"margin: 0px; color: #000000; font-family: 'Times New Roman'; font-size: 12pt; font-style: italic; font-weight: bold;\">\u00a0Traffic eavesdropping<\/span><\/i><\/b><b><i><\/i><\/b><br \/>\noccurs when data being transferred to or within a cloud is passively intercepted by a malicious service agent for illegitimate information gathering purposes.<br \/>\n<b><span style=\"margin: 0px; color: #000000; font-family: 'Times New Roman'; font-size: 12pt; font-weight: bold;\">\u00a0\u00a0b) M<\/span><\/b><b><i><span style=\"margin: 0px; color: #000000; font-family: 'Times New Roman'; font-size: 12pt; font-style: italic; font-weight: bold;\">alicious intermediary <\/span><\/i><\/b><b><i><span style=\"margin: 0px; color: #000000; font-family: 'Times New Roman'; font-size: 12pt; font-style: italic; font-weight: bold;\">threat<\/span><\/i><\/b><b><i><\/i><\/b><br \/>\narises when message are intercepted and altered by a malicious service agent<br \/>\n<b><span style=\"margin: 0px; color: #000000; font-family: 'Times New Roman'; font-size: 12pt; font-weight: bold;\">c) D<\/span><\/b><b><i><span style=\"margin: 0px; color: #000000; font-family: 'Times New Roman'; font-size: 12pt; font-style: italic; font-weight: bold;\">enial of service<\/span><\/i><\/b><b><span style=\"margin: 0px; color: #000000; font-family: 'Times New Roman'; font-size: 12pt; font-weight: bold;\">\u00a0<\/span><\/b><b><i><span style=\"margin: 0px; color: #000000; font-family: 'Times New Roman'; font-size: 12pt; font-style: italic; font-weight: bold;\">(DoS) attack<\/span><\/i><\/b><b><\/b><br \/>\noccurs when a targeted IT resource is overloaded to the point where they cannot function properly.<br \/>\n&nbsp;<br \/>\n&nbsp;<br \/>\n&nbsp;<\/p>\n","protected":false},"excerpt":{"rendered":"<p>6.1 \u57fa\u672c\u5c5e\u4e8e\u4e0e\u6982\u5ff5 IT\u5b89\u5168\u63aa\u65bd\u65e8\u5728\u9632\u5fa1\u7531\u4e8e\u6076\u610f\u7684\u4f01\u56fe(malicious intent)\u548c\u65e0\u5fc3 [&hellip;]<\/p>\n","protected":false},"author":1,"featured_media":0,"comment_status":"open","ping_status":"open","sticky":false,"template":"","format":"standard","meta":{"om_disable_all_campaigns":false,"_mi_skip_tracking":false,"_monsterinsights_sitenote_active":false,"_monsterinsights_sitenote_note":"","_monsterinsights_sitenote_category":0,"footnotes":""},"categories":[27],"tags":[],"views":7636,"_links":{"self":[{"href":"http:\/\/www.sniper97.cn\/index.php\/wp-json\/wp\/v2\/posts\/386"}],"collection":[{"href":"http:\/\/www.sniper97.cn\/index.php\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"http:\/\/www.sniper97.cn\/index.php\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"http:\/\/www.sniper97.cn\/index.php\/wp-json\/wp\/v2\/users\/1"}],"replies":[{"embeddable":true,"href":"http:\/\/www.sniper97.cn\/index.php\/wp-json\/wp\/v2\/comments?post=386"}],"version-history":[{"count":0,"href":"http:\/\/www.sniper97.cn\/index.php\/wp-json\/wp\/v2\/posts\/386\/revisions"}],"wp:attachment":[{"href":"http:\/\/www.sniper97.cn\/index.php\/wp-json\/wp\/v2\/media?parent=386"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"http:\/\/www.sniper97.cn\/index.php\/wp-json\/wp\/v2\/categories?post=386"},{"taxonomy":"post_tag","embeddable":true,"href":"http:\/\/www.sniper97.cn\/index.php\/wp-json\/wp\/v2\/tags?post=386"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}