Explore chapters and articles related to this topic
Benefits and Risks of Cloud Computing
Published in Uzzal Sharma, Parmanand Astya, Anupam Baliyan, Salah-ddine Krit, Vishal Jain, Mohammad Zubair Khan, Advancing Computational Intelligence Techniques for Security Systems Design, 2023
Osheen Oberoi, Sahil Raj, Viput Ongsakul, Vishal Goyal
A data center is a storehouse where data is stored at a centralized location. It provides numerous vital services to organizations, such as data storage, data backup and recovery, and management. Some organizations rent their data centers to users. There exist a plethora of access security issues in the cloud data centers, so no organizations can provide full physical security of the data. Data leakage in the data centers is considered to be the prime security concern. While developing the data center, the developer ensures all security measures to protect the information are taken. An organization's data is not only at risk from malicious outsiders, but an insider can also harm the data by accessing or controlling the internal physical security [36]. Sensitive information can be leaked either by a malicious insider or a malicious system admin who can access it and breach the user's privacy [34]. A cold boot attack is another way intruders steal crucial data by directly accessing the computer hardware. In other words, the hacker has physical access to the user's computer and then carries out a cold reboot to restart the machine with a motive to retrieve the encryption keys from the Windows Operating System. Besides, hardware tampering is yet another security issue in which the attacker intentionally implies an intrusion mechanism to perform an unauthorized physical or electronic action against a device.
Building Cloud Networks
Published in John W. Rittinghouse, James F. Ransome, Cloud Computing, 2017
John W. Rittinghouse, James F. Ransome
For operating system development tasks, virtualization has a significant additional benefit—running the new system as a guest avoids any need to reboot the computer whenever a bug is encountered. This protected or insulated environment is known as a “sandbox,” and such sandboxed guest systems are useful in computer security research and development. In order to study the effects of malware, viruses, and worms without compromising the host system, developers often prefer to use a sandbox. Hardware appliance vendors increasingly have begun to ship their products preconfigured with several guest systems. This allows them to deliver complex solutions that are able to execute various software applications running on different operating systems.
Non-exponential Distributions in Reliability Modeling of PMS: Approximation and Simulation Approaches
Published in Mangey Ram, Modeling and Simulation Based Analysis in Reliability Engineering, 2018
Xiang-Yu Li, Jun Hu, Hong-Zhong Huang, Yan-Feng Li
All the components can be divided into two categories: mechanical components and electrical components. The commonly seen failure modes of the mechanical components are fracture, fatigue, or corrosion [46,47], which cannot be maintained without backup standby. For the electronics, except for the structure failures (that also cannot be maintained without backup standby), they are subject to functional failures (like the computer crash or power loss), which can be self-repaired by system reboot [48]. The lifetime of the mechanical components is usually described by a Weibull distribution, whereas the lifetime of the electronics is described by the exponential distribution. All the components’ parameters are shown in Table 2.12.
Crypto Mining Attacks in Information Systems: An Emerging Threat to Cyber Security
Published in Journal of Computer Information Systems, 2020
Aaron Zimba, Zhaoshun Wang, Mwenge Mulenga, Nickson Herbert Odongo
A WaterMiner (“Arbuz”) is another observed stealthy crypto mining malware variant based on XMRig. This particular strain was initially distributed as part of a module for online gaming. Crypto-jacking is not uncommon among gamers, a commonplace for GPU which are efficient in mining cryptocurrencies.29 It is the pawncc.exe file in the module that actually downloads the crypto miners and saves it in the “%TEMP%\Intel(R) Security Assistent.exe” directory. The downloaded crypto miners establishes a persistence mechanism in the system registry by disguising under a RunOnce key, masqueraded as an Oracle Corporation application as shown in the code snippet in Figure 6. Such a persistence mechanism ensures that the malware will still run even after a reboot of the infected system.
Blended call center with idling times during the call service
Published in IISE Transactions, 2018
Benjamin Legros, Oualid Jouini, Ger Koole
For efficient use of the agent’s time, one could consider the routing of less urgent jobs to not only when the system is empty of calls but also during call conversations. In practice, such a situation often occurs. For example, an agent in an Internet hotline call center asks the customer to reboot his modem or computer, which may take some, during which no interactions can take place. Or a call center agent for an electricity supplier company may ask the customer for the serial number of his electricity meter box. This box is usually located outside the house and is locked, so the customer needs a non-negligible amount of time to obtain the required information. Another example is that of commercial call centers with a financial transaction during the call conversation. After some time from the start of the call conversation, the customer is asked to make an online payment on a website before returning to the same agent to finish the conversation. The online payment requires the customer to locate his credit card, enter the credit card number, and go through the automated safety check with his bank (using SMS, for example), which may take several minutes.