1. In order to gain entry to your cloud storage, what does an attacker need?



2. Name at least two ways that an attacker can steal your credentials.


3. How can attackers gain access to your cloud storage without knowing
your login details?



4. Even with the strongest IT infrastructure, what is always the weakest
link in a system?



5. What are your thoughts on the security of cloud storage? Would you use it if
you owned a company? Is there any information that you would not like
stored in the cloud? Explain using at least 3-4 sentences.

1. In order to gain entry to your cloud storage, an attacker would typically need to have access to valid login credentials, such as a username and password. They may also need additional forms of authentication, such as a two-factor authentication code.

2. Two common ways that an attacker can steal your credentials are through phishing attacks and through the use of keyloggers or malware. Phishing attacks involve tricking a user into providing their login credentials on a fake website that mimics a legitimate login page. Keyloggers or malware can be used to capture keystrokes or steal login information from a compromised device.

3. Attackers can gain access to cloud storage without knowing the login details by exploiting vulnerabilities in the cloud service provider's infrastructure or by exploiting misconfigurations in the user's account. This can include methods such as exploiting weak passwords, exploiting unsecured APIs, or bypassing authentication controls through software vulnerabilities.

4. The weakest link in a system is often the human element, including the users and administrators who interact with the system. This could include factors such as weak passwords, falling victim to phishing attacks, or unintentionally misconfiguring security settings.

5. The security of cloud storage can vary depending on the cloud service provider and the security measures implemented. While cloud storage can offer benefits such as scalability and accessibility, there are also potential risks to consider. It is important to carefully evaluate the security practices of cloud service providers and ensure appropriate security measures are in place, such as strong encryption and access controls. As for owning a company, it would depend on the sensitivity of the data and the level of trust in the cloud service provider. There may be certain types of sensitive information, such as highly confidential trade secrets or proprietary data, that a company may not want to store in the cloud due to concerns about data breaches or unauthorized access.