In this research, AWS Key Management Service (KMS) and Google Cloud Key Management Service offerings were tested hands-on within each respective CSPs cloud console. This paper intends to give a comprehensive overview of the Encryption Key Management Services offered by two of the most frequently use CSPs: Amazon Web Services (AWS) and Google Cloud Platform (GCP). Due to this business model's increase in popularity in recent years, CSPs need to make security of data in the cloud their top priority and give their customers the proper tools they need to protect their data while using their services. Utilization of public Cloud Service Providers (CSPs) has increased drastically since its inception, with many businesses using a Software-as-a-Service (SaaS) business model, meaning their entire business is run on the cloud. It is expected the research output to show that browser vulnerabilities aren't a one size fits all type of attack and also expected some websites to have lower levels of protection allowing for poor security against malicious extensions. This research also shows the different vulnerabilities that exist within browsers, and demonstrates the privileges that browsers have on a computer. This research will help to inform browser users of the dangers that exist when using extensions, and how threat actors may be deceiving them to perform malicious activities on their computers. By researching and implementing a variety of different attacks, authors plan to find where Chrome is susceptible to allowing malicious extensions. The objective of this research is to test a variety of different attacks using browser extensions on Google Chrome. These attacks aren't guaranteed to cause malicious behavior, but we will also discuss ways of increasing user safety when operating a web browser, and specifically browser extensions. We will also look at a variety of attacks that extensions can execute, and exactly how they work. This research explores the potential risks that are involved in utilizing browser extensions for Google Chrome. These exist within the browser itself, but for the purposes of this research, Chrome's extensions will be the main focus. Just like many applications and browsers that are widely available and free to use, Google Chrome has its weaknesses and vulnerabilities. But with such heavy global use, comes a feeling of false security. In fact, Google Chrome is currently the most used web browser in the world. Google Chrome has cemented itself as one of the go-to browsers for both commercial and everyday consumer use. These risks exist in both the browsers and their extensions. Many of us take this incredible functionality for granted, and don't recognize the potential risks that are involved with simple internet use. In today's world, web browsers are used by most everyone daily. In addition NextCloud has concern for security and a sense of control. Finally, this study concludes that each of these two services has their suited demographic such as Dropbox is for users that are not overly concerned about security and NextCloud required to have a more expertise on computers to set up and maintain the private cloud. The results shows that both services deal with Confidentiality, Integrity and Availability a little differently but they ultimately arrive at the same goal. We will conduct a detailed analysis of the benefits of one service over the other and their shortcoming. This study compares the two services based on security, authentication, and privacy of each services. The other one is "Dropbox" which is a public cloud provider. This paper focuses on two cloud services where one is "NextCloud" which is a private open-source cloud provider with an end-to-end solution. Cloud computing has brought about different types of cloud delivery services such as SaaS, PaaS. Cloud computing came with a lot of benefits such as cost-benefit, could be configured, accessed anywhere, being a reliable service, it also brought some negative aspects too which were centered on security and privacy concern. A few years ago, having a storage infrastructure was an expensive idea that had to come with the buying, storage, securing, and maintenance of the equipment used to develop the infrastructure. In recent years cloud computing has moved from an idea phase to a necessity in the business and personal use world, it has gone from being a theory to being an easily accessible need for organizations and individuals.
0 Comments
Leave a Reply. |