Securing The Cloud
About the Project
The cloud is widely used to host important services and perform valuable data analysis. Since the cloud shares hardware among its users, there is potential for bad actors working either in the cloud or intentionally misusing hosted services to carry out attacks.
Cloud providers have protection mechanisms meant to limit the possibilities of such attacks, but these mechanisms might not always be effective. The Connection Lab is investigating potential weaknesses of cloud environments to such attacks, and methods of improving cloud defenses against them.