Cloud computing security

Generic security issues

API vunribilities

Interoperability issues

Authentication concerns

Access control

Malicious insiders

Monitoring

Authentication

Secure communication

credential theft

Authorization

Instrusion detection

Best practices

SLA compliance

Account Hijacking

Access control

Security policies

Monitoring

Counter measures

SYN analysis

Connection limits

Information collection

Port exploitation

Dos/DDos attacks

Man-in-the-cloud

Data security

Transit security

SSL/TLS

HTTP examination

Storage protection

Back up

Vulnerable objects

TLS protection

Encryption

TCB solution

Authentication issues

SaaS security

Code injection

Storage security

Access control

SOA vulnerabilities

Resource sharing risks

Hardware security

Memory access

Information theft

Cache based side channel

Hyper vision vulnerabilities

Virtualization issues

Root access risk

Interoperability issues

VM escape

Hyper safe solution

VM image vulnrabilities

TPM protection

Application security

API security

PaaS security

Programming platforms

Java security

Session management

JVM isolation

.NET security

Data protection

Session management

Encryption

Service based models

CLR profiling

XML related attacks

IaaS security

Log analysis