An attacker has compromised a cloud environment of a company and used the employee information to perform an identity theft attack. Which type of attack is this?
Cloud as subject : It refers to a crime in which the attackers attempt to compromise the security of a cloud environment to steal data or inject malware.
Example: Stealing the identity of a cloud user, unauthorized modification or deletion of stored data, and installation of malware on the cloud.
Computer Hacking Forensics Investigator (CHFI) Version 10
EC-Council Pg. 1125
From the book: Cloud as a Subject: refers to a crime in which the attackers attempt to compromise the security of a cloud environment to steal data or inject malware. Cloud as a tool: The cloud becomes a tool when the attacker uses a compromised cloud account to attack other accounts. In such cases, both the source and target cloud can store the evidence data (In this case, the cloud is used to plan and commit a crime)
Answer is B. I believe
As a basic rule: The subject is the person or thing doing something. The object is having something done to it
upvoted 1 times
...
This section is not available anymore. Please use the main Exam Page.312-49 Exam Questions
Log in to ExamTopics
Sign in:
Community vote distribution
A (35%)
C (25%)
B (20%)
Other
Most Voted
A voting comment increases the vote count for the chosen answer by one.
Upvoting a comment with a selected answer will also increase the vote count towards that answer by one.
So if you see a comment that you already agree with, you can upvote it instead of posting a new comment.
Ceh2024
8 months, 1 week agoSpudmac
2 years, 6 months agonight00
2 years, 7 months ago