Logo

Cloud Computing Security



Book Cover
book with ISBN: 1461194067, is now available.


1. Authentication
  1. Brute Force

  2. Insufficient Authentication

  3. Weak Password Recovery Validation

2. Authorization
  1. Credential/Session Prediction

  2. Insufficient Authorization

  3. Insufficient Session Expiration

  4. Session Fixation

3. Client-side Attacks
  1. Content Spoofing

  2. Cross-site Scripting

4. Command Execution
  1. Buffer Overflow
  2. Format String Attack
  3. LDAP Injection
  4. OS Commanding
  5. SQL Injection
  6. SSI Injection
  7. XPath Injection
5. Information Disclosure
  1. Directory Indexing

  2. Information Leakage

  3. Path Traversal

  4. Predictable Resource Location

6. Logical Attacks
  1. Abuse of Functionality

  2. Denial of Service

  3. Insufficient Anti-automation

  4. Insufficient Process Validation

Professional Security Services

InfoSecPro's holistic approach to security enables organizations to immediately validate and improve their security posture. Actionable reports not only detail uncovered vulnerabilities, but provide an explicit roadmap for remediation and external links supporting those recommendations.

INFOSECPRO allows client organizations to implement security solutions that most appropriately assess and mitigate risk in sophisticated enterprise-class environments. INFOSECPRO's proven methodologies and commitment to service excellence have made INFOSECPRO the trusted security provider to many of the highest profile organizations in the world.

INFOSECPRO Professional Security Consultants combine highly credentialed technical expertise with a business focus that yield a comprehensive suite of well tailored solutions. INFOSECPRO intimate approach to project management, service delivery and presentation of findings ensure that clients fully understand results, impact to business and when necessary, how to best remediate discovered problematic issues.

InfoSecPro.com provides the following security assessment services for our clients:

For a few pages of a report sample, please click here.

To receive your Free Application Vulnerability Assessment for testing of one attack vulnerability of your choice, please submit your payment of $99.00 for a second attack vulnerability test.
B E T T E R: Please submit your payment of $999.00 for a complete Application Vulnerability Assessment covering over 25 attack methods.
Business Name:
Contact Information:
Email Address:
URL or IP address:
  

Other members of our business group:
Cloud-Security.us | US-scada.com

COPYRIGHT (C) 2000 - 2011 InfoSecPro.com ALL RIGHTS RESERVED