Wednesday, April 2, 2014

10 Useful Cloud Security Tools

Keeping the cloud data safe can be more challenging than most clients anticipate. Protecting a cloud backup is much different unlike in case of traditional IT environments. 

Cloud Solutions

Below described cloud security tools can help protect data, network & other IT resources:

1. Nessus:  Nessus is a popular network vulnerability assessment tool. It has the capability to control internal and external data scanners operating on a cloud network.

2. Nmap: Nmap is an acronym for ‘Network Mapper’. This tool is exclusively designed for scanning all network activities, even during network congestions.

3. Wireshark: Wireshark can be used as a single entity to manage and troubleshoot network security problems by analyzing packet transmission in the cloud.

4. Metasploit: Metasploit is a streamlined interface that provides additional machine images (Server IP addresses) to a client. It is used as a pen test distribution in cloud for performing network diagnostics.

5. Kismet: This open source tool is capable of scanning your entire cloud infrastructure including private, public or hybrid ones. Kismet leaves no footprint of log scan activity in victim’s machine.

6. Ettercap: Ettercap protects the user from MITM (Man-in-the-middle) attacks. It includes much coveted security features such as IP & Mac-based filtering and ARP-based functionality for network monitoring purpose.

7. Acunetix: Acunetix is used to find network vulnerabilities such as SQL injections and cross site scripts which can be used to penetrate into cloud databases.

8. John the Ripper: This tool is highly popular as a password testing tool; it’s used to test password strength. It uses brute force method to hack passwords and unravel potential security breaches.

9. Aircrack: This tool is widely used to test IaaS (Infrastructure-as-a-service) models. It protects the client data from being exploited by malicious attacks usually originating from virtual machines.


10. Cain & Abel: This tool is used to recover client passwords by decrypting password logs and sniffing throughout networks. 

No comments:

Post a Comment