Cloud Service A resides on Virtual Server A and Cloud Service B resides on Virtual Server B. Both virtual servers are hosted by the same physical server and the trust boundaries of Cloud Services A and B overlap. A cloud service consumer successfully uses Cloud Service A to gain access to the underlying physical server. This enables the cloud service consumer to attack Cloud Service B, which negatively affects the cloud service consumers of Cloud Service B. This is an example of which cloud security threat?
Select the correct answer.
Currently there are no comments in this discussion, be the first to comment!