Ebook Hacking exposed: Network security secrets and solutions (Third edition)

Typically, these actors attempt to exploit flaws in the system implementation or its deployment in order to obtain information, acquire access to services, or simply to disrupt the operation of the cloud through loss of system availability or system and information integrity. As the description of these attacks implies some of these attacks violate the tenant boundaries and hardware abstraction layers that VMware vCloud Director attempts to enforce.