attacks

Concept and Model for Cloud Infrastructure Protection by Using Containers

According to current best practices in using containers we suggest an overview on using it in cloud and potential for using in security field. Interaction and attacks vectors used in virtual cloud systems are described. Built and analyzed conceptual scheme for penetration testing. Patterns of security improvements in cloud computing infrastructure are presented in following article.