Figure 8From: Handling compromised components in an IaaS cloud installation Case Two - A physical bogus compute worker node is added to the infrastructure. Back to article page