This essay has been submitted by a student. This is not an example of the work written by professional essay writers.
Uncategorized

Cloud Threats and security Measures

Pssst… we can write an original essay just for you.

Any subject. Any type of essay. We’ll even meet a 3-hour deadline.

GET YOUR PRICE

writers online

Cloud Threats and security Measures

Cloud computing is gaining a lot of popularity because of its benefits in providing storage and efficient backup for data recovery. However, multiple drawbacks are associated with the use of cloud technology in various filed. The drawbacks are based on the significant exposure of information to security breaches.

Data breaches is one of the security threats in the cloud. Most organizations keep their backup off-premises to reduce the risk of data loss; however, the approach increases data exposure. Virtual machines can access information stored in the cloud and derive any cryptographic keys used for encryption through other connected virtual devices. Cloud infrastructure that is not architecture properly allows attackers to gain access to sensitive information. To minimize the risk of data breaches in the cloud, organizations should operate with a reliable cloud provider. The encryption system used should also be efficient enough to promote data security (Eken, 2013).

Cloud abuse is another threat in using the cloud infrastructure. The cloud functionality, infrastructure as a service (IaaS) that offers storage and network services lacks a secure registration process (Coppolino et al., 2017). This means that any individual with a working credit card can easily sign up and acquire legal access to use the cloud. The unsecure registration has led to malicious attacks in the cloud because there are no effective security protocols to evaluate the people that sign up. Cloud providers can solve this problem by incorporating an authorized registration process to validate users. Monitoring techniques should also be incorporated to prevent fraud by evaluating credit card activities. Another way to prevent cloud abuse and other security threats in the infrastructure is by examining network traffic. Providers should also monitor activities of any blacklisted activities.

References

Coppolino, L., D’Antonio, S., Mazzeo, G., & Romano, L. (2017). Cloud security: Emerging

threats and current solutions. Computer and Electrical Engineering, 59, 126-140.

https://doi.org/10.1016/j.compeleceng.2016.03.004

Eken, H. (2013). Security threats and solutions in cloud computing. https:// DOI:

10.1109/WorldCIS.2013.6751034

  Remember! This is just a sample.

Save time and get your custom paper from our expert writers

 Get started in just 3 minutes
 Sit back relax and leave the writing to us
 Sources and citations are provided
 100% Plagiarism free
error: Content is protected !!
×
Hi, my name is Jenn 👋

In case you can’t find a sample example, our professional writers are ready to help you with writing your own paper. All you need to do is fill out a short form and submit an order

Check Out the Form
Need Help?
Dont be shy to ask