This essay has been submitted by a student. This is not an example of the work written by professional essay writers.
Uncategorized

Cloud Computing and Security

Pssst… we can write an original essay just for you.

Any subject. Any type of essay. We’ll even meet a 3-hour deadline.

GET YOUR PRICE

writers online

Cloud Computing and Security

 

 

According to research done by Cloud Security Alliance (CSA), there are over 70%            of businesses around the globe operated under the cloud. However, the cloud has its way of security issues because a report presented by Cloud Security Report showed that over 80% of organizations are more or less concerned with public cloud security. These concerns range from vulnerability to accounts being attacked by attackers and also full-scale data being breached. Many companies have hesitated or taken actions without planning for security within their systems despite cloud services having ushered in the era of transmission and storage of data. Cloud computing together with services are new to the system and yet data breaching has been existing for many years. IT security professional’s surveys have believed that their organization’s security measures on protecting their data on the cloud are low. Consequently, there are several scenarios where data is breached (Ma, 2015). The scenarios were evaluated one at each and the report came into the conclusion that all the breached data is three times likely to occur for organizations that use cloud than those who do not use it. The conclusions further argue that the cloud comes with characteristics that make it more endangered.

Many organizations have enhanced and implemented the cloud and also have opened all issues concerning account hijacking. Mainly, many attackers are now able to log in to the information and access sensitive data that is stored in the cloud. Moreover, attackers can also manipulation by use of hijacked credentials. There is also another method that is used to hijack accounts like scripting bugs and also use of reused passwords which makes it for attackers to detect credentials (Ma, 2015). Similarly, the most threat which should be noted is called Man in cloud attack whereby the attacker use uses the user’s tokens which are used by cloud platforms without the use of his logins. There is also an attack called insider threat whereby an inside attacker from an organization seems unlikely but the threats exist. Moreover, employees may also access the organization’s cloud-based services such as customer accounts financial issues, and other essential information. The inside attackers may not have hostile intentions. Certain research done by Inside Track on Insider Threat found that an attacker threat was the misuse of information through bad intentions or accidents (Ma, 2015). The research also evaluated some four best practices which a company can put into practice for implementation and for securing strategies like a business partnership, controlling of data accessibility, improving the technology as well as upgrading.

There is another one called malware injection which means some bad codes can be introduced into cloud services and are seen as part of the software. Whenever the injection is implemented and the cloud stars to operate the attackers can now start compromising the integrity of the sensitive information and later steal data. Security Threats on cloud computing vulnerabilities released a report reviews the malware injections and attacks is increasing and has become crucial security trouble in the cloud. Importantly, there are security concerns which an organization can build its trust in for cloud security (Utley, 2018). All the cloud hosting and computing solutions are not the same because many of them do not give protection which is necessary between the users which leads sharing of systems, applications, and resources. During this time threats can come from other users with the cloud computing service and threats that face one user may also have effects on the other users.

In an organization, employees may be negligence and there are reports which say employee’s mistakes are the biggest security problems for any system although all threats to the systems are dangerous when it comes to the cloud solution. Notably, today’s employees may log into the cloud solution by use of their phones or their tablets therefore the systems are left unsafe. Security computing systems may also face vulnerabilities particularly in networks that have complex power supplies and numerous third-party platforms. When the system is endangered then this becomes known familiar with a third party system (Utley, 2018). Therefore this unsafe issue can be used against companies and the solution for that network monitoring and upgrading because that can fight these threats. Cloud computing security issues are not insuperable many of the risks can be prevented against by the use of a detected data and therefore there will be no loss and cybersecurity threats will be guaranteed. Protection of data is a crucial issue and a customer responsibility to applications, network traffic, and operating systems are so important and organizations should consider the recent attacks which extended ahead of data. Mainly people with bad intentions may contact aggressive takeovers the cloud resources and again attack elements of the enterprise power and third party (Morrow, 2018). When building power in the cloud it is advisable to examine the ability to prevent theft. Again determining who can access data into the cloud together with network analysis for a potential signal of understanding are some of the measures of protecting cloud power arrangements at span.

Conclusions

All the cloud hosting and computing solutions are not the same because many of them do not give protection which is necessary between the users which leads sharing of systems, applications, and resources. During this time threats can come from other users with the cloud computing service and threats that face one user may also have effects on the other users. When building power in the cloud it is advisable to examine the ability to prevent theft. Again determining who can access data into the cloud together with network analysis for a potential signal of understanding are some of the measures of protecting cloud power arrangements at span.

 

 

 

 

 

 

  Remember! This is just a sample.

Save time and get your custom paper from our expert writers

 Get started in just 3 minutes
 Sit back relax and leave the writing to us
 Sources and citations are provided
 100% Plagiarism free
error: Content is protected !!
×
Hi, my name is Jenn 👋

In case you can’t find a sample example, our professional writers are ready to help you with writing your own paper. All you need to do is fill out a short form and submit an order

Check Out the Form
Need Help?
Dont be shy to ask