Cloud Threats and security Measures
Cloud computing is gaining a lot of popularity because of its benefits in providing storage and efficient backup for data recovery. However, multiple drawbacks are associated with the use of cloud technology in various filed. The drawbacks are based on the significant exposure of information to security breaches.
Data breaches is one of the security threats in the cloud. Most organizations keep their backup off-premises to reduce the risk of data loss; however, the approach increases data exposure. Virtual machines can access information stored in the cloud and derive any cryptographic keys used for encryption through other connected virtual devices. Cloud infrastructure that is not architecture properly allows attackers to gain access to sensitive information. To minimize the risk of data breaches in the cloud, organizations should operate with a reliable cloud provider. The encryption system used should also be efficient enough to promote data security (Eken, 2013).
Cloud abuse is another threat in using the cloud infrastructure. The cloud functionality, infrastructure as a service (IaaS) that offers storage and network services lacks a secure registration process (Coppolino et al., 2017). This means that any individual with a working credit card can easily sign up and acquire legal access to use the cloud. The unsecure registration has led to malicious attacks in the cloud because there are no effective security protocols to evaluate the people that sign up. Cloud providers can solve this problem by incorporating an authorized registration process to validate users. Monitoring techniques should also be incorporated to prevent fraud by evaluating credit card activities. Another way to prevent cloud abuse and other security threats in the infrastructure is by examining network traffic. Providers should also monitor activities of any blacklisted activities.
References
Coppolino, L., D’Antonio, S., Mazzeo, G., & Romano, L. (2017). Cloud security: Emerging
threats and current solutions. Computer and Electrical Engineering, 59, 126-140.
https://doi.org/10.1016/j.compeleceng.2016.03.004
Eken, H. (2013). Security threats and solutions in cloud computing. https:// DOI:
10.1109/WorldCIS.2013.6751034