Tuesday, May 5, 2020

Security Threats in Cloud Computing †Free Samples to Students

Question: Discuss about the Security Threats in Cloud Computing. Answer: Introduction: Cloud Computing is a technique that is use to provide Information technology services with the implementation of the web based tools that can be retrieved through the internet. It involves the storage of the data in cloud rather than storing it in the local storage device or hard disk. Moreover, the user can access the information remotely from any location. It enables the users to store important data and application files on the remote server and also ensures the easy accessibility of the data when the device would be connected to the internet. The major security issues in the cloud computing includes the following and the effective countermeasures are also discussed below: The offline storage of the data reduces the risk of loss of data but increases the vulnerability of the exposure of the data. The private cryptographic key can be derived easily by the virtual machine through accessing the side channel timing. Thus, to prevent the risk of data breach suitable and reliable cloud service provider should be chosen. The cloud computing technique is highly prone to the malware attacks as the visibility is less and exposure is high. The cloud providers also don not necessarily provide the details such as the procedure of granting access to data, software and other functionality (Almorsy, Grundy Mller, 2016). The solution for the attack via malwares includes forced authorization in the supply chain management and the legal contracts should also include human resource management. Hacking of the Account/ Services The attacks such as phishing, fraudulent activities and software exploitation are aimed at stealing the credentials of the victim. This would enable them to gain access to the victims account illegally. Moreover, there may be chances that the information collected may be leaked by the hackers or injection of malwares and viruses into the system (Islam, Manivannan Zeadally, 2016). The preventive counter measure includes restriction on the sharing of credentials among the users and promotion of the two way authentication technique. The loss of important data through alteration, deletion, storage of data on unreliable medium poses serious threat to the cloud computing technique. It not only leads to the loss of reputation of the organization but also leads to the loss of important data and eventually the customers. It can be prevented through the utilization of powerful API security and SSL encryption technique. The cloud may encounter malicious attacks due to the lack of secured registration process which implies that anyone who holds a credit card can register and utilize the cloud. Authorization and validation of the details should be done. Moreover the traffic network should be carefully examined. Thus, with the above discussion it can be concluded that cloud computing is essential for the storage of data in an organized manner. It also enables the users to access data remotely from any location via internet connection. However, it is vulnerable to various types of attacks but can be mitigated so as to prevent the attacks and secure the data in the cloud. References Almorsy, M., Grundy, J., Mller, I. (2016). An analysis of the cloud computing security problem.arXiv preprint arXiv:1609.01107. Islam, T., Manivannan, D., Zeadally, S. (2016). A classification and characterization of security threats in cloud computing.Int. J. Next-Gener. Comput,7(1).

No comments:

Post a Comment

Note: Only a member of this blog may post a comment.