Top 12 Cloud Computing Security Threats

cloud computing security

Due to cloud computing exponential growth, its benefits are now obvious.The most notable are, reduction of maintenance costs of its IT infrastructure, Reduction of energy consumption, the rapidity of sharing data with one or more other users of CC. Possibility of creating a collaborative virtual platform.

 

However, front all the possibilities offered by this new concept, cloud computing has created new security challenges. Still some enterprises are reluctant to in CC adoption mostly because of the safety factor which is still a challenge.

 

Just to remind, cloud computing is an IT approach that operates over the Internet (or any other WAN). It’s a type of Internet based computing where different services such as servers, applications, storage, collaboration and administration tools, etc. are delivered to any organization’s computers and devices through the Internet.

 

Seeing both the promises of cloud computing, and the risks associated with it, the Cloud Security Alliance (CSA) and the Information Systems Audit and Control Association (ISACA) has created several studies in which they have identified 12 points which are the major threats to data security and cloud applications. Let’s have a look to it.

 

  1. Leakage of that kind of information which wasn’t intended for public due to the existence of Data Breaches.
  2. The fragility in Identity, Credential and Access Management, although some providers prioritize authentication interfaces with other ways such as certificates, smart cards, OTP technology phone authentication, and many others;
  3. Using Insecure interfaces and APIs that customers can use to interact with cloud services
  4. Exploit of System Vulnerabilities in operating systems on servers in clouds or even in hosted applications
  5. Accounts or services Hijacking via software vulnerabilities
  6. Risk caused by Malicious Insiders are not new. It can be a person of management team who has enough access to privacy or secured data that he can easily to misuse it.
  7. Advanced Persistent Threats (APTs) consist of a form of attack where the hacker manages to install somehow a file in the internal network of an organization and can put his hands on important or confidential data of the organization. This type of attack are really difficult to detect for a cloud service provider.
  8. Data loss can be caused by a virus attack of Datacenter, a physical attack (fire or bombing), natural disaster, or even just to a human factor in the service provider, eg in case company’s bankruptcy. The thought of losing all data is really terrifying for both businesses and consumers!
  9. The shortcomings in the internal strategies of adoption or transition to the cloud technologies. Companies or organizations often doesn’t take into account all the safety factors related to their operation before subscribing to a cloud service.
  10. Abuse and Nefarious Use of Cloud Services via accounts created during the evaluation periods (most ISPs offer free 30-day trial) or purchased fraudulently access.
  11. Denial-of-Service is the kind of attack that is meant to limit the acces on data or services by excessive consumption of resources such as processors, memory or network. The idea for the hacker is to succeed in overloading Datacenter resources to prevent other users to use services.
  12. The faults related to the Shared Technology issues can cause problems in the internal architecture of the cloud and eternal interface architecture with users.

 

These twelve points, as mentioned above, could further reinforce the paranoid in their doubt regarding cloud, but will mainly encourage users (individuals and businesses) to be more demanding on service levels (SLA: Service Level Agreement) conclude with suppliers.

 

Sources:

 

By levitra samples Continued using a legitimate and licensed online pharmacy, such as Epillsrx.com. It is a low dosage oral treatment which dissolves in the systemic circulation and increases blood flow to the penile organ for an erection; any hindrance in this process cialis tadalafil 10mg can affect the erectile function. It is a simple solution that reaps far-reaching benefits for children who have sensory integration dysfunction. wholesale cialis continue reading here Taking propecia may also have more sildenafil for women serious side effects such as those caused by sildenafil citrate.

Cheap Tents On Trucks Bird Watching Wildlife Photography Outdoor Hunting Camouflage 2 to 3 Person Hide Pop UP Tent Pop Up Play Dinosaur Tent for Kids Realistic Design Kids Tent Indoor Games House Toys House For Children