Sunday, December 8, 2019

Security Threats in Cloud and Prevention †MyAssignmenthelp.com

Question: Discuss about the Security Threats in Cloud and Prevention. Answer: Introduction: Cloud computing refers to the hosting of various services over the internet and this might include the software developing platform, server, storage and software. Along with several benefits there also certain risks for cloud computing and this includes the following: Breach of data might occur due to many reasons like human errors, vulnerabilities of the application and many more. Data breach might be the primary aim of an attacker. Vulnerabilities of the system. This might occur by use of bugs which the attacker uses so as to infiltrate the cloud computing environment and steal data or take control of the system and many more things can be done as well (Hamlen et al., 2012). Hijacking of the accounts. Once the credentials of the user is available to the attacker they can make use of eavesdropping for various purposes. Advanced persistent threats. This is a type of cyberattack that infiltrates the system so as to establish a foothold over the infrastructure of information technology and from there the attacker steals the data. Loss of data might occur in cloud due to various reasons like natural hazards or due to malicious activities by hackers. Preventive measure in cloud: Some of the major preventive measures that can be adopted so as to protect the cloud environment includes the following: Gaining the right knowledge about who is accessing what in the cloud environment. Limitation of the access to the data according to the context of the user (Goel Jain, 2014). Adaptation of risk-based approach so as to secure the assets in the cloud. Building of ability so as to see through the cloud. Asking the cloud vendors about what type of security measures they are having and also about the location of their physical cloud server. Creating of usernames and passwords which are unique Using of industry standards as well as encryption and authentication protocols. Lastly encrypting the data before uploading it into the cloud. References: Goel, L., Jain, V. (2014, March). A Review on Security Issues and Challenges of Mobile Cloud Computing and Preventive Measures. InInternational Conference on Advances in Computer Engineering and Applications ICACEA (5)(pp. 22-27). Hamlen, K., Kantarcioglu, M., Khan, L., Thuraisingham, B. (2012). Security issues for cloud computing.Optimizing information security and advancing privacy assurance: new technologies: new technologies,150.

No comments:

Post a Comment

Note: Only a member of this blog may post a comment.