Threats Of Cloud Computing

806 Words2 Pages

Description of Threat
What is Cloud computing?
Cloud computing is a style of computing where scalable and elastic IT capabilities are provided as a service to many users to consume in a pay-per-use and self-service way. Users are provided with dynamically scalable and virtualized resources as a service over the internet.
Why choose Cloud computing?
Cloud computing is convenient and user-friendly. It offers benefits such as the ease of software maintenance. No CD is required to install the resources and users do not have to worry if their software is out of date. Servers and capacity planning are also not required with Cloud computing. It does not require any equipment outlay and you do not need to guard against obsolete hardware. Cloud computing applications can also be access anywhere on your computer or mobile. Redundancy and disaster planning is also taken care by your cloud provider. With all these benefits cloud computing has to offer, many businesses have started to use cloud computing today. However there is also bound to have disadvantages.
Cloud computing has been making its advances but the threats to this technology are more tangible than ever. It has to overcome various serious threats to maintain its credibility. Here is a list of threats face by Cloud computing:
• Data Breaches
• Data Loss
• Account Hijacking
• Insecure application programming interfaces
• Denial of Service
• Data Handling

Nature of Threat
Data Breaches
Computer systems are connected to the internet. This exposes cloud computing service providers to skilled hackers with malicious intentions. The computer systems can be accessed virtually by anyone. This hackers continue to grow and pose a threat to the users of cloud computing.
Data Loss
Large...

... middle of paper ...

...viruses and malware threats
CipherCloud for box
The CipherCloud Gateway helps to scan all content which are uploaded to Box. It enhances security by having alerts, blocking, prevent sharing or other customizable security options. If a user uploads a file that has restricted data like a social security number which violates company policy, the file will be moved to a quarantine folder automatically. This policy action will be sent to the users and not allowed to access the file until the administrator authorized that it is safe to share.

Conclusion
With the advanced technology, along with the constantly new software that is in the market, it takes time to keep up-to-date with all the firmware and operating system. The solutions mention can never be dependable unless we stay vigilant and watch out for our own security to prevent attackers from gaining the upper hand.

More about Threats Of Cloud Computing

Open Document