Security Breach Essay

791 Words2 Pages

As a concept cloud computing is well commended because of the benefits it offers. However, there are many users who are not clear about the capacity of security of cloud computing. Many surveys point out that security in the cloud remains the top concern for many businesses in their decision making in spite of the cost advantages it offers. Security breach is a situation where an individual intentionally surpass or abuses a network, system or data access to gain profit and results in negatively affecting the security of the organization’s system, operation, and data. In today’s digital world, most individuals leave long electronic traces of private information wherever they go. But too often, that data is compromised. Data breach takes on many …show more content…

Data security has been major in media coverage for some time. There are reports that discuss the current issue of security breach and how companies should understand security threats and how to identify cyber vulnerabilities. During the past year, more than 400 data breach investigations were performed in various countries. According to the 2013 Global Security Report, “From these investigations, Trustwave determined that attacks in 2012 originated in 29 different countries, with the largest percentage originating in Romania—a country known as a hotbed of criminal activity, specifically for organized crime focused on obtaining cardholder data (CHD)” (p. 7). Trustwave presented a map of the basic locations that where criminals are attacking the most. However, the criminals who are attacking are doing so through dysfunctional IP addresses and networks so that their actual location cannot be …show more content…

Therefore, businesses major concern is how safe cloud computing really is. Even though all technology provides top security to protect users’ data there is no such thing as a completely safe system. Some of the risks that users receive when storing data are cyber-attacks, someone else looking after your data, insider threats, government intrusion, legal liability, lack of standardization, and lack of support. Using services like Iaas, Saas, and PaaS along with public, private, and hybrid models can involve major security risks. These security issues “are considered in two views first in the view of service provider who insures that services provided by them should be secure and also manages the customer’s identity management” (Sharma, 2014, p. 2). While cloud computing has various beneficial factors, there are challenges that are faced along with those benefits.
In addition, companies are increasingly aware of the value that cloud computing has in a business aspect. However, it is essential to understand the challenges, as well as the benefits involved in cloud computing before making a transition. The challenges are the

More about Security Breach Essay

Open Document