Cloud computing is the provision of IT services to a number of users through a network. It is an innovation that has gained a lot of popularity among many organizations particularly the small and medium-sized enterprises, SMEs. This is because it allows for the sharing of resources which helps the clients to benefit from the economies of scale. While there are many benefits associated with this development, there are a number of cloud computing security issues that have remained a great concern.
Security strengths and weaknesses largely depend on the specific model in use. There are a number of models which are broadly divided into private, public and hybrid models. The private cloud refers to a network that is restricted to a single organization. The public model on the other hand is shared by many different organizations and may include up to millions of users. The hybrid has components from both the public and private models. Due to the restrictions of the private model, it is likely to have less security concerns compared with the other two.
Private data is usually stored in a computer located in a remote location. The fact that it is stored in a physical location means that there is a chance, albeit minimal that it is susceptible to unauthorized access. The location of the storage is only known by the provider and it is important that one seeks assurance that their private data will be secured. This agreement should preferably be done in writing to serve as a legal document.
In an attempt to prevent unauthorized access particularly by employees, companies employ a number of measures. One of these measures is the use of unique passwords and usernames. This ensures that only the individual with these details is able to log into the network and access particular information. Authorization formats may also be used. These are designed to further increase restrictions. Each user can only access the data under their jurisdiction.
While it may be possible to keep unauthorized users at bay, there is still a threat posed by elements that are not in the control of the provider. These include, for example, fire outbreaks, power outages, storms and other natural disasters. The user needs to seek assurance that there is an effective data recovery plan in place to guard against such occurrences. They need to know that service provision will not be interrupted in such situations.
When data is being transferred between the network of the user and that of the service provider, it has to traverse the internet. While on transit, there is a possibility that it may be accessed illegally. It is important to ensure that the channel being used is secure. This can be achieved by ensuring that the connection with the provider is via a URL beginning with https. The data must also be encrypted and authenticated by use of the standard protocols.
In cloud computing, the server space and other infrastructure are shared. In recent times, attackers have targeted the shared components of the cloud computing environment. For this reason, one will be concerned about the compartmentalization techniques, and encryption mechanisms used to separate data so as to prevent access by other users sharing the same space.
Computers need a software interface (typically application programming interface, or API) to facilitate their interaction with provider software applications. This fact is a source of many other cloud computing security issues of concern. It is important that this interface is strong enough to withstand attacks.
Security strengths and weaknesses largely depend on the specific model in use. There are a number of models which are broadly divided into private, public and hybrid models. The private cloud refers to a network that is restricted to a single organization. The public model on the other hand is shared by many different organizations and may include up to millions of users. The hybrid has components from both the public and private models. Due to the restrictions of the private model, it is likely to have less security concerns compared with the other two.
Private data is usually stored in a computer located in a remote location. The fact that it is stored in a physical location means that there is a chance, albeit minimal that it is susceptible to unauthorized access. The location of the storage is only known by the provider and it is important that one seeks assurance that their private data will be secured. This agreement should preferably be done in writing to serve as a legal document.
In an attempt to prevent unauthorized access particularly by employees, companies employ a number of measures. One of these measures is the use of unique passwords and usernames. This ensures that only the individual with these details is able to log into the network and access particular information. Authorization formats may also be used. These are designed to further increase restrictions. Each user can only access the data under their jurisdiction.
While it may be possible to keep unauthorized users at bay, there is still a threat posed by elements that are not in the control of the provider. These include, for example, fire outbreaks, power outages, storms and other natural disasters. The user needs to seek assurance that there is an effective data recovery plan in place to guard against such occurrences. They need to know that service provision will not be interrupted in such situations.
When data is being transferred between the network of the user and that of the service provider, it has to traverse the internet. While on transit, there is a possibility that it may be accessed illegally. It is important to ensure that the channel being used is secure. This can be achieved by ensuring that the connection with the provider is via a URL beginning with https. The data must also be encrypted and authenticated by use of the standard protocols.
In cloud computing, the server space and other infrastructure are shared. In recent times, attackers have targeted the shared components of the cloud computing environment. For this reason, one will be concerned about the compartmentalization techniques, and encryption mechanisms used to separate data so as to prevent access by other users sharing the same space.
Computers need a software interface (typically application programming interface, or API) to facilitate their interaction with provider software applications. This fact is a source of many other cloud computing security issues of concern. It is important that this interface is strong enough to withstand attacks.
About the Author:
Find out more about the simple steps you can take to ensure that your system is secure when you visit www.secpanel.com today. You can get information about a program designed to meet all of your needs at http://www.secpanel.com now.
No comments:
Post a Comment