Thursday, May 9, 2019

CLOUD COMPUTING Research Paper Example | Topics and Well Written Essays - 2000 words

CLOUD COMPUTING - Research constitution ExampleSQL injection or cross site scripting vulnerabilities have a high probability, as Google docs be unrivaled of the victims of them (Singh & Sharma, 2011). Moreover, threat of phishing is besides always available, as automated emails and messages on cloud based applications do-nothing steal passwords, personal credentials and other personal information. Organizations authentication and authorization form _or_ system of government do not addresses cloud earnest issues. In spite of having several credential controls integrated deep down the cloud based applications, only a password is required to breach into the cloud based application. ane of the recent security breaches of exploiting secure passwords that is called as Twitter gate (Singh & Sharma, 2011). Moreover, virtual machines on a one physical machine are shared with multiple instances. Every instance is connected to the Internet or virtual tunnels. This concludes, if a si ngle machine is compromised, all the instances available in that machine are too compromised. In addition, risk of data corruption or storage that may not limited to storage storage, random access memory storage is also in the scope of cloud computing vulnerabilities (Singh & Sharma, 2011). 2 Cloud Computing Storage Issues The storage of cloud computing requires a lot of space, in situation humongous data centers where data is collected and managed. These data centers pose several threats and security risk that may impact these data storage machines. The threat may be from a professional hacker and also in the form of the cloud provider itself, if data is not adequately dealt with. A minor security incident or misconfiguration can lead to a system failure or unavailability. (OGIGAU-NEAMTIU, 2012) Moreover, another security breach occurred in 2009, password of an employee working on Twitter was hacked that resulted in breaching the email security questions paginate that was loca ted in the Google apps account (Talbot 2010). In relation to that, one more incident occurred when data was erased from one million T-mobile smart phones due to a server failure that was managing the data of these smart phones (Talbot 2010).As Peter Mell, who is a team lead of cloud security team at the National Institute of Standards and Technology (NIST) says, ordinary cloud computing models are more vulnerable to threats, as every customer has access to a broad range of services and levels. Therefore, if any one of the services is breached, they gain access to all the data. As cloud-computing usage is increasing with its connection to the public through an Internet, new opportunities also originate for hackers, cyber terrorists, viruses and worms. These threats will maturation and focus on cloud computing enables services and applications for stealing classified data, denial of service attacks on data centers etc. Google apps is the major player in the market for providing SaaS , it was attacked and hacked. The report from cyber forensics indicated that the attacks were originated from China (Bisong & Rahman, 2011). The security and retirement in cloud computing are associated with data storage and data protection. Moreover, monitoring the utilization of resources available on the cloud by the service providers is also included. In order to secure the data in the cloud, it can be stored internally in the organizations premises. (Talbot, 2012) Moreover, the Sarbanes-Oxley Act (SOX) in the US and information Protection directives along with the EU are only two compliances from many other compliance concerns

No comments:

Post a Comment

Note: Only a member of this blog may post a comment.