Preview

Cloud Computing Security Threats

Best Essays
Open Document
Open Document
3527 Words
Grammar
Grammar
Plagiarism
Plagiarism
Writing
Writing
Score
Score
Cloud Computing Security Threats
Cloud Computing Security Threats and Responses

Farzad Sabahi
Faculty of Computer Engineering
Azad University
Iran
fsabahi@ieee.org

Abstract-Cloud

Hybrid clouds. A public cloud is standard model which providers make several resources, such as applications and storage, available to the public. Public cloud services may be free or not. In public clouds which they are running applications externally by large service providers and offers some benefits over private clouds. Private Cloud refers to internal services of a business that is not available for ordinary people. Essentially Private clouds are a marketing term for an architecture that provides hosted services to particular group of people behind a firewall. Hybrid cloud is an environment that a company provides and controls some resources internally and has some others for public use. Also there is combination of private and public clouds that called
Hybrid cloud. In this type, cloud provider has a service that has private cloud part which only accessible by certified staff and protected by firewalls from outside accessing and a public cloud environment which external users can access to it. There are three major types of service in the cloud environment: SaaS, PaaS, and laaS [1]. In cloud, similar to every proposed technology, there are some issues which involved it and one of them is RAS factor. For having good and high performance, cloud provider must meet several management features to ensure improving RAS parameters of its service such as:

Availability management

computing is one of today 's most exciting

technologies due to its ability to reduce costs associated with computing while

computer

increasing

processes.

During

flexibility the and

past

scalability

few

years,

for

cloud

computing has grown from being a promising business idea to one of the

fastest growing parts of the IT industry.

organizations have



References: Eighth IEEE International Conference on Dependable, AutonomIc and Secure Computing, Chengdu, China, 2009. S. K. Tim Mather, and Shahed Latif, Cloud Security and Privacy: O 'Reilly Media, Inc , 2009. Francis Group, LLC, 2010. in the Cloud. Available [12] (2010) [13] (2010). Security Management in the Cloud - Access Control.

You May Also Find These Documents Helpful

  • Best Essays

    With the unprecedented growth and spread of information, there is no wonder why large Information Technology companies have been investing in the “cloud”. To expand, when referring to Cloud Computing, this means to access and store information not stored with in your computer whether it be public, private, or hybrid cloud computing. In technological terms, the server you are accessing is somewhere else and therefore, the information and tools you are using are “up in the clouds” but more so stored in another server space. However, whether you are paying for services through software, total usage, or free usage (hence the types of cloud services) Cloud Computing seems to be everywhere. Yet, it is important to recognize what is to gain by using cloud computing from big businesses to individual users and what are some risky moves when utilizing cloud storage over the Internet. Hence, the content of this paper will discuss the pros and cons of cloud computing and where cloud computing is headed in todays online society.…

    • 1307 Words
    • 6 Pages
    Best Essays
  • Better Essays

    Cis 500- Cloud Computing

    • 1078 Words
    • 5 Pages

    Technology has taken great leaps of advancement. Some of the new technology that companies and consumers are taking advantage of to store and process data is cloud computing. Cloud computing was derived from virtualization. Virtualization allows companies to separate business applications from hardware. Doing this gives the company the capability of assigning applications as needed. The option to manage applications is a great benefit to companies. Resulting from the virtualization error, cloud computing has emerged to provide flexible IT infrastructures. This has not only enhanced the options companies now have, but it is also proven to be more cost efficient. This has increasingly become a preferred method of companies and consumers alike. (Turban, & Volonino, 2011, p.47)…

    • 1078 Words
    • 5 Pages
    Better Essays
  • Better Essays

    U.S. Department of Homeland Security. (n.d.). Biological Security. Retrieved from Department of Homeland Security: http://www.dhs.gov/biological-security…

    • 1965 Words
    • 8 Pages
    Better Essays
  • Powerful Essays

    Over the past twenty years, the Internet’s role in our lives has grown to an everyday necessity. We rely on the Internet to communicate within the scope of our employment and social lives, to conduct our banking and bill paying, we even use it to track our personal property. There is hardly one area of our lives that we can not conduct over the Internet. While the Internet is a convenience that has made our lives easier, it has also opened the door in our lives to a vulnerability that is rapidly being exploited by cyber criminals. Cyber crimes are growing at an exponential rate in the United States and we, the consumers/end users are unaware of the liabilities a simple click on the wrong button can cause. This paper will address the current cybersecurity policy issues for the protection of the Internet infrastructure and recommend new policies that will address the liability for malicious traffic traversing the Internet from the End Users.…

    • 1586 Words
    • 7 Pages
    Powerful Essays
  • Good Essays

    The 16 critical infrastructure sectors identified by the Department of Homeland Security (DHS) include; Chemical, Commercial facilities, Communications, Critical manufacturing, Dams, Defense industrial base, Emergency services, Energy, Financial services, Food and agriculture, Government facilities, Health care and public health, Information technology, Nuclear reactors, nuclear materials, and waste, Transportation systems, and Water and wastewater systems. Technological advancement, increasing use of the internet, coupled with the interdependencies of information technology had and continue to have a direct effect on critical infrastructure attacks. These attacks and threats unfortunately have grown and sophisticated level of cyberattacks…

    • 323 Words
    • 2 Pages
    Good Essays
  • Good Essays

    Since 2005, the Islamic group has exceeded doubling and the account of terrorism from this group has almost tripled. This growing terrorist army known as the Islamic State of Iraq and al-Sham, ISIS, is becoming a threat not only to the east but to the American homeland as well. While approximately ninety percent of Americans “... view ISIS as a serious threat to U.S. national security, there remains confusion over the degree to which the group directly threatens the American homeland” (Gottlieb 2). As technology advances, terrorists are able to assimilate into our systems which can become a hazard to our people. There are both immediate and long-term risks to our country, military improvements being one of them.…

    • 1223 Words
    • 5 Pages
    Good Essays
  • Powerful Essays

    Business Trend Memo

    • 1299 Words
    • 6 Pages

    Hayes, B. (2008, March), “Cloud computing”, Communications of the ACM, 51, 9-11. Retrieved from http://cacm.acm.org/magazines/2008/7/5368-cloud-computing/fulltext…

    • 1299 Words
    • 6 Pages
    Powerful Essays
  • Satisfactory Essays

    Nowadays, medical facilities have more computer based devices than IT companies. As a result, many of these medical devices contain configurable embedded computer systems that can be vulnerable to cyber security breaches. As medical devices are increasingly interconnected, via the Internet, hospital networks, other medical devices, and smartphones, there is an increased risk of cybersecurity breaches, which could affect how a medical device operates.…

    • 64 Words
    • 1 Page
    Satisfactory Essays
  • Good Essays

    While the argument of open borders is highly debated, I believe that the best way to solve the problem of illegal immigration is to highly enforce the laws that were set to defend the United States against illegal immigration, and try our very best to keep out all immigrants that attempt to cross our borders without permission. Crossing our borders illegally causes many problems with the populations of both the United States and Mexico. Along with that, it too causes problems with crime levels and economics. If the borders were to be open, all of these problems would reach a most undesirable height.…

    • 858 Words
    • 4 Pages
    Good Essays
  • Better Essays

    Homeland Security Threats

    • 849 Words
    • 4 Pages

    While the above question could be looked at in answer as being extremely broad and cover a wide variety of areas, I believe, after multiple hours of reading through research articles, that the research question being asked could be summarized with a few general ideas. Because of the fact that there are so many types of terrorists, the Department of Homeland Security has spent countless hours studying behavioral qualities of one who might become a terrorist to prevent it in the long run; the problem is, however, that anyone could decide to become a terrorist at any point and, thus, raises homeland security threats for the United States.…

    • 849 Words
    • 4 Pages
    Better Essays
  • Good Essays

    The Internet has become a daily ritual for Americans. So many people rely on technology and computers to do their shopping, banking, and communications. Where most of this used to be done in face-to-face communications, the ability to do it online has become increasingly popular because of the ease of use, but it is also putting fear in people as to whether their personal information is protected or not, and if our information is protected what does that exactly mean and who has access to it and how? This paper will examine cyber terrorism and information warfare, what has happened in past years and what needs to be done to not only protect our country, but us as citizens.…

    • 2227 Words
    • 9 Pages
    Good Essays
  • Good Essays

    Likelihood: The likelihood of this is minimal, unless an inexperienced webmaster was hired. One way to avoid this is have a backup IT specialist to do checks and balances to ensure the website is secure. Another way to prevent this is by ensuring permissions and authentication is programmed properly.…

    • 614 Words
    • 3 Pages
    Good Essays
  • Powerful Essays

    essay cybersecurity

    • 1396 Words
    • 6 Pages

    In order to create a strong cybersecurity policy in Adius, their security professionals must comprehend key elements including servers, network and network components, access control procedures, mobile computing and telecommuting, authentication procedures, and architecture frameworks. Every portion of computer hardware happens to have its individual exclusive security necessities within a cyber environment, thus, interlocking all the devices and increasing complexity. These devices entail smart managing and must be ruled by policy, standards, and procedure. A method of attaining great cybersecurity practice includes utilizing overall security architectures, such as ISO 17799 - considered the International Organization for Standardization (ISO) primary information security management standard.…

    • 1396 Words
    • 6 Pages
    Powerful Essays
  • Satisfactory Essays

    The era of the Internet is giving people many tools and advantages that help them been available at any time and place and they are been more productive. It has also helped corporations becoming efficient and increased their exposure to the public. All pros come with cons, and the Internet cons are affecting people and corporations as well. People and companies are been exposed to the dark side of the Internet with security breaches.…

    • 533 Words
    • 2 Pages
    Satisfactory Essays
  • Good Essays

    After viewing his report, I am shocked to hear about the risk our country is in. This report stated various ways in which foreign countries and even our own U.S. Citizens can hack into our databases and steal our countries most vital information. I believe that the thought of our worlds information systems to be attacked is highly possible. They were discussing how people are hacking into banks and stealing thousands to millions of dollars everyday, into our oil and electricity plants, and into our national security. These three things are huge to our country. This country runs on electricity, a blackout will put the country in a more vulnerable position. During these blackouts other countries can be accessing our information…

    • 739 Words
    • 3 Pages
    Good Essays

Related Topics