Andrew Bergeris TCOM 5223
Security Risks in Cloud Computing Security Risks in Cloud Computing
Security Risks in Cloud Computing Abstract 2 Introduction 3 What is Cloud Computing? 3 Personal Use of Cloud 4 Company Use of Cloud 4 Advantages of Cloud Computing 5 Advantages of Cloud Computing for Individuals 6 Advantages of Cloud Computing for Companies 7 Security Risks of Cloud Computing 8 Security Risks of Individual 9 Security Risks for Companies 12 Location of Cloud Computing Severs 13 Conclusion 14
Abstract
Cloud computing is an incredible resource that allows a user to store data over a network. This network is usually accessed over the internet and stored on a server. The cloud creates one location for all the users’ information to be stored and easily accessed. Storing data over the internet on a server brings up a huge security risk to all users. Since it is on a server connected to the internet it is susceptible to internet hackers and foreign countries. Using the cloud presents a major security risk to companies or individual users. Since it is easy for them to access their data from one central location it also lets the hackers do that same thing. The cloud creates a single point of failure if it gets hacked by an individual or another country. A single point of failure is one of the worst security measures to be used. A good security system has multiple different layers incorporated into it so it becomes more difficult to break into. Leaving all information on one central location gives the hacker an easy target with only one account to hack to gain information on multiple different data files and user accounts. Another problem with the cloud technology is that the server the data is stored on could be located in a different country. This causes a major security risk for the companies and individual user’s since different countries have different laws dealing with
Cited: [1] "Cloud Computing." Dictionary.com. Dictionary.com, n.d. Web. 07 Apr. 2013. <http://dictionary.reference.com/browse/cloud computing>. [2] Ducan, Geoff. "Crack This: How to Pick Strong Passwords and Keep Them That Way." Digital Trends. N.p., 29 Jan. 2012. Web. 07 Apr. 2013. <http://www.digitaltrends.com/mobile/crack-this-how-to-pick-strong-passwords-and-keep-them-that-way/>. [3] "Forrester 's Global Data Protection and Privacy Heatmap." Forrester 's Global Data Protection and Privacy Heatmap. N.p., n.d. Web. 07 Apr. 2013. <http://heatmap.forrestertools.com/>. [4] Grocholski, Greg. "Balancing Risk and Reward With Cloud Computing." BusinessNewsDaily.com. N.p., n.d. Web. 07 Apr. 2013. <http://www.businessnewsdaily.com/3812-cloud-computing-risks-rewards.html>. [5] Honan, Mat. "How Apple and Amazon Security Flaws Led to My Epic Hacking." Wired.com. Conde Nast Digital, 04 Aug. 2012. Web. 07 Apr. 2013. <http://www.wired.com/gadgetlab/2012/08/apple-amazon-mat-honan-hacking/all/>. [6] Pfleeger, Charles P., and Shari Lawrence. Pfleeger. Security in Computing. Fourth ed. Upper Saddle River, NJ: Prentice Hall, 2007. Print. [7] "Qik Technology." Qik Technology. N.p., n.d. Web. 07 Apr. 2013. <http://www.qiktechnology.com/tag/cloud-computing>. [8] Symantec. "2011 Cost of Data Breach Study." Symantec.com. Symantec, Mar. 2012. Web. 7 Apr. 2013. <http://www.symantec.com/content/en/us/about/media/pdfs/b-ponemon-2011-cost-of-data-breach-us.en-us.pdf>.