Preview

Security Risks in Cloud Computing

Good Essays
Open Document
Open Document
924 Words
Grammar
Grammar
Plagiarism
Plagiarism
Writing
Writing
Score
Score
Security Risks in Cloud Computing
Security Risks in Cloud Computing
University Writing Essentials / ENG 147
Security Risks in Cloud Computing

With technology as advanced as it is today, most find that security in Cloud computing is more secure and better when in fact the risks are higher than ever before. What could be presumed safe, could in fact present a major vulnerability in the eyes of a hacker. When accessing the Cloud, users depend on the security, which in turn subjects them to security risks in privacy, security, and data accessibility. If users avoid these risks, it can lead to grave results that could include losing sensitive information or worse, having someone’s identity stolen. David Geer states how these vulnerabilities and risks lead to problems by saying, “While these cloud applications may offer quick resolution to specific feature needs, the risks and vulnerabilities they introduce can lead to significant costs in damages...”. Privacy, Security, and Data are risks users take today when depending fully on the security Cloud has to offer. (Geer, 2013, par 21).

In today 's world in Cloud Computing, data can be easily accessed from any unknown source with Internet capabilities. Due to the limitless control this may present, the user may find that their privacy has been unknowingly invaded. Hidden from the users, most applications in today 's cloud computing are made up of either "Software as a service" (SaaS) or proprietary software. Both of these types of software collect information, inputted by the user, and record it for marketing use. In addition, this information can be stored away for others to access, leaving the account in the hands of someone unknown. In efforts to reaching a solution, Richard M. Stallman, a fighter for digital property rights, goes on to tell users that in order to make your data private, "users should refrain from employing SaaS applications and utilize freeware programs". (Stallman, 2013).

In a world, where users all take computers for



References: Pacella, R. (2013).Hacking is a Significant Threat to Cloud Computing. (2013). Technology and the Cloud. Retrieved from http://ic.galegroup.com.ezproxy.apollolibrary.com/ic/ovic/ViewpointsDetailsPage/ViewpointsDetailsWindow?failOverType=&query=&prodId=OVIC&windowstate=normal&contentModules=&display-query=&mode=view&displayGroupName=Viewpoints&dviSelectedPage=&limiter=&u=uphoenix_uopx&currPage=&source=&disableHighlighting=&displayGroups=&sortBy=&zid=&search_within_results=&p=OVIC&action=e&catId=&activityType=&scanId=&documentId=GALE%7CEJ3010846205 Sallman, R. (2013). Cloud Computing Threatens User Freedom and Should Be Avoided. Technology and the Cloud. Retrieved from http://ic.galegroup.com.ezproxy.apollolibrary.com/ic/ovic/ViewpointsDetailsPage/ViewpointsDetailsWindow?failOverType=&query=&prodId=OVIC&windowstate=normal&contentModules=&display-query=&mode=view&displayGroupName=Viewpoints&dviSelectedPage=&limiter=&u=uphoenix_uopx&currPage=&source=&disableHighlighting=&displayGroups=&sortBy=&zid=&search_within_results=&p=OVIC&action=e&catId=&activityType=&scanId=&documentId=GALE%7CEJ3010846203

You May Also Find These Documents Helpful

  • Best Essays

    With the unprecedented growth and spread of information, there is no wonder why large Information Technology companies have been investing in the “cloud”. To expand, when referring to Cloud Computing, this means to access and store information not stored with in your computer whether it be public, private, or hybrid cloud computing. In technological terms, the server you are accessing is somewhere else and therefore, the information and tools you are using are “up in the clouds” but more so stored in another server space. However, whether you are paying for services through software, total usage, or free usage (hence the types of cloud services) Cloud Computing seems to be everywhere. Yet, it is important to recognize what is to gain by using cloud computing from big businesses to individual users and what are some risky moves when utilizing cloud storage over the Internet. Hence, the content of this paper will discuss the pros and cons of cloud computing and where cloud computing is headed in todays online society.…

    • 1307 Words
    • 6 Pages
    Best Essays
  • Good Essays

    Security attacks. A huge number of attacks are been made on cloud every day by malicious programs.…

    • 470 Words
    • 2 Pages
    Good Essays
  • Better Essays

    Cloud computing is a fast growing information technology trend that many companies including Google, Microsoft, and IBM are currently looking to get a stake in as demand for the service grows. Cloud computing is the concept of allowing both individuals and businesses to store data and applications on remote servers (owned and operated by a third party company), rather than on their own hard drives and data centers. The service boasts the ability to securely access data and applications from just about any device with an internet connection, allowing for such services as streaming music from a personal collection from multiple devices, and even to business development and storage of applications on remote servers. For the past few years, cloud computing has quickly grown in popularity, and as such, has come with its own set of risks and security concerns. As use of this service grows by both consumers and businesses, it will no doubt continue to attract the attention of hackers and cyber criminals, as it offers a central repository of data that can contain everything from financial statements, to company intellectual property. On 7/11/2011, eweek.com posted an article called “Cloud Computing Security: 10 Ways to Enforce It”, which attempts to give several suggestions on the best way to ensure that cloud computing is as safe as it is convenient.…

    • 1626 Words
    • 7 Pages
    Better Essays
  • Better Essays

    Trust is not easily defined, but most people agree that when it comes to cloud computing, transparency is essential to creating trust. Businesses must be able to see cloud service providers are complying with agreed data security standards and practices. These must include controls around who has access to data, staff security vetting practices, and the technologies and processes to segregate, backup and delete data. Suppliers of cloud technologies and services are quick to claim that cloud computing is well equipped to provide the necessary controls. Virtualization, they argue, underlies cloud computing, and therein lies the potential to achieve hitherto impossible levels of security. While virtualization is viewed with suspicion and fear by many IT directors, suppliers like RSA, IBM and other say that the technology enables organizations to build security into the infrastructure and automate security processes, to surpass traditional data protection…

    • 1351 Words
    • 6 Pages
    Better Essays
  • Better Essays

    Cis 500- Cloud Computing

    • 1078 Words
    • 5 Pages

    Technology has taken great leaps of advancement. Some of the new technology that companies and consumers are taking advantage of to store and process data is cloud computing. Cloud computing was derived from virtualization. Virtualization allows companies to separate business applications from hardware. Doing this gives the company the capability of assigning applications as needed. The option to manage applications is a great benefit to companies. Resulting from the virtualization error, cloud computing has emerged to provide flexible IT infrastructures. This has not only enhanced the options companies now have, but it is also proven to be more cost efficient. This has increasingly become a preferred method of companies and consumers alike. (Turban, & Volonino, 2011, p.47)…

    • 1078 Words
    • 5 Pages
    Better Essays
  • Good Essays

    Large enterprises have been reluctant to move certain files or apps to the cloud network. The market size for cloud is far behind what it was expected to be, and for good reason. Consumers have concerns with cloud computing security, especially when it involves data security and confidentiality issues. This article shows the legitimacy of concerns people are have when dealing with…

    • 2396 Words
    • 10 Pages
    Good Essays
  • Powerful Essays

    Cloud Computing

    • 1763 Words
    • 7 Pages

    IT departments and infrastructure providers are under increasing pressure to provide computing infrastructure at the lowest possible cost. In order to do this, the concepts of resource pooling, virtualization, dynamic provisioning, utility and commodity computing must be leveraged to create a public or private cloud that meets these needs. Cloud computing is a general term for anything that involves delivering hosted services over the Internet. This provides the smaller companies or individuals who couldn’t able to buy costly software or any other resources. This becomes easy because of cloud computing. Cloud promises real costs savings and agility to customers. It’s a ‘Pay for Usage’ plan. We pay the money based on our usage only. Through cloud computing, a company can rapidly deploy applications where the underlying technology components. Access to applications and data anywhere, any Time, from any device is the potential outcome of cloud computing. This is suitable technology for limited budgets and a highly dynamic market with minimal resources.…

    • 1763 Words
    • 7 Pages
    Powerful Essays
  • Satisfactory Essays

    In this article, Patrick Thibodeau comments on Federal CIO Vivek Kundra’s claim that cloud computing concerns are exaggerated. Thibodeau explains clearly the claims made by Kundra about the overall security with cloud computing. Thibodeau blames the scare of cloud computing to IT developers belief of a status quo. Thibodeau concludes the article with a few success stories of basic cloud computing services working in the U.S. Government.…

    • 659 Words
    • 3 Pages
    Satisfactory Essays
  • Better Essays

    Bibliography: Craig-Wood, K. (2010). Retrieved from http://www.katescomment.com/iaas-paas-saasdefinition/ VMware and Intel. (2010). New Power for Data Center Virtualization. Retrieved from http://ra.techtarget.com/leads/magnifierResponded.do?email=lmoyo@bhiretirement.org& resourceId=1285800393_587&leadFollowupPathId=3969819&site=bpmd&asrc=EM_R MU_20101214 Jo Maitland, Executive Editor of SearchCloudComputing.com. (2010). Infrastructure as a Service: How to maintain control. Retrieved from SearchCloudComputing.com: http://searchcloudcomputing.techtarget.com/generic/0,295582,sid201_gci1378172,00.ht ml Sudip Chahal, J. H.-S. (2010). An Enterprise Private Cloud Architecture and Implementation Roadmap. Retrieved from www.intel.com/IT Wilkins, G. (2010). A marketing foray into Cloud Computing - Part 1 - What 's it all about? Retrieved from http://rocketfuelmarketing.co.uk…

    • 920 Words
    • 4 Pages
    Better Essays
  • Powerful Essays

    Business Trend Memo

    • 1299 Words
    • 6 Pages

    Hayes, B. (2008, March), “Cloud computing”, Communications of the ACM, 51, 9-11. Retrieved from http://cacm.acm.org/magazines/2008/7/5368-cloud-computing/fulltext…

    • 1299 Words
    • 6 Pages
    Powerful Essays
  • Best Essays

    McClure, S., Scambray, J., & Kurtz, G. (2009). Hacking exposed 6: Network security secrets & solutions. New York: McGraw-Hill.…

    • 4737 Words
    • 19 Pages
    Best Essays
  • Powerful Essays

    Computer Fraud Act Of 1984

    • 2247 Words
    • 9 Pages

    Due to the advance technology of the Internet, the government, private industry and the everyday computer user have fears of their data or private information being comprised by a criminal hacker. C.C. Palmer, who manages the Network Security and Cryptography department at the IBM. Thomas J. Watson Research Center writes, “They are afraid that some hacker will break into their Web server and replace their logo with pornography, read their e-mail, steal their credit card number from an on-line shopping site, or implant software that will secretly transmit their organization’s secrets to the open Internet”. This hacking is not only widespread, but is being executed so flawlessly that the attackers compromise a system, steal everything…

    • 2247 Words
    • 9 Pages
    Powerful Essays
  • Good Essays

    Security plays a significant role in today’s corporations and mitigating risks to a company’s most valuable asset, data, is important. With data breaches, such as the one experienced by Target, the Department of Homeland Security as well as the Internal Revenue System, it is becoming increasingly obvious that no one is immune. Securing data is complex and with the advent of cloud services where information is now gathered and stored in various locations throughout the globe, securing that data continues to be a challenge. Even as we implement policies and procedures to secure our environment, we are now partnering with many companies and vendors that must also follow the same guidelines to ensure a company’s assets.…

    • 1286 Words
    • 6 Pages
    Good Essays
  • Good Essays

    assignment IST309

    • 1030 Words
    • 3 Pages

    The purpose of this paper is to talk about how security concerns of cloud computing matter to business as well as to other organizations and looking for the solution of the problems. Public cloud computing provides immense convenience but at the same time consists of huge privacy and security risks. The paper will discuss this problem from survey done by other researchers and the realistic problems cause by leakage of cloud data.…

    • 1030 Words
    • 3 Pages
    Good Essays
  • Best Essays

    Data Breach

    • 2467 Words
    • 10 Pages

     Don’t underestimate the tenacity of your adversaries, especially espionage- driven attackers, or the power of the intelligence and tools at your disposal (2013 Data Breach Investigations Report, 2013).…

    • 2467 Words
    • 10 Pages
    Best Essays