University Writing Essentials / ENG 147
Security Risks in Cloud Computing
With technology as advanced as it is today, most find that security in Cloud computing is more secure and better when in fact the risks are higher than ever before. What could be presumed safe, could in fact present a major vulnerability in the eyes of a hacker. When accessing the Cloud, users depend on the security, which in turn subjects them to security risks in privacy, security, and data accessibility. If users avoid these risks, it can lead to grave results that could include losing sensitive information or worse, having someone’s identity stolen. David Geer states how these vulnerabilities and risks lead to problems by saying, “While these cloud applications may offer quick resolution to specific feature needs, the risks and vulnerabilities they introduce can lead to significant costs in damages...”. Privacy, Security, and Data are risks users take today when depending fully on the security Cloud has to offer. (Geer, 2013, par 21).
In today 's world in Cloud Computing, data can be easily accessed from any unknown source with Internet capabilities. Due to the limitless control this may present, the user may find that their privacy has been unknowingly invaded. Hidden from the users, most applications in today 's cloud computing are made up of either "Software as a service" (SaaS) or proprietary software. Both of these types of software collect information, inputted by the user, and record it for marketing use. In addition, this information can be stored away for others to access, leaving the account in the hands of someone unknown. In efforts to reaching a solution, Richard M. Stallman, a fighter for digital property rights, goes on to tell users that in order to make your data private, "users should refrain from employing SaaS applications and utilize freeware programs". (Stallman, 2013).
In a world, where users all take computers for
References: Pacella, R. (2013).Hacking is a Significant Threat to Cloud Computing. (2013). Technology and the Cloud. Retrieved from http://ic.galegroup.com.ezproxy.apollolibrary.com/ic/ovic/ViewpointsDetailsPage/ViewpointsDetailsWindow?failOverType=&query=&prodId=OVIC&windowstate=normal&contentModules=&display-query=&mode=view&displayGroupName=Viewpoints&dviSelectedPage=&limiter=&u=uphoenix_uopx&currPage=&source=&disableHighlighting=&displayGroups=&sortBy=&zid=&search_within_results=&p=OVIC&action=e&catId=&activityType=&scanId=&documentId=GALE%7CEJ3010846205 Sallman, R. (2013). Cloud Computing Threatens User Freedom and Should Be Avoided. Technology and the Cloud. Retrieved from http://ic.galegroup.com.ezproxy.apollolibrary.com/ic/ovic/ViewpointsDetailsPage/ViewpointsDetailsWindow?failOverType=&query=&prodId=OVIC&windowstate=normal&contentModules=&display-query=&mode=view&displayGroupName=Viewpoints&dviSelectedPage=&limiter=&u=uphoenix_uopx&currPage=&source=&disableHighlighting=&displayGroups=&sortBy=&zid=&search_within_results=&p=OVIC&action=e&catId=&activityType=&scanId=&documentId=GALE%7CEJ3010846203