Wednesday, December 4, 2019
Security Threats in Cloud Computing for Information Security
Question: Discuss about the Security Threats in Cloud Computing for Information Security. Answer: Abstract Cloud computing is a new kind of technology which is as per the demands of various customers. It is mainly developed for providing convenience to large number of users. Cloud computing mainly aims in providing computing services over the network. Security is considered to be one of major area in cloud computing (Hao Shihong, 2015). Virtualization provides a platform creating a large number of issues security among users of cloud computing. It aims to focus to change the relationship between hardware and operating system related to it. Various kinds of underlying hardware can be network, computing or even storage devices. Development in cloud computing domain creates a lots of security challenges for various business. The number of cloud user has increased a lot in the last few years. So a lot of data need to be stored in environment of cloud computing. There are large number of challenges in cloud computing like authentication, denial of service and hijacking of session (Inukollu, Arsi Ravuri, 2014). Various kinds of threat in cloud computing are data threats like data breaches, loss of data and lastly network threats like service hijacking. Some kinds of cloud based threats are like insecure interface, malicious insiders, abuse use of many cloud providers. Different kind of techniques are available which can be used for protection of data form breaches, protection of data from loss. Secondly it focuses on network security like protection of account and protection of denial of services. This particular topic has been select because it reduces IT cost in various organization and also increases efficiency. References Hao, Q., Shihong, Z. (2015). Accounting Informationization Hierarchical Data Safety and Prevention Based on Cloud Computing Environment. Inukollu, V. N., Arsi, S., Ravuri, S. R. (2014). Security issues associated with big data in cloud computing.International Journal of Network Security Its Applications,6(3), 45.
Subscribe to:
Post Comments (Atom)
No comments:
Post a Comment
Note: Only a member of this blog may post a comment.