wisemonkeys logo
FeedNotificationProfileManage Forms
FeedNotificationSearchSign in
wisemonkeys logo

Blogs

Cloud Computing: Threats and Vulnerabilities

profile
28_Christy Pachikkal
Oct 20, 2021
0 Likes
0 Discussions
96 Reads

Cloud is nothing but internet where you can access all things through internet remotely. Cloud computing means managing, access and shoring data or programs over the internet. Cloud Computing has paved the way to increase the capacity or add abilities to the cloud users. Cloud computing has been grown rapidly in the sector of IT. However, there is no doubt that the convenience and low cost of clod services have changed our lives, but security issues associated is considered as one of the foremost problem which has reduced growth of cloud computing and data privacy.

Security issues associated to cloud makes us vulnerable to cyber crimes. Hackers intrude into the exact location of data stored and steals provate and sensitive information for their benefits or for criminals activities. Therefore, a good understanding of cloud security threats and vulnerabilities is necessary in order to provide secure services to the cloud users.

Some of the threats associated to cloud computing we can disuss. First of all what is a threat. Threat is something related to risk of happening or an evil indication which facilitates your vulnerabilities or weaknesses. Top security threats associated to cloud computing can be: Abuse or nefarious use, insecure interfaces and API's, malicious insiders or shared technology like Iaas vendor or cpu caches.                            We can overcome these threats by following some of the remedies like stricter initial registration, validation process, monitoring public network, strong authentication..for example Google authenticator, security related notifications, monitoring of unauthorised changes or activity and vulnerability scanning.

We have also some of the vulnerabilities. Vulnerability basically means one's weakness. When an hacker or person other than you understands your weaknesses it allows the attacker to reduce systems information assurance. Cloud computing can be accessed through internet and the data is stored is valuable. Cloud vulnerabilities like session riding, session hijacking, injection vulnerabilities like sql injection and cross side scripting, resource exhaustion like denial of service attacks and internet protocol vulnerability.

As we can see these are threats and vulnerabilities which are prone to cloud. It is necessary that one must develop and dedign security techniques to protect the data dtored in your cloud. Here we discussed, the threats and vulnerabilities which will make understand an individual how to tackle.


Comments ()


Sign in

Read Next

How to Avoid being a Victim of Cybercrime

Blog banner

Virtual Memory

Blog banner

Hosting basics

Blog banner

Throttle engine ’Sneak peek into the future’

Blog banner

Memory Management in Operating System

Blog banner

Review on Recovering Deleted Files

Blog banner

Modern Operating System - Khush Bagaria

Blog banner

Smart Shoephone: Is that technology overdose!?

Blog banner

How To Invest in Indian Stock Market For Beginners. ~ Tutorial 2 (NSDL And CSDL) Continued...

Blog banner

MULTITHREADING:ENHANCEING PERFORMANCE AND EFFICIENCY IN COMPUTING

Blog banner

Study on cyber and network forensic in computer security management

Blog banner

Objectives and functions of Operating System...

Blog banner

Ola

Blog banner

Disk scheduling

Blog banner

Scheduling

Blog banner

Amazon

Blog banner

Platonic Solids

Blog banner

Why You Need 2FA (Two-Factor Authentication) On Your Email And Other Online Accounts

Blog banner

Outlook mail

Blog banner

Does School Infrastructure Really Matter For Learning?

Blog banner

KEAP MANAGEMENT SYSTEM

Blog banner

OS PROCESS DESCRIPTION AND CONTROL-SARVAGYA JALAN

Blog banner

File management

Blog banner

How can denial-of-service(Dos) attacks be prevented?

Blog banner

Philadelphia Experiment : Was it real?

Blog banner

Beautiful and stunning natural phenomena worth to see

Blog banner

Security Issues

Blog banner

How To Secure Operating Systems ?

Blog banner

QUANTUM COMPUTING IN SECURITY:A GAME CHANGER IN DIGITAL WORLD

Blog banner

Cyber Security Standards

Blog banner

Fault tolerance

Blog banner

Apple

Blog banner

Random Forests

Blog banner

Memory management

Blog banner

Concurrency and memory

Blog banner

Electronic Funds Transfer

Blog banner

Deadlock and Starvation

Blog banner

bulk email software

Blog banner

Discover The Top 3 Places To Stay in London

Blog banner

Four Stalls Every Vegetarian Needs To Eat At Outside Vile Parle Station

Blog banner

Sweet Mango Murabba

Blog banner

Instagram Features in 2023 That Will Leave You Stunned!

Blog banner