wisemonkeys logo
FeedNotificationProfileManage Forms
FeedNotificationSearchSign in
wisemonkeys logo

Blogs

Cloud Computing: Threats and Vulnerabilities

profile
28_Christy Pachikkal
Oct 20, 2021
0 Likes
0 Discussions
96 Reads

Cloud is nothing but internet where you can access all things through internet remotely. Cloud computing means managing, access and shoring data or programs over the internet. Cloud Computing has paved the way to increase the capacity or add abilities to the cloud users. Cloud computing has been grown rapidly in the sector of IT. However, there is no doubt that the convenience and low cost of clod services have changed our lives, but security issues associated is considered as one of the foremost problem which has reduced growth of cloud computing and data privacy.

Security issues associated to cloud makes us vulnerable to cyber crimes. Hackers intrude into the exact location of data stored and steals provate and sensitive information for their benefits or for criminals activities. Therefore, a good understanding of cloud security threats and vulnerabilities is necessary in order to provide secure services to the cloud users.

Some of the threats associated to cloud computing we can disuss. First of all what is a threat. Threat is something related to risk of happening or an evil indication which facilitates your vulnerabilities or weaknesses. Top security threats associated to cloud computing can be: Abuse or nefarious use, insecure interfaces and API's, malicious insiders or shared technology like Iaas vendor or cpu caches.                            We can overcome these threats by following some of the remedies like stricter initial registration, validation process, monitoring public network, strong authentication..for example Google authenticator, security related notifications, monitoring of unauthorised changes or activity and vulnerability scanning.

We have also some of the vulnerabilities. Vulnerability basically means one's weakness. When an hacker or person other than you understands your weaknesses it allows the attacker to reduce systems information assurance. Cloud computing can be accessed through internet and the data is stored is valuable. Cloud vulnerabilities like session riding, session hijacking, injection vulnerabilities like sql injection and cross side scripting, resource exhaustion like denial of service attacks and internet protocol vulnerability.

As we can see these are threats and vulnerabilities which are prone to cloud. It is necessary that one must develop and dedign security techniques to protect the data dtored in your cloud. Here we discussed, the threats and vulnerabilities which will make understand an individual how to tackle.


Comments ()


Sign in

Read Next

5 Common Faults In Construction Tenders

Blog banner

Teenagers of Today

Blog banner

Why Consistency in Eating Habits Matters and How Meal Maharaj Makes It Easy

Blog banner

LTE Technology

Blog banner

Multiprocessor

Blog banner

How International Schools Build Global-Minded Students through Curriculum & Activities

Blog banner

Fault Tolerance in an Operating System

Blog banner

NodeJs

Blog banner

Memory input output management

Blog banner

The Future of Patola Weaving in a Sustainable Fashion World

Blog banner

Threat management

Blog banner

File management

Blog banner

PPC Advertising and its Impressive Benefits

Blog banner

To-Do List In LISP

Blog banner

Friendship

Blog banner

Drawing tips for a beginner

Blog banner

Assignment 2

Blog banner

Multiple processor scheduling

Blog banner

10 Signs That Prove YOU are his FIRST priority.

Blog banner

EdTech (Education Technology)

Blog banner

Computer Forensics and its Impact in Business Environment

Blog banner

Linux -V Server Virtual Machine

Blog banner

De-Coding Love

Blog banner

RAID

Blog banner

TRAIN TRAVELING

Blog banner

Rain

Blog banner

Modern Operating System

Blog banner

Khau Galli – Vile Parle

Blog banner

Internet of Things

Blog banner

Memory management

Blog banner

How Laughing Gas Makes Your Dental Visit So Much Easier

Blog banner

IT security management

Blog banner

Steps to create an Ubuntu EC2 Instance with GUI in AWS

Blog banner

Design Considerations for Disk Cache Management

Blog banner

E-commerce

Blog banner

?What Your Dentist Notices The Moment You Sit In The Chair

Blog banner

IT service level agreement

Blog banner

LIMITED EDITION

Blog banner

FILE SHARING

Blog banner

10 Interesting Facts about Attack on Titan

Blog banner

Blockchain Transactions

Blog banner

Street foods

Blog banner