Analysis of "2013 Cloud computing 9 threats" Report

Source: Internet
Author: User
Keywords Cloud computing providing

February 27, 2013, the main threat team from the Cloud Security Alliance (CSA) released the "2013 Cloud computing 9 threat" report, and members of the Alliance said the report was designed to provide organizations with the latest and most professional cloud security threats to help them understand the risks that they would face in cloud adoption and management, Advise them on cloud strategy development.

From the report, it can be seen that the alliance's proposed cloud computing threat is mainly focused on information security and technical issues, the nine major threat factors are CSA for industry experts to conduct a survey, the experts from the professional opinion of the summary and induction, visible, in the field of cloud computing is still a certain representation.

Small series will be on the nine major factors of the classification of false single, and do a simple analysis, and share with the users.

Data destruction and data loss: A study has found that 2/5 of companies have lost data due to the use of cloud computing. The company surveyed more than 3,200 organizations to study the hidden costs of cloud computing and the solution.

43% of the respondents encountered data loss during their use of cloud computing, and they had to recover from the backup. And the recovery process has failed more than once. The Internet cloud and cloud computing are now gaining popularity, in which you can access a variety of services over the web without knowing where the servers are serving you, and computing resources are being unified. So the data loss for users and enterprises, is bound to exist problems, small set suggest the best for the cloud stored confidential data through access control combination, contractual responsibility and encryption measures to protect.

Unsafe APIs and account hijacking: At present, the cloud management market is increasingly competitive, major IT vendors are gearing up for the cloud management territory, and according to IDC Research, the Global Cloud management software market in 2015 is expected to reach 2.5 billion U.S. dollars. For major vendors, cloud management is an opportunity to establish long-term and lasting strategic partnerships with customers. For emerging vendors, cloud computing is also important for developing products and providing SaaS solutions to the broader cloud management environment. According to TechTarget China's recent "Cloud Computing Security Survey" for users in China, 33.6% of respondents chose to hijack the security account.

Denial of service and lack of review: while the risk of cloud-computing denial of service attacks is increasing in the past, these attacks have targeted the target as a resource-intensive part of the company's infrastructure, but now critical servers and services are targeted. Attackers use low bandwidth to attack special applications to paralyze the victim's online services. Prolexic's SOP has cited the misuse of secure HTTP requests as a result of blocked corporate servers and routers, and a large number of account creation requests can block many applications.

Abusive and malicious insiders: the malicious actions of a person, both within the enterprise and within the cloud-computing service provider, are very dangerous and the consequences are serious. Cloud service providers will certainly not disclose their employees ' level of physical server and virtualization, much less tell you about his analysis and reporting policies. This means that as long as there is a certain level of authorization, internal personnel can obtain confidential data and control cloud services, listen to the horror of it! In fact, the user is able to obtain these operations information, as long as the signing of service level agreement when proposed on it, you know how to do it!

Shared technology issues: sharing is the new development of information resource sharing in the cloud computing environment, it is committed to sharing cloud resources in a more free cloud environment and in a wider space, providing more information service and knowledge service for the wider users. and the cloud sharing content and its services also need to discuss, on the one hand help users in the "cloud diffuse" cloud environment clearly understand their information needs, on-demand, accurate access to the corresponding cloud services. On the other hand, it helps cloud service providers to combine their own situation, with the purpose and selectively to provide the most satisfying user needs of the shared services, and strive for the development of cloud sharing a good collaborative environment to maximize the realization of a wide range of information resource sharing.

As Csaglobalresearch director Santos said, "in order to effectively manage the risks in cloud computing, companies must be able to understand what the current and future threats to the cloud are, and this requires diligent learning." "But the fact that companies have not started this process is likely to continue." We hope that this report will arouse the company's awareness of potential risks in developing cloud strategies. ”

Related Article

Contact Us

The content source of this page is from Internet, which doesn't represent Alibaba Cloud's opinion; products and services mentioned on that page don't have any relationship with Alibaba Cloud. If the content of the page makes you feel confusing, please write us an email, we will handle the problem within 5 days after receiving your email.

If you find any instances of plagiarism from the community, please send an email to: info-contact@alibabacloud.com and provide relevant evidence. A staff member will contact you within 5 working days.

A Free Trial That Lets You Build Big!

Start building with 50+ products and up to 12 months usage for Elastic Compute Service

  • Sales Support

    1 on 1 presale consultation

  • After-Sales Support

    24/7 Technical Support 6 Free Tickets per Quarter Faster Response

  • Alibaba Cloud offers highly flexible support services tailored to meet your exact needs.