Cloud computing has a lot of benefits to our lives, it may be more attractive to enterprises, cloud computing can effectively help companies reduce operating costs, to help enterprise internal IT management more efficient, although the cloud has so many advantages, but from another point of view, The threat posed by cloud computing security is also worth arguing and thinking about.
In this hacker-flooded network age, the number of hackers may be growing exponentially every day, in addition to all the risk of random failures, for cloud computing in high-density services and critical network, hackers and malicious software can often make the application of cloud computing effect short, will also bring corporate customers "bad impression" of cloud computing. In other words, the benefits of cloud computing may become the focus of hacker attacks, so that the benefits become worse.
Spread less than concentrate
In today more and more people use mobile devices to work, that is, we often say that the emergence of byod,byod so that enterprises and individuals can access to more convenient office and conditions at any time, but also make the enterprise IT operating costs greatly reduced, But since these mobile terminals may not be as sophisticated as computing and security as traditional PC computers, the likelihood of being attacked becomes so great that the internal network of the enterprise is threatened.
What we now call cloud computing is that it can help users save a lot of data from the user's client device, instead, the data is put into a so-called "resource pool", the advantage is that the client can greatly reduce the load, so that the user's Terminal pc to maintain a better running state, thereby prolonging the service life. But now that cloud computing is still at a nascent stage, many technologies are not perfect, that is, today's cloud computing in the data processing and storage is still in a relatively fragmented phase, cloud computing service point is very little, for the beautiful story that we have previously woven this may give users and enterprises blow.
Therefore, cloud computing deployment and management should be with the development of technology to carry out high-density computing and deployment, so that not only the user access to the amount of resources will be greatly increased, but also for the security of cloud computing will be a better protection, and then to say that the entire cloud industry to a virtuous circle to develop.
The cliché is that regulation is essential
"Cloud computing represents the concentration of information and computing resources that can be easily controlled by businesses and governments," the recent article by the University of Illinois in Chicago said in a nutshell. "In addition," the pooling of resources is easily controlled by nature, provided that the enterprise has such resources or is within the jurisdiction of the Government department. "In other words, the transfer of large amounts of data and resources to the" resource pool "of cloud computing is contrary to the original idea, but I think this is also the trend of the development of cloud computing.
Regulatory pressures from companies and more on cloud computing may seem less conducive to the development of cloud computing, but still have a role to play in the long-term problem of hacking. The increase in lease computing capacity the most straightforward to reduce the user's local costs and risks, an effective long-term implementation of the cloud computing deployment will not only bring profits and management convenience, but also make users in the use of the process can be more safe and reasonable to do any operation.
Cloud computing poses a threat to password protection
Now big and small enterprises are talking about cloud computing, private cloud, public cloud, mixed cloud and so on, this series of topics will eventually fall to the hardware level, that is, enterprises to develop cloud computing data center room and a large number of server equipment is essential, Since there are so many hardware will cause some outlaws of the attention, Hacker Trojan followed.
According to reliable sources, some hackers are now using Amazon's cloud computing services for password cracking to conduct user information and private password cracking. But there is good news, according to David Campbell, a security expert, that even if the user does not use the expert's recommended password for uppercase and lowercase letters and numbers, using Amazon's cloud computing services, hackers will not be forced to crack this information out of consideration of cost issues.
Because of the cloud computing services offered by Amazon, called EC2, its requirements are hourly, and if hackers want to force a breach, it will cost about $1.5 million trillion in service, but if the password is shortened to 11, it will require less than 60,000 USD service charge , and a 10-digit password will cost less than 2300 dollars.
Uppercase and lowercase letters are safer to mix and match
Traditional security experts have suggested that users should be more secure when setting passwords for all types of network services, but that it is more safe to use a combination of uppercase and lowercase letters, but according to recent research, it is not as "impossible" to improve the security level of Web services. The setting of the password number has a great effect on the improvement of the security level.
With the Black Hat organization already starting to exploit supercomputing services such as cloud computing, our security-management technicians need to rethink some of the security details we've overlooked in the past. Hackers who steal credit cards from users can use the money in these cards to buy powerful machines that are even more powerful than the supercomputers in the national security apparatus.