The general trend of cloud security

Source: Internet
Author: User
Keywords Cloud security the general trend through

The speed with which companies use cloud computing often surprises security experts, and security experts reavis that companies should take a more pragmatic approach, such as using risk assessments to understand real risks and how to mitigate them, before deciding whether to deploy cloud computing technology.

In recent years, security experts have warned that the internet will one day be overwhelmed by the burden of allowing viruses and spam to increase dramatically without being proactive in curbing these disadvantages. This is really not alarmist. Since the beginning of the "Web Threat" in 2005, the Web threat has grown by 1564% in just two years, with more than 11 million global viruses.

For our users, the most direct feeling is that there are not too many things in the calculation, running faster and slower, slow to make you crash. One reason for this is that the exponential growth of the signatures is consuming your computer and your network's memory. Of course, it also includes those virus programs that are not yet in attack. The

virus grows at a geometric level. The technical model we use is that the user must upgrade the virus signature database on a regular basis and save it on their own computer, and in 2005, only about 50 signatures were added to the database, and in 2008 the number increased to 5, 000.

Therefore, the first and most immediate benefit of cloud security is the maximum possible release of storage space for a client network terminal. According to trends in technology and technical personnel, their "cloud security" is as much as possible to reduce the number of client code files, and the vast majority of signature files to the Internet Cloud database. To this end, the trend of technology cloud security has been established around the world 5 large data centers, the layout of 34000 online servers. On average, 5.5 billion clicks a day to collect and analyze 250 million samples per day, the database can reach 99% of the first hit rate. A common practice for

Traditional code comparison techniques is to extract the signature code in a known virus sample, open the instrumented file, search in the file, and check whether the file contains the virus signature code in the virus database. If the virus signature code is found, because the characteristic code corresponds to virus one by one, then determine what virus is in the file being searched. This means that users poisoned and feedback after the antivirus enterprise can decode the protection. The more important significance of

Cloud security is to subvert traditional virus prevention patterns. Over the years, anti-virus software has been criticized as "expired medicine", antivirus manufacturers are always following the virus, even if you are the fastest speed to intercept the virus, the loss is still unavoidable.

and "cloud security" basically subvert this pattern by intercepting web threats, e-mail threats, and file threats before they reach the end user or corporate network. For example, by launching a fast in the cloudThe "detection" of real-time security state reduces the dependence of downloading traditional signature files on the endpoint, and uses the flexible adaptive technology of multi-layer and multiple components to guard against the security in the cloud. The

Cloud computing model is the centralized power supply model for power plants. In the cloud computing mode, the user's computer becomes very simple, perhaps small memory, no hard disk and a variety of applications to meet our needs, because the user's computer in addition to the "cloud" through the browser to send instructions and accept data is basically nothing to do can use the cloud service provider's computing resources, Storage space and various application software. This is like connecting "monitor" and "host" wires infinitely long, so you can put the monitor in front of the user, and the host is far away from even the computer users themselves do not know where. Cloud computing connects "monitor" and "host" wires into networks, turning "hosts" into server clusters for cloud service providers.

Related Article

Contact Us

The content source of this page is from Internet, which doesn't represent Alibaba Cloud's opinion; products and services mentioned on that page don't have any relationship with Alibaba Cloud. If the content of the page makes you feel confusing, please write us an email, we will handle the problem within 5 days after receiving your email.

If you find any instances of plagiarism from the community, please send an email to: info-contact@alibabacloud.com and provide relevant evidence. A staff member will contact you within 5 working days.

A Free Trial That Lets You Build Big!

Start building with 50+ products and up to 12 months usage for Elastic Compute Service

  • Sales Support

    1 on 1 presale consultation

  • After-Sales Support

    24/7 Technical Support 6 Free Tickets per Quarter Faster Response

  • Alibaba Cloud offers highly flexible support services tailored to meet your exact needs.