How do users comment on "Cloud" security? (1)

Source: Internet
Author: User

As networks gradually integrate into people's lives, security threats become increasingly pervasive. The traditional defense model cannot fully cope with the current security form. With the proposal of cloud computing, cloud security has begun to enter people's horizons.

Netizen: whutfirefox

Cloud computing has evolved from network technology, grid technology, and parallel distributed computing. It is a new term that has emerged in the last two years. It is believed that it will be gradually used by researchers, it is used to provide services for the majority of users. Cloud security has evolved from cloud computing. It will be further promoted with the development of cloud computing, and ultimately benefit users' Internet security!

In recent years, the grid technology has not been as popular as before, and the popularity of research has gradually declined. The reason is that the effect of grid technology in the application field is not very obvious, it cannot be used by common users. It has high technical requirements for users. As a result, there are some obstacles in the popularization process.

Cloud computing has evolved from grid computing. Although there are many differences between the two, there are also great connections. Its essence is similar. One of my concerns here is whether cloud computing will be similar to grid computing. After a period of popularity, it will be stuck. As a result, the development of cloud security will not be able to inject new blood, and it will also be lost!

Cloud security is growing rapidly along with cloud computing, mainly because of the support of major manufacturers and their powerful back power. But will it be difficult to be used by users? Will it be just a technical use, but not much improvement in actual use? And in the existing cloud security-based anti-virus software, what is the capability of cloud security to prevent viruses? These things still need to be studied. Currently, cloud computing is still in the research stage and is rarely used in reality. Only some large companies are doing research in this area, such as IBM and other business giants. The Research on cloud security is even more worth waiting.

You are welcome to give your opinion or correct your opinion!

Netizen: niuliguo

Many people understand the concept of "cloud computing", which basically stores computing resources in the network through distributed processing and parallel processing, shared by many terminal devices.

Cloud security is similar. It places security-related computing resources (threat information aggregation, Pattern Analysis) and services on the network to provide security protection for many end users.

In other words, the Technical Idea of cloud security is to closely connect users' computer terminals with the technical platforms of security vendors through the Internet to form a large network of Trojans, malware monitoring, and virus detection and removal, each user is both a contributor to cloud security technology and a user.

Netizen: jojoba2008

In fact, Cloud in-the-Cloud must be associated with active defense Proactive. If you search for these two words, you will surely gain a lot.

Active Defense and cloud are actually the same thing. Everyone is on the Internet, just like in a cloud. Currently, anti-virus uses passive patching. That is to say, the antivirus vendor adds the detected signature to the feature library, and then automatically downloads your anti-virus software. Active protection does not need to install signatures on the client, but there will be a terminal software similar to monitoring and reporting, and information can be obtained and sent from the central database at any time. For example, if you want to browse Yahoo, your client will first ask the server, the server thinks Yahoo is safe, and you can access it. In turn, one day Yahoo is infected with Trojans, then there will always be the first person who accesses it and is poisoned. The victim's client immediately sends a warning to the server, and the second person who requests access Yahoo will receive an alarm. In this way, the client does not need to be busy downloading various feature libraries. The cloud structure is a large-scale CS architecture.

Speaking of the cloud, we have to mention Trend Micro Trend, the most active defense advocate. Trend has put forward a lot of cloud protection concepts. At present, we can take advantage of Trend Micro's worry-free e-eye on the Internet. It is a client software and its main function is to identify malicious websites and spyware, this function is blocked if you install other anti-virus programs. By the way, the download is free of charge. So far, this guy hasn't intercepted me for more than two months.

Netizen: jxlpn

I personally think that the cloud security of major manufacturers is still in a poor situation after poisoning.

Rising cloud security, Kabbah's network security system, and ThreatSense of NOD32. net, Norton Community Watch of Norton, and MCAFEE's Artemis are all computers of a single individual in the Internet user group. After being poisoned, they take the initiative to collect their samples, and then analyze them through system analysis, then, we actively push updates such as signatures or other rules to prevent other computers in cloud security from being infected with the virus. However, the computer that provided the samples is still poisoned, and a volunteer is offered for free!

In addition, the current cloud security also involves privacy violations. Although all major security vendors say that they are collecting information anonymously and will not collect sensitive user information, however, Symantec's Terms of Service clearly states that Symantec will not store the data stored in Norton Community Watch, summarizes any data, contact lists, or subscription information Symantec collects for promotional purposes. Symantec may publish the collected information if the legal requirements may be acceptable, or as required by communications or other law enforcement processes.

That is to say, what kind of user information is collected, how to handle it after collection, and whether it will be handed over to the Security Department if necessary, which we cannot know. Such a Privacy Protection Policy can easily cause greater user panic. This cloud security is essential for a single common user. What is the significance of this? It is still poisoned.

I really hope that cloud security will be truly secure in the future. Instead of collecting information from the client of common users, I hope that the defense mechanism will be aimed at the sources of major viruses: various servers on the network, and actively analyzes suspicious files on these servers. When they are transmitted to common users, they directly update and kill software to prevent them from posing a threat to users' computers.


Contact Us

The content source of this page is from Internet, which doesn't represent Alibaba Cloud's opinion; products and services mentioned on that page don't have any relationship with Alibaba Cloud. If the content of the page makes you feel confusing, please write us an email, we will handle the problem within 5 days after receiving your email.

If you find any instances of plagiarism from the community, please send an email to: info-contact@alibabacloud.com and provide relevant evidence. A staff member will contact you within 5 working days.

A Free Trial That Lets You Build Big!

Start building with 50+ products and up to 12 months usage for Elastic Compute Service

  • Sales Support

    1 on 1 presale consultation

  • After-Sales Support

    24/7 Technical Support 6 Free Tickets per Quarter Faster Response

  • Alibaba Cloud offers highly flexible support services tailored to meet your exact needs.