Briefly describe the security of cloud computing

Source: Internet
Author: User
Keywords cloud computing

Today, many IT managers are giving up their business to the cloud for security reasons. They think hackers will attack their cloud-based providers at some point in the network and thus steal corporate core data. Although it is undeniable that this situation exists, but believe that the current cloud computing security issues, the real threat in the future will come from the enterprise's own cloud rather than to external attacks.

The more common issue will be around the security of cloud computing access, with data loss typically taken away by in-house employees who resigned or fired earlier. While this has happened before, it can only be done with cheap USB flash drives, but what's important is that today's cloud environment makes it easier for employees to access cloud-based data centers in cloud environments and get a lot of Sensitive data.

In this regard, the best way to defend against this data loss is to investigate the employee's work background, etc., and ensure that no one user can get permission to download all data through the cloud environment. This, of course, also includes limiting the IT staff who provide data for API usage by cloud computing vendors.

In addition, the bigger issue surrounding cloud computing is that while many cloud-based protections are designed to effectively protect servers from direct intrusion into the server or from external networks, many hackers typically employ multiple tactics to attack corporate cloud environments. This usually means that they are exploiting the core components of cloud computing, such as managing program problems, to attack network virtual machines.

Recent research shows that hackers can use side-channel attacks to steal and peek data on cloud-based virtual machines, such as collecting passwords. At the same time, researchers have demonstrated that a virtual machine installed on the same server, once defined as an attack target, can fully monitor shared resources on the server.

In addition, trust is also a central issue for effective data protection. Many cloud computing providers trust their customers, and each client uses data with other people in a cloud computing environment. Although each user logically has their own data storage space, cloud providers typically focus their trust on users for security, which is often referred to as insecure external cloud while internal cloud is secure. However, if the trust of the internal cloud environment once broken, the data will really be safe?

Cloud computing providers are aggressively improving their security policies to meet these new challenges, but at the same time not be able to use them as an excuse for businesses not to take advantage of cloud computing because they have not been addressed for the time being. These questions are raised simply to ensure that business data and business processes are secure in order for businesses to recognize the issues in cloud computing in order to take precautions.

Related Article

Contact Us

The content source of this page is from Internet, which doesn't represent Alibaba Cloud's opinion; products and services mentioned on that page don't have any relationship with Alibaba Cloud. If the content of the page makes you feel confusing, please write us an email, we will handle the problem within 5 days after receiving your email.

If you find any instances of plagiarism from the community, please send an email to: info-contact@alibabacloud.com and provide relevant evidence. A staff member will contact you within 5 working days.

A Free Trial That Lets You Build Big!

Start building with 50+ products and up to 12 months usage for Elastic Compute Service

  • Sales Support

    1 on 1 presale consultation

  • After-Sales Support

    24/7 Technical Support 6 Free Tickets per Quarter Faster Response

  • Alibaba Cloud offers highly flexible support services tailored to meet your exact needs.