Cloud ERA information security challenged: "Cloud attack" come on, prepare.
Source: Internet
Author: User
KeywordsAttack security Sony do well these
The "cloud", the hottest hot word at the moment, is moving from a concept into reality. Word documents, which were originally stored on PCs, are now increasingly being stored on docs, where the music and photos on the hard drive may have been placed in Apple icloud, and the original QQ chat record has been stored in Tencent's servers. When users put more and more data and information in the cloud, once there is a loophole, hackers will be bitten by the "cloud Attack (Threatstocloud)", how to safeguard the security of these resources becomes a very important issue.
Rising days before the release of the "2011 first half of the Internet Security Report" shows that "cloud attacks" are now a reality, with "cloud providers" that store large amounts of user information and behavior, such as microblogs, social networking sites, networked storage, and even traditional telecoms operators and hotel operators, who are facing unprecedented security risks. In the eyes of hackers, these websites are no longer a platform for acquiring resources and exchanging information, but they have become a way to gain value by using low cost.
In the first half of this year, hackers ' "Drag library", "Brush Library" (hackers through the intrusion of corporate networks, the server's user database, financial data, such as replication theft) incidents occur repeatedly, such as March, the United States's largest blog hosting platform WordPress suffered the most serious hacking since its inception; April-June Sony PSN Network, Sony Online Entertainment gaming services, qriocity music services have been hacked, resulting in more than 100 million users personal information leakage of the incident; at home, Sina Weibo was attacked by a cross-site attack worm at the end of last month, with more than 30,000 users in less than one hours.
These events have proved that the "cloud attack" This new security issue has been in front of us, "cloud" security protection must arouse people's attention, prepare ahead of time.
Although many websites, enterprises usually have their own security team to be responsible for site vulnerability Review, security maintenance, but because these teams are small, professional, resulting in even with the security team, the company's Web site is often faced with great security risks, such as the aforementioned Sony, WordPress is under attack to fully illustrate this point. LulzSec, the hacker who attacked Sony, claimed that Sony had used simple plain text to save user passwords. It seems that Sony's security awareness is really bad! Cloud service providers must be fully secure in their cloud systems.
How to enjoy the cloud services at the same time, to keep their information security, not only the enterprise, the responsibility of the website, but also should be a user and security manufacturers common responsibility. Now, more and more valuable user data are transferred to "cloud", such as music sharing, social networking, microblogging, directory synchronization, online shopping ..., people use these "clouds" has never been so common, and this has become the focus of attack. For users, for the attack, you can install a permanent free anti-virus software and firewall, and turn on the corresponding monitoring functions, can maximize the damage caused by worms.
The content source of this page is from Internet, which doesn't represent Alibaba Cloud's opinion;
products and services mentioned on that page don't have any relationship with Alibaba Cloud. If the
content of the page makes you feel confusing, please write us an email, we will handle the problem
within 5 days after receiving your email.
If you find any instances of plagiarism from the community, please send an email to:
info-contact@alibabacloud.com
and provide relevant evidence. A staff member will contact you within 5 working days.