Network security is always a hot topic on the internet, but never got a satisfactory answer, and with the progress of science and technology, network security has become particularly important, entrepreneurs are trembling eyes, fearing that the day their own data disappeared, and at present a new technology has drifted into the country, Hit the internet industry is not small ripple, but also the security issue to the tiger, the service providers have to take the necessary protection measures. So this technology is called cloud computing.
Why it is called cloud computing, my understanding is that users put all the data into a third party database, whenever and wherever there is a network and computer, then users can call their own data from the data center. It is precisely because of the unlimited http://www.cloudmind.cn/time and place, as if standing under a huge cloud, so we describe the data center as a cloud, then this kind of data processing technology we call it cloud computing. So, when we put the data in the data center, which also brings a huge security challenge to users, how users trust the security of Third-party databases, how the data center to protect the user data security? We can not help but think of the current online popular word "Fang, how do you think?".
Then on the issue of cloud security in the early days of this security incident, in this year's August 6, the Grand Wuxi Room to provide cloud host business host physical disk failure, resulting in the use of several users of the cloud host immediately downtime, business interruption. The fuse of the incident came. Next, Shanda in its Sina official Weibo on the issuing of a dispatch apologized and told users should do their own cloud host (www.cloudmind.cn) outside the data backup. August 8, more media and industry people began to pay attention to this matter, and Sheng accident and cloud host industry development discussion. In the final Sheng announcement, announced in the future will be permanently free for cloud host users 15G space for data storage and backup as compensation.
In the original on the crisis of the Internet, such incidents occur more users uneasy, in the selection of service providers to the data security concerns also gradually ranked first, and then look at the server quality and bandwidth conditions. Then, for the service provider that provides the cloud host to the user, the first thing is to ensure the security of the infrastructure, including the security of the data center physical facilities, the security of the Access network environment, the security of the virtual platform and the security of the application. In addition, the user in the process of using cloud host, including the early host environment, business operations and other aspects of possible security problems, service providers should also have the necessary protection measures and solutions.
In the current cloud host market, the situation is unusually chaotic, most of the cloud hosting service provider is more than the technology, in the overwhelming advertising to cover up the technical strength, so many of the technology business also had to sigh after no longer spend a lot of money on equipment upgrades or technology upgrade, but also into the advertising competition. More frustrating is that the various types of host marketing and advertising is only landed in the cloud host technology characteristics, for example, on-demand, data online transfer, load balancing, and so on, and randomly picked up one or two features and traditional server rental, hosting, VPS, virtual host PK, and then shouted a resounding victory. Only a handful of companies in the market are willing to make efforts and publicity on the security of cloud hosts, such as the cloud and credit in Beijing, million network, such as several cloud computing research and development enterprises. And the Sino-Cloud letter as the industry with Ali, grand domestic and the same group of developers, in the cloud security on the investment to be more outstanding.
It is reported that as early as the year before the cloud and the letter on the United Stone Technology company on the network topology to do a comprehensive optimization and security protection; On the hardware protection, from the network port, the cloud data center with the famous security manufacturer Stone science and technology cooperation, the construction of triple physical protection, to ensure that 90% of illegal access filtered out. In the soft protection, www.cloudmind.cn to provide customers with all genuine software, all the operating system has been genuine, the IP address has also been VLAN division, for each cloud host to do security strategy, anti-virus software, firewalls and other traditional stand-alone security step.
In the middle of this year, cloud-credit has also spent more than two upgrades to all the servers in their data center, raising the security protection of hardware again. In addition, recently with the server security Dog has formally established a cooperation, set up a server security protection and security management integration as one of the protective measures. Through the cooperation with the safe dog, the server system is optimized, the patch of the server is repaired, the server program is guarded, the risk account is scanned, the DDoS firewall, the ARP firewall, the security policy setting and the mail real-time alarm are protected, which provides the perfect protection for the user in the process of server operation. To protect them from malicious attacks and damage.
But even a service provider that is so ready does not fully guarantee 100% of the security of the data. Because a data center is like a bank, where users deposit their value data in a bank, the face of such a rich bank is bound to be spied on by the offender, but I believe that it is almost nil., given the degree of protection that the cloud-credit has done. Therefore, the answer to the cloud security question may not be a hundred to avoid attack or protection of the method but attitude, but a customer responsibility, integrity attitude.
The content source of this page is from Internet, which doesn't represent Alibaba Cloud's opinion;
products and services mentioned on that page don't have any relationship with Alibaba Cloud. If the
content of the page makes you feel confusing, please write us an email, we will handle the problem
within 5 days after receiving your email.
If you find any instances of plagiarism from the community, please send an email to:
info-contact@alibabacloud.com
and provide relevant evidence. A staff member will contact you within 5 working days.