Rising experts detailed analysis of the "cloud" five security issues (1)
Source: Internet
Author: User
KeywordsCloud security cloud security rising
Regardless of music sharing, network directory synchronization or network file storage, your files, data, passwords and so on all things, are starting from the local hard drive to the server "cloud" transfer, "cloud" in the Internet users throughout the activities become more and more valuable. "Rising 2011 first half of safety report", elaborated the "cloud" encounters the question, the rising expert has carried on the thorough analysis to these questions. Since August 2006, when Google began to propose the concept of cloud computing (Cloud Computing), the concept of "cloud" has been hot for five years, has been popular in many areas, especially by the IT industry, the media and users of the hot. Whether software vendors, hardware manufacturers, mobile phone manufacturers or internet manufacturers are throwing their own "cloud computing" programs. But it is often said that the advantages of "cloud", including access, on demand, at any time to expand, according to the advantages of the use of fees are repeatedly mentioned. But in the security, it is not so much, after all, in the industry, "usability" is much more important than security. And the safety of this thing, before the accident happened, is usually put in the final consideration. Cloud computing services own security risks with the application of the deepening gradually exposed. John Pescatore, chief security analyst at Gartner Consulting, said the cloud computing approach did not initially consider security design. So, what is the security of cloud computing, and how should the security of cloud computing be improved, and what should users be aware of in the process of using cloud computing? Before discussing the issue, make a clear definition of "cloud computing": "Narrow cloud computing refers to the delivery and usage patterns of IT infrastructure, which means acquiring the required resources through the network on an as-needed and extensible basis; broad cloud computing refers to the delivery and usage patterns of services, which means that the required services are obtained through the network in an on-demand, extensible manner. ---Baidu encyclopedia "498" this.width=498 ' OnMouseWheel = ' javascript:return big (This) ' border= ' 0 "alt=" (Google set up in Belgium's data center) "Src=" Http://images.51cto.com/files/uploadimg/20110729/1437520.jpg "width=" height= "/>" Google's "cloud computing", which is set up in the Belgian data center, is the "cloud" of its own server cluster, where ordinary netizens can enjoy Google Docs, Google Music, Gmail and other services, These are typical scenarios for the simplest cloud computing. In fact, whether it is using Amazon S3 to provide services to the Dropbox, Microsoft's online documentation service live office, or Apple's latest cloud service icloud, all belong to the ordinary netizens "cloud services." 498) this.width=498 ' OnMouseWheel = ' javascript:return big (This) ' border= ' 0 "alt=" (Mr. Jobs made a speech on icloud at the press conference) "Src=" http:/ /images.51cto.com/files/uploadimg/20110729/1437521.jpg "width=" 290 "height=" 389 "/>" (Mr. Jobs made a speech about icloud at the press conference) you will find that regardless of music sharing, network directory synchronization or network file storage, your files, information, passwords, etc. everything, start from the local hard drive to the server "cloud" transfer, "cloud" Become more and more valuable in the whole activity of netizens. In the past, the local hard disk on the file lost, you will scratching want to get your head against the wall, now the first move is: hurriedly go over the mail record, see the original attachment is still in. 1 2 3 Next >> view full text navigation page 1th: Overview page 2nd: Legal and infringement risks 3rd page: Virus and Hacker attack Original: Rising experts detailed analysis of the "cloud" five security issues (1) Return to the network security home
The content source of this page is from Internet, which doesn't represent Alibaba Cloud's opinion;
products and services mentioned on that page don't have any relationship with Alibaba Cloud. If the
content of the page makes you feel confusing, please write us an email, we will handle the problem
within 5 days after receiving your email.
If you find any instances of plagiarism from the community, please send an email to:
info-contact@alibabacloud.com
and provide relevant evidence. A staff member will contact you within 5 working days.