The main security threats and development trends of cloud computing

Source: Internet
Author: User
Keywords Security trends cloud computing

The position of network security in the whole informatization is known to every information worker, whether it is the personal computer of desktop system security, the communication security of network equipment, and the security of mail server and enterprise Information System. In China's security development process, stand-alone anti-virus and anti-virus used to be the last ten years of the most important form of the past century. And into this century, firewalls, intrusion prevention and stereo defense attacks have become new security solutions. However, with the development of the Times and the complexity of the Internet, these common technical means can not meet the challenge completely, the security problems under the new situation face several characteristics.


Major security threats in the cloud era


1. System security for virtual machines with virtualization


Virtualization today for most information workers is no stranger, this reason is very simple, the server host utilization is not very high, If you encounter a heterogeneous environment, using a virtual machine to solve is a very economical and convenient way, so the majority of fans loved. However, the problem has been opened so many virtual machines, if a system infected with the virus, other systems will be infringed, isolation can be done, or even the background of the storage and data information is affected. If the virtual machine system crashes, it will affect other virtual machines, which is a very real problem.


2. How cloud computing ensures the security of its key business data


Cloud computing is also the hottest topic of the moment, putting your business into the Cloud data center, and how users within the system can easily share and save a lot of things. It looks pretty, but what about security, in case the data leaks? This is the issue of every CIO's heart, this issue is not only a security issue, but also the planning of information technology, but also familiar with the various aspects of cloud computing, I really take which layer to do the virtual, how to do. These problems present both opportunities and challenges to the security vendors.

3. The rise of electronic commerce brings about identity authentication security, personal information security and transaction security


E-commerce has become an important development direction of the Internet, currently, the annual national network of transactions has accounted for all the total trading volume of 9%, Many expensive big-ticket items also have a tendency to trade on the Internet. Therefore, the security of E-commerce transactions has become a very urgent problem, and in this regard, the user's security is very weak, personal trading password stolen, Web site or bank information leakage problems emerge, become a new security hotspot.

4. Security of mobile users ' impact on traditional networks


with the popularization of smartphone and the development of mobile interconnection, the security of mobile terminals is challenging the traditional network attack and defense system. As you all know, the traditional security protection is to hold my server's port, with firewall anti-virus wall and flow monitoring and so cast a maginot line of defense, so what mail server, database server, and all kinds of attacks outside will be shut out. However, when the mobile Internet is integrated into the conventional network, it is estimated that the previous plane has become a stereo. Many mail viruses or attacks are introduced from mobile phones or PDAs, which makes the conventional protection system face enormous challenges.

5. Information security with data center and cloud storage


The data center built ten years ago, not only the equipment is aging, the whole structure is no longer adaptable to development. The amount of data generated every day how to store, unlimited expansion of their own hardware equipment is unrealistic. So, you can only try cloud storage, but as the data moves into the cloud, security issues are coming again. It is a headache that traditional data centers are dead and new energy-efficient data centers are built.

Future Trends in   security


Network Security, a problem that no one can leave in the information age, has become very embarrassing now. Ten years ago, the domestic security manufacturers everywhere, from antivirus to firewall to anti-spam, and today, the era of hegemony has passed, slowly moved to the era of feudal and monopoly. A unique feat to dominate the market has been unrealistic, security needs a new three-dimensional all-round solution. From the client's desktop to the server and data center, from mobile devices to E-commerce security, from virtualization to cloud storage, all of these customers need secure protection. Therefore, this calls for a strong technical strength of the overall security solutions to the emergence of vendors, this is a big trend.


The second trend is to specialize in mobile internet security solutions providers, after all, the use of mobile phones is too high, and the Internet or chat with mobile phones has become the regular activity of most smartphones. The market can also produce some security vendors. Of course, like Jinshan, Tencent, 360 has already started in this circle.


Finally, a security planning advisory body derived from cloud computing security. Recently, CIOs have been willing to hand over their company's key business cloud security plans to outside formal security advisory bodies, as long as they provide such consultancy services, I believe many users will like. After all, the cloud is the general trend, no one can stop, then, why not give more professional people to do it. It is believed that some security services will also be created in this block.

Contact Us

The content source of this page is from Internet, which doesn't represent Alibaba Cloud's opinion; products and services mentioned on that page don't have any relationship with Alibaba Cloud. If the content of the page makes you feel confusing, please write us an email, we will handle the problem within 5 days after receiving your email.

If you find any instances of plagiarism from the community, please send an email to: info-contact@alibabacloud.com and provide relevant evidence. A staff member will contact you within 5 working days.

A Free Trial That Lets You Build Big!

Start building with 50+ products and up to 12 months usage for Elastic Compute Service

  • Sales Support

    1 on 1 presale consultation

  • After-Sales Support

    24/7 Technical Support 6 Free Tickets per Quarter Faster Response

  • Alibaba Cloud offers highly flexible support services tailored to meet your exact needs.