The relationship between the advantages and disadvantages of cloud security

Source: Internet
Author: User
Keywords Cloud security Cloud security
Cloud security analysis users worry and confusion from two aspects, on the one hand, relying on cloud computing, cloud storage, Virtualization, SaaS "Cloud Application" has been unstoppable, but the relevant security issues have continued unabated, according to the United States "information weekly" that the " Competition and the urgent sense of application further deepened the user's fear and uneasiness. On the other hand, when users try to choose a "cloud security" product, they cannot find any criteria that can be relied upon. Although even in the domestic market, "cloud security" label can be seen everywhere, including rising, trend technology, Kaspersky, McAfee, Symantec, Panda, Jinshan, 360 security guards and other domestic and foreign security manufacturers have launched a cloud security solutions. However, the answer to what kind of scheme can protect the safety of the enterprise under the cloud wave is always the same as falling into the fog. Ironically, in understanding the concept of "cloud security," hackers seem to have a clearer logic, and quickly put into action, we can see that hackers use the "cloud" in the distributed computing power, can be faster to crack user passwords, can be more efficient through the control of "botnet" to achieve malicious attacks, In recent years, several large-scale network-breaking events, as well as up to more than 10 times times the increase in distributed denial of service attacks, is a good proof of this-"cloud security," the pursuit of the protection concept, is becoming the "murder weapon" of the hackers. Cloud security should jump out of the simple "tool Theory" "cloud security facing the puzzle, is actually a turning point for the security industry." The next generation of cloud security should jump out of the simple ' tool theory ' and adopt new technologies and new models to achieve real cloud security, "Chen Yihua, chief executive of Trend technology, told reporters. Chen Yihua refers to the "tool theory", in simple terms, is the current number of antivirus manufacturers hype and focus: How to take full advantage of the "cloud architecture", faster and more acutely access to the virus and malicious program information, so that the client implementation protection. The focus of this protective mode, more is the "cloud" as a tool to strengthen the enterprise's protection capabilities. Trend Technology argues that while this "cloud security" remains important, the new challenges and principal contradictions must be seen, namely that many cyber-criminals no longer attack users ' computers but directly attack data centers and the cloud itself. This makes the traditional stand-alone version or LAN based information security methods can not be competent cloud security computing environment protection, the user's worry and confusion. For example, in the "cloud" era, the virtualization of enterprise IT resources increasingly popular, and in the virtual server mix environment, security and reinforcement standards are different, a lower standard virtual machine will become all the sharing of virtual resource security vulnerabilities. As the data center continues to expand, hackers can penetrate such a low protected virtual machine, the resulting proliferation rate and harm will be greatly increased. In addition, such as "cloud" enterprise data loss and leakage, virtualization caused by the technical loopholes "sharing", user accounts, services and identity, etc., are the current "cloud security" real "pain point." In other wordssaid that the "cloud" itself is the biggest security risks, in the face of this problem, trend technology 2010 in the original cloud computing technology based on the security services, proposed a new cloud Security 3.0 concept, to provide new cloud-oriented security services. That is, from the security from cloudcomputing (Protection from cloud computing) to security for cloudcomputing (to protect cloud computing). Of course, if we want to solve the problem of "cloud security", it is obviously not enough to rely on the power of one manufacturer. Because the nature of security is a confrontation, looking for a "short plate" is much easier than adding all the planks. Therefore, this requires the industry to unite to form a complete protection system to jointly protect the security of cloud computing. You know, "cloud" is not only our tool, but also may become a hacker's "sharp weapon", to face our "cloud security" on the weak, and constantly upgrade the new protection technology, rather than a simple label and concept hype market, is "cloud security" The fundamental way of further development although the enterprise in the network monitoring software has made certain progress, generally established the corresponding network management system, but the Chinese people have "on the policy, under the countermeasures" national mentality, flexible thinking, not to comply with the rules, regulations have become a national habit; People manage people to make contradictions, the system of people difficult to take root "business management deficiencies. Therefore, from the technical level of staff to manage the Internet, but the operation of proxy server is complex, and the function is limited, and it is not convenient for the real-time management of the network behavior, and the firewall alone cannot guarantee the leakage or theft of the important information inside the enterprise, because there are many improper behaviors in the network. In this case, a set of effective network monitoring software becomes necessary! On the face of the management of Chinese employees is not an effective way, in the network management of some enterprises adopt proxy server or firewall measures. The security of cloud security remains to be considered, and what we can do is to protect ourselves. "Editorial Recommendation" cloud computing risks outweigh its benefits network monitoring software enterprises must be more important to modern cloud computing Security Enterprises "responsible editor: Liyan TEL: (010) 68476606" Original: The relationship between cloud security advantages and disadvantages return to network security home
Related Article

Contact Us

The content source of this page is from Internet, which doesn't represent Alibaba Cloud's opinion; products and services mentioned on that page don't have any relationship with Alibaba Cloud. If the content of the page makes you feel confusing, please write us an email, we will handle the problem within 5 days after receiving your email.

If you find any instances of plagiarism from the community, please send an email to: info-contact@alibabacloud.com and provide relevant evidence. A staff member will contact you within 5 working days.

A Free Trial That Lets You Build Big!

Start building with 50+ products and up to 12 months usage for Elastic Compute Service

  • Sales Support

    1 on 1 presale consultation

  • After-Sales Support

    24/7 Technical Support 6 Free Tickets per Quarter Faster Response

  • Alibaba Cloud offers highly flexible support services tailored to meet your exact needs.