What are the advantages of cloud security technology over common security technologies

Source: Internet
Author: User
Keywords Unit cloud Security cloud security technology

Analysis of the security threats of LAN

Insiders believe that: the threat to the internal network of units mainly from outside the unit, but within the unit. Therefore, it is wrong to focus on preventing network attacks from outside the organization and ignoring network security threats from within the organization.

In fact, according to Cisco's security services, about 70% of all security incidents (especially leaks) come from within the unit. Therefore, due to the lack of awareness of the internal network security threats, the unit security departments do not properly take scientific precautions, resulting in the internal network security incidents increased year by year. The reason is that the internal network security risks in addition to the security system from the deployment of defects, greater is from the internal staff, its performance in:

(1) Disorderly management of mobile storage media;

(2) The use of pirated software, games, etc., resulting in virus transmission;

(3) The user and the user group rights distribution is unreasonable;

(4) Account and password management does not meet the strict requirements or unreasonable settings;

(5) Excessive opening of service ports;

(6) The network administrator workload is too large or professional level is not high enough, the work responsibility is not strong enough;

(7) User operation error, may damage network equipment such as host hardware, mistakenly delete files and data, incorrectly formatted hard disk, etc.

(8) Internal network attacks. Some employees in order to vent xiesifen or be turned into enemy spy, become a unit leaks or sabotage. Because these employees are familiar with the internal network structure of the unit, they can exploit the loopholes in the management and invade others ' computers for destruction.

(9) from the internal attack of wireless network users, if the enterprise LAN deployed wireless access AP, if not to do authentication and other security measures to prevent, in the AP coverage of the installation of wireless network card devices in the general computer and portable devices can automatically join the local wireless LAN network, This makes local LANs very vulnerable to illegal attacks.

Cloud security technology in cloud computing

Cloud security appears after the cloud computing industry. "Cloud security" is an important area in the development of cloud computing, absolutely can not ignore, must be ' cloud security ' as the premise of cloud computing development, for cloud computing industry to pay high attention to ' cloud security ', if there is no ' cloud security ' protection, our cloud computing development, will let everyone lose confidence.

So what is "cloud security"? Popular Point said, "cloud security" means that anti-virus manufacturers through the Internet, the use of client-collected virus code, through analysis, processing, processing, and finally give the solution to distribute to users, so that the entire internet has become a huge security user computer safety anti-virus software , you don't have to worry about updating the virus software library every day.

Some people say that the advent of cloud computing technology indicates the advent of the PC post era, in the software industry from c/s architecture gradually to B/s architecture evolution process, the inevitable client's hard disk demand is getting smaller and lower for the client's intelligent requirements, our future personal PC will no longer need to install any software, There is no need to download any software installed on the PC, but directly through the browser or professional equipment for all the application environment for remote calls, make full use of the resources of the cloud server, reduce local load, reduce TCO, fully make personal PC greener.

So what are the advantages of cloud security technology over common security technologies?

In general, cloud security uses a large number of servers in the cloud, cloud security technology does not occupy the memory of each user's computer, but now the anti-virus software occupied the client computer a large amount of memory; using cloud security technology, if a client on the Internet is attacked by a virus, cloud security collects the code of the virus So that other people on the Internet from this virus intrusion;

The use of cloud security, the virus before the arrival of the virus has been intercepted, usually the security of personal computer technology, is the virus occurs after the anti-virus software can be eradicated, and even anti-virus software does not upgrade words can not be effective protection.

Related Article

Contact Us

The content source of this page is from Internet, which doesn't represent Alibaba Cloud's opinion; products and services mentioned on that page don't have any relationship with Alibaba Cloud. If the content of the page makes you feel confusing, please write us an email, we will handle the problem within 5 days after receiving your email.

If you find any instances of plagiarism from the community, please send an email to: info-contact@alibabacloud.com and provide relevant evidence. A staff member will contact you within 5 working days.

A Free Trial That Lets You Build Big!

Start building with 50+ products and up to 12 months usage for Elastic Compute Service

  • Sales Support

    1 on 1 presale consultation

  • After-Sales Support

    24/7 Technical Support 6 Free Tickets per Quarter Faster Response

  • Alibaba Cloud offers highly flexible support services tailored to meet your exact needs.