How to view the security problem of cloud computing

Cloud computing is a new way of sharing infrastructure that can connect huge system pools together to provide a wide range of IT services. Cloud computing is the Super computing model based on the Internet.     The pooling of information and processor resources stored on personal computers, mobile phones and other devices to work together. Is cloud computing necessary? Let me give you an example of this. In the past, people own wells, each drink water, to meet their needs can be. But with the population more and more, the demand for water is more and more big, start ...

A comprehensive solution to private cloud security in enterprises

From the original as to meet the "remote Access", "Remote Application" rigid demand and the emergence of the virtual application software, in the gradual embodiment of less occupied resources, easy to manage the centralized application of advantages, has been more recognized.   With the rapid growth of demand for mobile clients, virtual application mode is more useful to cross-platform support, and more and more enterprises choose to use virtual application software to build private cloud it platform. At the same time, the opening of access access will bring more test to the security of information system than the restricted area network, and must pay enough attention to it. As a virtual application ...

How cloud computing is safe to fall

Editor's note the establishment of the Central network security and Information Technology leadership group, China's information security attention to the level of unprecedented new heights. How should government procurement match the national will, from the source of information system construction to put good safety? At the second China International cloud computing Technology and Application Forum held on March 4, the senior domestic information industry experts, scholars and manufacturers representatives have made suggestions to share the huge opportunities brought by cloud computing and large data. It also indicates the hidden danger and risk of network insecurity. Delegates generally believe that to solve the problem of information security, to create ...

315 Rights: 360 browsers teach you to identify fraudulent websites

In the year 315, the theme of this year's 315 gala was "to make consumption more dignified". In recent years, with the increasingly large online shopping market, phishing, fraud incidents, internet shopping infringement, network rights protection is imminent. According to the China Internet Information Center survey report, 2013 China's online shopping users have reached 302 million people.   This year, however, 360 Internet security centers intercepted a total of 2.201 million new phishing sites. On the occasion of 315 rights protection, 360 security browser for consumers to create a full range of online shopping security strategy, teach you how to quickly know ...

Reflection on the security control of enterprise cloud

Previously, we identified six different cloud models and identified five different enterprise deployment models based on specific enterprise requirements.   Enterprises may directly control specific cloud models and adopt a direct approach to security control, but when this level of control is missing, end-to-end layer pattern protection needs to reduce malicious and accidental threats. End-to-end Cloud protection is not linear in nature, but is spherical in that the control fragment overlaps because of the flexible global business model, disruptive computing, and dynamic threats. Regardless of which possible intrusion vectors, layered security ...

Cloud-era panic counting cloud computing's most serious threat

Cloud computing has entered the stage of landing, the development of everyone is obvious to all, many companies began to consider or have embraced cloud computing. Cloud computing provides small and medium-sized enterprises with many benefits, saving money, creating new resources and so on. These are the benefits of cloud computing, but among these advantages, most people are still worried about its shortcomings, the most concerned is the security issue.   Analyzing threats and risks in cloud computing can help you understand the pros and cons of cloud computing, take advantage of cloud computing, and adopt appropriate measures to avoid loss. Security threats based on ID ...

Security management of cloud computing

The security problem of cloud computing is one of the most important problems that need to be solved today, in which some design principles are put forward according to Sianipension, which protects user's privacy in the process of cloud computing service design: 1. Design effective feedback mechanism is to provide users with timely security tips;   2. Allow users to select the use of personal information, whether to withdraw or join this mechanism;   3. Adopt safe defensive measures to prevent the use of replication or access for authorization to protect personal information in cloud computing; 4. To achieve user control, personal information control to ...

Secure Cloud Gateway: Using the Internet to combat cyber attacks

Cyber attacks are in the same way as the Internet, using Domain Name System (DNS) to distribute malware, control botnets, and collect login information.   With the increase in cloud computing services, BYOD and telecommuting, the attack surface has gone beyond the traditional corporate network boundaries. This diversity of devices and networks creates an environment in which businesses must accommodate any device roaming anywhere. However, the current security platform cannot cope with this situation. This spawned a new network security platform: Security Cloud Gateway (secure Cloud GATEWAY,SCG), ...

Application analysis of security system for cloud computing concentration

In the author's previous "Cloud computing let security issues become centralized and controllable, related to national competitiveness," Alibaba Group chief technology Officer Dr. Jian and we share the "more secure cloud computing", "cloud computing can help improve national information security level protection" and other views,   Next we continue to delve into how cloud computing focuses on security issues and its application in public security video-structured technology. Security advantages of centralized management PC era is decentralized management, the user's data is stored on their own computer, to protect the security of user data to a large extent by the user's own Ann ...

Hacker "Drag Library" threatens Internet financial cloud security protection

Customer information is one of the most important assets of internet finance, but this important asset is constantly under threat from the hacker's "drag-and-drop" (data exported from the database).   Recently, on the internet finance salon hosted by the security treasure and the net loan day eye, the two sides on the hacker to the problem of the library exchange and discussion, in the salon, security Bao security director Yin Yi explained the hacker the principle of the library, and the way, and advised the Internet financial users to take precautions, and the use of cloud security solutions to protect. "Drag Library" is a hacker circle of the term, refers to the website of the database by hackers downloaded to the local, its ...

2014 cloud computing: Toward 0 Trust security mode

The exposure of the NSA's secret file to steal data in June 2013 has rekindled concerns about the security of corporate data stored on the cloud.   But the exposure of the NSA surveillance program will not cause some companies to be afraid of data disclosure no longer using hosting services, instead, it facilitates enterprise users and cloud service providers to reform their internal security and privacy policies and enhance cloud data security, something that businesses and suppliers have long overdue to do. Snowden first leaked NSA surveillance to media ...

Who is "cloud security" subversive?

While cloud computing may now be a hype, the advent of the cloud is inevitable as a trend.   With the cloud computing, mobile Internet and other new technologies landing and a wide range of applications, new security risks and the emergence of more unknown security threats to the entire security industry is a bit unprepared, the "cloud" brought about by the security problems are gradually heating up. Some users who have just come in contact with the concept of cloud computing, the first reaction is always-is it safe? With some understanding of cloud computing, users always say that security is like the shortest piece of wood on cloud computing, the reason cloud computing this bucket of water is still installed ...

Dell Global Security Survey: Cloud computing and Internet as potential security threats

The rapid development of BYOD, mobile, cloud computing, the Internet, as well as unexpected and malicious internal behavior, has spawned a new generation of unknown security threats that are bringing a lot of fresh risks to the enterprise. However, according to a recent Dell Global security survey, most IT executives around the world say these threats are not their main security risks, and they do not first understand how to discover and address these security vulnerabilities at many sources.   In fact, only 37% of respondents view the unknown threat as a major security risk for the next five years. The contagious threat comes from all corners of the enterprise and beyond.

Data encryption technology improves cloud security

There is no doubt that people who understand the technology of data encryption should be able to protect the security of the source of technology.   Because of the direct use of data, so that data even if the security crisis lost, was stolen, encryption protection can still guarantee the real content of the data security. But the flexibility of data encryption is the place where people have been criticized. From the initial information encryption is not convenient to transparent encryption, from the beginning of a single encryption to the current Multimode encryption, encryption technology is also constantly improving to cope with the increasingly rich demand for encryption. and the development of data encryption technology is not only this, in order to deal with the more ...

Cloud Security: 10 issues that must be understood before entering the cloud

The hustle and bustle surrounding cloud computing may make you think that there will be a massive adoption of cloud computing tomorrow. However, many studies have shown that security is the biggest obstacle to large-scale adoption of cloud computing.   The reality is that cloud computing is just another step in the way of technology evolution along host, client/server, and Web applications, so it has its own security problems, just like all other phases. Of course, security concerns do not prevent the use of these technologies, nor can they prevent the adoption of cloud applications that address the real business needs. ...

Is cloud security an alarmist or a minefield?

Cloud computing has been developing very rapidly since the 2008, and cloud security issues have followed.   Cloud security vendors have different interpretations of security issues, and all sorts of schemes that can solve cloud security are coming, but the question of cloud security has never stopped. The November 2010 IDG survey showed that 67% of users were worried about cloud security when deploying cloud computing solutions. The recent speculation of the "Prism Gate" incident, once again the cloud safely dragged into the public opinion of the Rapids Vortex. What are the challenges and opportunities that cloud computing poses to security?

CPPCC member Qiang: China desperately needs its own cloud security

March 10 News, at present, the global cloud computing and mobile Internet infrastructure layout, access and control of the vast number of data, is becoming the world for the future of information social control of the important strategic means.   Qiang, the CPPCC member, said in an interview that China desperately needs its own cloud security. "The rapid development of smart phones, so that our wireless network to become the focus of future development, on this basis, such as the balance of the Internet applications such as treasure, can be paid through mobile phones, to provide convenience for everyone." "Qiang that while smartphones are playing a more and more role in people's lives ...

Members suggest China's own cloud security

The NPC and CPPCC are in the midst of an intensive meeting, and committee representatives have been building suggestions. The global cloud computing and mobile Internet infrastructure layout, access and control of the vast number of data, is becoming the world's competition for the future of information social control of the important strategic means. Qiang, the CPPCC member, said in an interview that China desperately needs its own cloud security. "The rapid development of smart phones, so that our wireless network to become the focus of future development, on this basis, such as the balance of the Internet applications such as treasure, can be paid through mobile phones, to provide convenience for everyone." "Qiang that while smartphones are in people ...

Storage Security for cloud computing

Cloud computing times users will certainly be very concerned about the security of their own data stored in the cloud, and for enterprises, the enterprise data storage in the cloud it also makes the company in any cloud decision making decisions to be cautious, because once a large number of cloud data is attacked and destroyed,   It may be a devastating disaster for businesses. Often business data is stored in more secure data centers, and companies invest heavily to secure data centers. However, there are many blind spots in the data center that are being used by external forces, according to the survey, at least 6.

Research on data security in cloud computing security

Research on data security in cloud computing Security University Zheng This paper focuses on the cloud in this particular environment of data security issues for in-depth research, mainly do the following two aspects of work: 1. For security issues such as protecting the privacy of user queries and data confidentiality, by analyzing the advantages and disadvantages of existing schemes, combining cryptography theory, an improved scheme is proposed for a data retrieval scheme based on all-homomorphic encryption, which can not only guarantee the user's data not to be leaked, but also ensure the privacy of the user's query process. ...

Total Pages: 2156 1 .... 1389 1390 1391 1392 1393 .... 2156 Go to: GO

Contact Us

The content source of this page is from Internet, which doesn't represent Alibaba Cloud's opinion; products and services mentioned on that page don't have any relationship with Alibaba Cloud. If the content of the page makes you feel confusing, please write us an email, we will handle the problem within 5 days after receiving your email.

If you find any instances of plagiarism from the community, please send an email to: info-contact@alibabacloud.com and provide relevant evidence. A staff member will contact you within 5 working days.

A Free Trial That Lets You Build Big!

Start building with 50+ products and up to 12 months usage for Elastic Compute Service

  • Sales Support

    1 on 1 presale consultation

  • After-Sales Support

    24/7 Technical Support 6 Free Tickets per Quarter Faster Response

  • Alibaba Cloud offers highly flexible support services tailored to meet your exact needs.