Cloud Computing Security Issues Term Paper by TyAdem

Cloud Computing Security Issues
A review of the security issues and solutions to cloud computing.
# 153667 | 1,231 words | 2 sources | MLA | 2013 | NG


$19.95 Buy and instantly download this paper now

Description:

The paper explains that cloud providers offer software applications, storage and other services via an online account, and they can greatly reduce costs for businesses by giving them access to advanced features that may be very costly otherwise. This paper covers the security risks facing cloud providers and mentions several recognized by the Cloud Security Alliance (CSA) that include cyber attacks and hacking of sensitive information, the stealing of information by cloud computing employees and attacks from other customers. The paper then considers the possible solutions to make Cloud services more secure for customers.

From the Paper:

"Cloud computing is clearly an advancement of other web services like web hosting and online storage and so it faces many of the same risks and from hackers and cyber thieves. Hackers who are able to break into a public or private cloud computing environment can steal sensitive information from many different users and either use or sell that information. Information such a credit card numbers, financial records, software and reports are obviously stored online by many users and are constantly at risk of being stolen. Csps' (Cloud service providers) therefore are obligated to continually stay vigilant to keep this this information safe and user data safety will depend on a Csp's individual safety level and culture.
"If hackers are successful in infiltrating a cloud they can further cause damage by planting viruses and worms which could further seek to access a user's office or home network. Most Csp's fortunately do provide antivirus' and firewalls' but with the evolving nature of online threats, a compromised cloud could be a near disaster for end users and providers both.
"While Csps' may be successful in stopping threats external to the cloud, it is a bit harder to keep out internal threats such as a bad employee intent in copying sensitive data to a flash drive or other storage device. IT firms continually face this problem and naturally obvious solutions would include limiting reading and copying permissions within the Csp and internal monitoring of the cloud activities. Limiting physical access to sensitive data servers and proper background checks of employees and usersis also vital."

Sample of Sources Used:

  • Cloud Computing Security survey, David liu Et. al, Indiana university Computer Science Dept, 2011http://salsahpc.indiana.edu/CloudCom2010/Poster/cloudcom2010_submission_67.pdfhttp://arxiv.org/ftp/arxiv/papers/1109/1109.5388.pdf
  • Security of cloud computing providers, ponemon institute, 2011http://www.ca.com/~/media/Files/IndustryResearch/security-of-cloud-computing-providers-final-april-2011.pdf

Cite this Term Paper:

APA Format

Cloud Computing Security Issues (2013, August 25) Retrieved September 23, 2019, from https://www.academon.com/term-paper/cloud-computing-security-issues-153667/

MLA Format

"Cloud Computing Security Issues" 25 August 2013. Web. 23 September. 2019. <https://www.academon.com/term-paper/cloud-computing-security-issues-153667/>

Comments