Threats and Vulnerabilities of Cloud Computing: A Review
Verified
Added on 2023/05/31
|4
|723
|381
AI Summary
This article discusses the threats and vulnerabilities of cloud computing and provides steps to improve the security of cloud technology. It also recommends measures to address the issue of data breach and hacking.
Contribute Materials
Your contribution can guide someone’s learning journey. Share your
documents today.
Application security
Secure Best Marks with AI Grader
Need help grading? Try our AI Grader for instant feedback on your assignments.
APPLICATION SECURITY 1 Threats and Vulnerabilities of Cloud Computing: A Review The title of this journal paper is Threats and Vulnerabilities of Cloud Computing: A Review that was written by the Pericherla Satya Suryateja in the year 2018. According to author cloud computing is an advanced technology in the field of computer science that provides a platform to control the large amount of data (Suryateja, 2018).It also provides many features to their consumers, for example, scalability, and data security and monitors a large amount of data at a time. The main purpose of this article is to highlight the threats and vulnerabilities of cloud computing and steps to improve the security of cloud technology. It is observed that there are mainly three types of services provided by the cloud computing such as SaaS, PaaS, and IaaS. In this modern generation, it is very important to secure the data of any user for which information technology developed this technology but there are several threats occurs in a cloud- like data breach, malware attack, denial of service attack and vulnerable system (Hashizume, Rosado, Fernández-Medina, & Fernandez, 2013).Data breach is a very common security issue in cloud computing which occur due to lack of security and in which data of users may be lost. It is studied that this is one of the leading security threat in the sector of the cloud. In the year 2017 around 1.4 billion data were lost due to lack of security and it also affected around 143 million individual’s computer networks. Malware attacks occur when any user clicks on unwanted or fraud links and most the hackers send these types of links on emails. With the help of this attack, people can lose their private data or information (Suryateja, 2016).DOS is also a very common security threat for cloud computing and in which hacker produce a large number of traffic signals and transfer to the networks of an organization. Use of security programmes is very best practice or process to address the problem of data breach or security threats. According to this journal paper, there are few processes by which these type of problem occur such as abuse of cloud services, lack of responsibility, insufficient security tools and due to lack of security. In future researcher will describe the prevention methods and steps to reduce the problem of hacking and breaching (Rao, 2016).
APPLICATION SECURITY 2 Recommendation It is recommended that cloud computing is very popular technology which is used by many organization to maintain their data. Data breach is a very serious problem for cloud computing and it is estimated that around 1.2 million people lost their personal data or information in the year 2017. There are few steps provided by the information technology to address this type of issue, for example, use of firewall and antivirus software’s, people should protect their data by using authentic networks, organizations can adopt encryption method to reduce hacking issues and reduce the use of authentic servers and applications. Consumers should ensure that they avoid spam or fraud emails and links because most the attackers send unwanted signals to users personal accounts.
APPLICATION SECURITY 3 References Hashizume, K., Rosado, D. G., Fernández-Medina, E., & Fernandez, E. B. (2013). An analysis of security issues for cloud computing.Journal of internet services and applications,4(1), 5. Rao, B. T. (2016). A study on data storage security issues in cloud computing.Procedia Computer Science,92, 128-135. Suryateja, P. S. (2016). A Comparative Analysis of Cloud Simulators.International Journal of Modern Education & Computer Science,8(4), 4-5. Suryateja, P. S. (2018). Threats and Vulnerabilities of Cloud Computing: A Review.International Journal of Computer Sciences and Engineering,6(3), 297- 302.