logo

Threats and Vulnerabilities of Cloud Computing: A Review

4 Pages723 Words381 Views
   

Added on  2023-05-31

About This Document

This article discusses the threats and vulnerabilities of cloud computing and provides steps to improve the security of cloud technology. It also recommends measures to address the issue of data breach and hacking.

Threats and Vulnerabilities of Cloud Computing: A Review

   Added on 2023-05-31

ShareRelated Documents
Application security
Threats and Vulnerabilities of Cloud Computing: A Review_1
APPLICATION SECURITY
1
Threats and Vulnerabilities of Cloud Computing: A Review
The title of this journal paper is Threats and Vulnerabilities of Cloud Computing:
A Review that was written by the Pericherla Satya Suryateja in the year 2018. According
to author cloud computing is an advanced technology in the field of computer science
that provides a platform to control the large amount of data (Suryateja, 2018). It also
provides many features to their consumers, for example, scalability, and data security
and monitors a large amount of data at a time. The main purpose of this article is to
highlight the threats and vulnerabilities of cloud computing and steps to improve the
security of cloud technology. It is observed that there are mainly three types of services
provided by the cloud computing such as SaaS, PaaS, and IaaS. In this modern
generation, it is very important to secure the data of any user for which information
technology developed this technology but there are several threats occurs in a cloud-
like data breach, malware attack, denial of service attack and vulnerable system
(Hashizume, Rosado, Fernández-Medina, & Fernandez, 2013). Data breach is a very
common security issue in cloud computing which occur due to lack of security and in
which data of users may be lost. It is studied that this is one of the leading security
threat in the sector of the cloud. In the year 2017 around 1.4 billion data were lost due
to lack of security and it also affected around 143 million individual’s computer
networks. Malware attacks occur when any user clicks on unwanted or fraud links and
most the hackers send these types of links on emails. With the help of this attack, people
can lose their private data or information (Suryateja, 2016). DOS is also a very common
security threat for cloud computing and in which hacker produce a large number of
traffic signals and transfer to the networks of an organization. Use of security
programmes is very best practice or process to address the problem of data breach or
security threats. According to this journal paper, there are few processes by which these
type of problem occur such as abuse of cloud services, lack of responsibility, insufficient
security tools and due to lack of security. In future researcher will describe the
prevention methods and steps to reduce the problem of hacking and breaching (Rao,
2016).
Threats and Vulnerabilities of Cloud Computing: A Review_2

End of preview

Want to access all the pages? Upload your documents or become a member.

Related Documents
Ransomware & Malware
|5
|581
|276

Cyber Security Assignment PDF
|9
|2867
|2114

Information Systems Security: IT Security Fundamentals, Vulnerabilities, and IBM Security Architecture
|5
|747
|57

Risks Associated with Cloud Computing Technology
|5
|851
|438

IoT Security: Risks and Mitigation Techniques
|10
|865
|302

Security Threats in Cloud Computing
|4
|668
|210