logo

Security Threats in Cloud Computing and Preventive Methods

Select a topic for your research project and submit the title and an abstract, including key security challenges and reasons for selecting the topic.

7 Pages1380 Words340 Views
   

Added on  2023-06-12

About This Document

This article discusses the security threats of cloud computing, including unauthorized access by hackers and virus attacks. It also explores preventive methods such as data encryption, anti-virus, firewall, and network monitoring software solutions. The challenges of security threats and gaps in the literature are identified, and future research directions are suggested. The article concludes with the importance of developers being aware of potential security threats and ways to control them for providing quick, reliable, and secure services to customers.

Security Threats in Cloud Computing and Preventive Methods

Select a topic for your research project and submit the title and an abstract, including key security challenges and reasons for selecting the topic.

   Added on 2023-06-12

ShareRelated Documents
Running Head: INFORMATION SECURITY 1
Security Threats in Cloud Computing and Preventive Methods
Security Threats in Cloud Computing and Preventive Methods_1
INFORMATION SECURITY 2
Overview of the Involved Technology
Nowadays, cloud computing is used everywhere in this world for performing several business
related activities. It is considered as a quick and reliable approach to access the information from
the remote databases under a centralized approach. However, some security threats of the cloud
computing have become the major concerns of its users. Unauthorized access of information by
hackers and virus attacks are key security threats of cloud computing. Due to these security
issues, users are worried about the security and privacy of their information that is stored into the
online databases on a cloud network (Rouse, 2018). The main technique that is used by attackers
for violating the security of information is to spread harmful viruses into the system or platform
such as malware. This type of virus is injected into a system through an executable programming
script and it spreads itself into the whole network and system and try to access or damage the
stored information. Besides this, for accessing information from cloud platforms in an
unauthorized way, hackers try to steal the login credentials of another authorized users. By using
these credentials, they can easily login into the particular system and can access information
(Azure.microsoft.com, 2018).
Relevant Technologies and its Applications
To get appropriate outcomes from the cloud platform, its security issues must be resolved at the
prior basis. The main techniques or methods that can be used to get rid of the problem of security
threats of cloud computing are data encryption, use of advanced anti-virus, firewall and network
monitoring software solutions (Harris, 2018). Through encryption, information can be stored into
the database in the form of unknown format which is difficult to identify by the cyber-criminals.
Moreover, anti-virus and firewall solutions can be used to keep virus away from the cloud
network. These anti-virus must be installed properly into the system, otherwise proper scanning
Security Threats in Cloud Computing and Preventive Methods_2
INFORMATION SECURITY 3
and identification of the bugs will not be possible. An anti-virus can scan whole network and
system at a time and can provide list of infected areas that can be fixed immediately by the users.
Firewall also works in the similar way of antivirus. It blocks unknown entities to enter into the
system. Network monitoring software is required to use for the monitoring of whole network to
identify the unknown entities that can be vulnerable for it. Wireshark is one of network
monitoring solutions that is commonly used. These relevant technologies are already used at the
different workplaces where enormous amount of data is stored, retrieved and transferred through
the cloud platform. Most of the large business organizations use cloud platform to access huge
amount of information at quick basis from different online resources. In this case, security and
privacy maintenance of information is required. Therefore, here cloud security prevention
techniques are essential to use by cloud users. Otherwise, heavy violation of information can
occur.
Challenges of Security Threats of Cloud Computing
Security threats are always considered as a big challenge for IT developers and users. Cloud
users are also affected by the security concerns of information. There are some main challenges
of security and privacy of data at cloud platform. The first challenging factor is related to the
lack of control over the data location (Radford, 2018). Basically, sometimes it is difficult to
manage the tracking of data locations that are sending and receiving data frequently.
Furthermore, in case of shared infrastructure of cloud platform, level of data violation is
increasing. Besides this, in case of cloud computing, a user has control to manage its information
on the cloud platform. In this case, a privileged user does not care for the cloud service provider
and does not follow their instructions properly that are required to maintain the high level data
security and privacy (Cdnetworks.com, 2018).
Security Threats in Cloud Computing and Preventive Methods_3

End of preview

Want to access all the pages? Upload your documents or become a member.

Related Documents
Security threats in cloud computing and preventive methods
|9
|2288
|116

Security Problems and Risk Management of CobWeb
|7
|1108
|410

Risk Management Assignment - Cloud Services
|6
|1018
|119

Home Network Vulnerabilities
|5
|858
|297

Host and Application Security
|9
|1653
|308

ENGR8762 Computer Networks and Cybersecurity
|8
|1020
|164