logo

(PDF) An Analysis of the Cloud Computing Security Problem

   

Added on  2021-04-21

3 Pages809 Words75 Views
 | 
 | 
 | 
GTI ENTERPRISE SECURITY SOLUTIONINTRODUCTIONThe cloud computing has been in the center for data storage, this will offers so many benefits to the organization, but still, the benefits that can be offered by the cloud computing can easily be compromised by the failure to make sure that data is secured and the protection of the privacy of the users and data too especially when using the services ,[ CITATION Sub11 \l 1033 ].CLOUD BASED SYSTEM SECURITY FEATURESAccording [ CITATION Hwa09 \l 1033 ],When putting up a cloud based system, especially a system that is aimed at running and being used all over the world, it is therefore recommended tocheck the following security features and services in order to limit hacking and loss of data privacy.1.Top of the line perimeter firewall.Many of the firewalls are used to inspect the source and t5he destination of packets therefore making it more simple. More advanced firewalls have very stable packet inspection feature, this feature is used to check the packets file integrity which is for stability reasons before admitting or rejecting the packet.Some of the most common examples of the firewall is the Palo Alto Networks’ Perimeter firewall solution which in this case reviews the content of the packets of the file in order to check the file type from the source , destination and also its integrity. This is very important and crucial to any cloud based system in order to thwart the top most threats of the current generation.2.Intrusion detection systems with event LoggingIt is generally advised to have a means to track and record the attempts of intrusion to the cloud based system by unwanted users and hackers too. This is what is recommended by most IT security compliance standards such as PCI and HIPAA, the useof logging solutions are compulsory. Since GTI is aimed at operating world wide, the users therefore will be from all over the world, hence very important and crucial to
(PDF) An Analysis of the Cloud Computing Security Problem_1

End of preview

Want to access all the pages? Upload your documents or become a member.

Related Documents
Implementation of Different Firewall Technologies: Advantages and Disadvantages
|6
|2344
|50

Security in Computing and IT PDF
|3
|619
|13

Challenges and Approaches to Overcome Session Hijacking and Intrusion Detection Systems
|4
|603
|263

Issues with Wi-Fi technology within HSBC Bank
|18
|5079
|351

THE SECURITY OF NETWORK
|11
|1870
|16

Introduction to Network Forensics
|5
|968
|73