logo

Ensuring Data Security in Cloud Computing Environments

   

Added on  2019-09-30

9 Pages2109 Words168 ViewsType: 168
 | 
 | 
 | 
Running Head: IT Security1Cloud Computing Security
Ensuring Data Security in Cloud Computing Environments_1

2IT SecurityTable of ContentsIntroduction..........................................................................................................................3Security Issues.....................................................................................................................3Security Techniques.............................................................................................................4Analysis...............................................................................................................................5Conclusion...........................................................................................................................7References............................................................................................................................8
Ensuring Data Security in Cloud Computing Environments_2

3IT SecurityIntroductionCloud Computing has become an integrated part of IT paradigms in this era of digitalization. Cloud Computing comprises a number of computers used for work jointly in orderto provide dissimilar task as well as computations. It helps the IT industry to reduce its costs as well as time in the market by providing computer resources and shared storage. Besides this, several security issues of cloud computing are significantly increasing. Data protection is the major issue all of them. The reason is, organizations do not share their confidential data to the system which is not guaranteed by the cloud providers in term of security and privacy. Giving protection to the data means protecting static and moving data, stored in the cloud. This report is made in order to analyze the previously mentioned paper on the topic ‘Security Techniques for Data Protection in Cloud Computing’.Security IssuesNow a day, cloud computing service has to face several attacks to weaken IT security system. Different external attacks are done on its network infrastructures by hackers for penetrating its network security system. DDoS attack is one of them that are commanded by hackers (Chang, Kuo & Ramachandran, 2016). IoT devices are infected by malicious malware that attacks on the public networks to send information to hackers or botnet who misuses them.Second security issue is known as a man in the middle attack. In this attack, malicious malware insert into the network and sets up a communication with two parties to access their information for sending to commander of this threat. This attack is done where security is not configured properly. Data protection issue is the most dangerous vulnerabilitywhich can bring the entity of the customers at risk. Most known security attack of cloud computing includes IP Spoofing, Phishing, IP ports, traffic analysis, and many more. There are several security techniques regarding data security which is accepted by cloud computing service (Villari, Fazio, Dustdar, Rana & Ranjan, 2016).
Ensuring Data Security in Cloud Computing Environments_3

End of preview

Want to access all the pages? Upload your documents or become a member.

Related Documents
Information and Systems Security
|7
|1270
|80

Network System Attacks Course 2022
|7
|1310
|21

Malicious Software Protection Policy
|6
|1728
|181

Security Issues in Cloud Computing
|17
|362
|262

Threats and Vulnerabilities of Cloud Computing: A Review
|4
|723
|381

IT Security: Types of Risks, Organizational Procedures, Impact of Firewall Configuration, Implementation of DMZ, Static IP and NAT
|18
|1181
|61