logo

Assignment | Threats Affecting Cloud Computing.

   

Added on  2022-10-04

4 Pages889 Words12 Views
Running head: THREATS AFFECTING CLOUD COMPUTING
Threats Affecting Cloud Computing
Name of the Student
Name of the University
Author Note

THREATS AFFECTING CLOUD COMPUTING1
1. Relevant Technologies and Applications of Preventive Methods
With the rapid growth and adoption of cloud computing, newer and newer application
services are being developed on a daily basis. This comes as a significant benefit for the large
businesses and enterprises that wish to meet their goals in a very quick and efficient manner
while also having to worry less about the resources required to do so. However, closely
associated with this are rising security threats to cloud computing (Islam, Manivannan &
Zeadally, 2016). To prevent the threats from compromising their cloud based services
organizations must resort to a range of approaches in strengthening the security. These
security threats can be data breaches, cloud abuse, insecure APIs, Threats from Malware,
Shared technology vulnerabilities and even data loss.
As remedies, selection trusted Cloud partner and a comprehensive encryption
mechanism can address data breach (Rao & Selvamani, 2015). To prevent cloud abuse,
authorized and validated registrations as well as network traffic analysis and monitoring of
credit card process can be exercised. To address issues of insecure API, security standards of
the cloud provider should be evaluated. For stopping malware attacks, companies must have
internet usage policies and cyber security awareness programs in place for the staff. Risks to
shared technology can be addressed by conducting audits of unauthorized changes and
scanning of vulnerabilities. Loss of data can be prevented by identifying partners for secure
backup that use SSL encryption.
2. Identification of Gaps in Literature
As means of safeguarding the various security management standards, numerous
security standards have been developed to tighten the security umbrella for cloud based
services. These can include Open Virtualization Format that is OVF, the ISO standards
ISO/IEC 27001/27002 as well as ITIL or Information Technology Infrastructure Library

End of preview

Want to access all the pages? Upload your documents or become a member.

Related Documents
Cloud Privacy and Security: Risks and Mitigation Strategies
|14
|4006
|102

Threats and Vulnerabilities of Cloud Computing: A Review
|4
|723
|381

Security Threats in Cloud Computing
|4
|668
|210

Report on Cyber Security Management
|17
|3861
|45

Security Threats in Cloud Computing and Preventive Methods
|3
|553
|330

Assignment on Information Security Cloud Computing
|8
|2070
|158