Evaluating Security Threats and Preventive Methods in Cloud

Verified

Added on  2023/06/13

|3
|514
|438
Report
AI Summary
This report examines the security threats associated with cloud computing and the preventive measures that can be implemented to mitigate these risks. It highlights the major security issues in cloud computing, such as vulnerabilities to hacker attacks due to its internet-based nature, and discusses challenges related to trust, compliance, governance, data protection, and privacy breaches. The report also explores various countermeasures, including the use of tools like QualysGuard and techniques like architecture security, data security, and methods to confront SQL and XSS injection attacks. References to relevant research papers and articles are included to provide a comprehensive overview of the topic. Desklib provides access to this and other solved assignments.
Document Page
[Date]
Information Security
Student details
email id:
tabler-icon-diamond-filled.svg

Paraphrase This Document

Need a fresh take? Get an instant paraphrase of this document with our AI Paraphraser
Document Page
Information Security P a g e | 1
Title: Security threats in cloud computing and preventive methods
Abstract
Security concerns have given an immerging and energetic area of research due to the numerous
security coercions that many societies have tackled at current. Analyzing and finding out these
concerns requires confirmation from user for cloud solicitations and services. So, here in this
research paper, it casts light over the threats related to cloud computing and its preventive
measures is highly focused on.
Problems with cloud computing
There are huge number of dangers tangled in cloud computing. In cloud computing, security is of
the major issue that has been tangled. Since, it is wholly based on internet, numerous drudge
bouts might take place which cannot be simply recoverable. Other problems includes trust,
compliance, governance, incident response, and data protection, copyright, and data portability
and privacy breaches. Regardless of such concerns, it has been magnificently used in IT industry
with many trustworthy customers (Zissis & Lekkas, 2012).
Counter measures
There are huge number of ways by which cloud computing can easily be expanded in the issues
related to securities. For an instance, QualysGuard is assembling of products which are
commonly used by more than 200 companies that helps to find out issues in networks. Despite of
all the mentioned issues, there are large number of techniques used to leverage the concerns
related to security such as architecture security, data security, Using Mirage Image Management
System, Using Client Based Privacy Manager, Transparent Cloud Protection, SQL and XSS
injection attacks, Confronting Abuse and Nefarious Use of Cloud Computing and Confronting
Account, Service & Traffic Hijacking (Ashktorab & Taghizadeh, 2012).
Document Page
Information Security P a g e | 2
References
Ashktorab, V & Taghizadeh, S. R. (2012). Security Threats and Countermeasures in Cloud
Computing. International Journal of Application or Innovation in Engineering &
Management, 1(2), 234-245.
Zissis, D., & Lekkas, D. (2012). Addressing cloud computing security issues. Future Generation
computer systems, 28(3), 583-592.
Bibliography
Armbrust, M., Fox, A., Griffith, R., Joseph, A. D., Katz, R., Konwinski, A. & Zaharia, M.
(2010). A view of cloud computing. Communications of the ACM, 53(4), 50-58.
Zhang, Q., Cheng, L., & Boutaba, R. (2010). Cloud computing: state-of-the-art and research
challenges. Journal of internet services and applications, 1(1), 7-18.
Mell, P., & Grance, T. (2010). The NIST definition of cloud computing. Communications of the
ACM, 53(6), 50.
chevron_up_icon
1 out of 3
circle_padding
hide_on_mobile
zoom_out_icon
[object Object]