A Report on Security Threats and Effective Countermeasures in Cloud

Verified

Added on  2023/06/13

|4
|668
|210
Report
AI Summary
This report discusses the security threats in cloud computing, a technique used for providing IT services through web-based tools accessible via the internet. It highlights major security issues such as data breaches, malware attacks, account hacking, data loss, and cloud abuse. For each threat, effective countermeasures are discussed, including choosing reliable cloud service providers, implementing forced authorization in supply chain management, restricting credential sharing, promoting two-way authentication, utilizing powerful API security and SSL encryption, and carefully examining traffic networks. The report concludes that while cloud computing offers essential data storage and remote accessibility, understanding and mitigating these vulnerabilities is crucial for securing data in the cloud.
Document Page
Running head: SECURITY THREATS IN CLOUD COMPUTING
Security Threats in Cloud Computing
Name of the Student:
Name of the University:
Author note
tabler-icon-diamond-filled.svg

Paraphrase This Document

Need a fresh take? Get an instant paraphrase of this document with our AI Paraphraser
Document Page
1SECURITY THREATS IN CLOUD COMPUTING
Cloud Computing is a technique that is use to provide Information technology services with
the implementation of the web based tools that can be retrieved through the internet. It
involves the storage of the data in cloud rather than storing it in the local storage device or
hard disk. Moreover, the user can access the information remotely from any location. It
enables the users to store important data and application files on the remote server and also
ensures the easy accessibility of the data when the device would be connected to the internet.
The major security issues in the cloud computing includes the following and the
effective countermeasures are also discussed below:
Data breach
The offline storage of the data reduces the risk of loss of data but increases the
vulnerability of the exposure of the data. The private cryptographic key can be derived easily
by the virtual machine through accessing the side channel timing. Thus, to prevent the risk of
data breach suitable and reliable cloud service provider should be chosen.
Attack through malwares
The cloud computing technique is highly prone to the malware attacks as the
visibility is less and exposure is high. The cloud providers also don not necessarily provide
the details such as the procedure of granting access to data, software and other functionality
(Almorsy, Grundy & Müller, 2016). The solution for the attack via malwares includes forced
authorization in the supply chain management and the legal contracts should also include
human resource management.
Hacking of the Account/ Services
The attacks such as phishing, fraudulent activities and software exploitation are aimed
at stealing the credentials of the victim. This would enable them to gain access to the victim’s
Document Page
2SECURITY THREATS IN CLOUD COMPUTING
account illegally. Moreover, there may be chances that the information collected may be
leaked by the hackers or injection of malwares and viruses into the system (Islam,
Manivannan & Zeadally, 2016). The preventive counter measure includes restriction on the
sharing of credentials among the users and promotion of the two way authentication
technique.
Data loss
The loss of important data through alteration, deletion, storage of data on unreliable
medium poses serious threat to the cloud computing technique. It not only leads to the loss of
reputation of the organization but also leads to the loss of important data and eventually the
customers. It can be prevented through the utilization of powerful API security and SSL
encryption technique.
Abuse of Cloud
The cloud may encounter malicious attacks due to the lack of secured registration
process which implies that anyone who holds a credit card can register and utilize the cloud.
Authorization and validation of the details should be done. Moreover the traffic network
should be carefully examined.
Thus, with the above discussion it can be concluded that cloud computing is essential
for the storage of data in an organized manner. It also enables the users to access data
remotely from any location via internet connection. However, it is vulnerable to various types
of attacks but can be mitigated so as to prevent the attacks and secure the data in the cloud.
Document Page
3SECURITY THREATS IN CLOUD COMPUTING
References
Almorsy, M., Grundy, J., & Müller, I. (2016). An analysis of the cloud computing security
problem. arXiv preprint arXiv:1609.01107.
Islam, T., Manivannan, D., & Zeadally, S. (2016). A classification and characterization of
security threats in cloud computing. Int. J. Next-Gener. Comput, 7(1).
chevron_up_icon
1 out of 4
circle_padding
hide_on_mobile
zoom_out_icon
[object Object]