Cloud Computing Security: A Review of Threats and Vulnerabilities

Verified

Added on  2023/05/31

|4
|723
|381
Literature Review
AI Summary
This paper reviews the threats and vulnerabilities associated with cloud computing, highlighting its importance in managing large datasets and providing features like scalability and data security. It identifies three main service types: SaaS, PaaS, and IaaS. The paper emphasizes the critical need for data security, addressing threats such as data breaches, malware attacks, and denial-of-service attacks. Data breaches, often resulting from inadequate security measures, are a leading concern, with significant data losses reported. Malware attacks, commonly spread through fraudulent links, and DOS attacks, which overwhelm networks with traffic, also pose substantial risks. The paper suggests using security programs and addressing issues like abuse of cloud services and insufficient security tools to mitigate these threats. It recommends measures like firewalls, antivirus software, secure networks, encryption, and avoiding suspicious emails to enhance cloud security. Desklib provides this document and many other solved assignments for students.
Document Page
Application security
tabler-icon-diamond-filled.svg

Paraphrase This Document

Need a fresh take? Get an instant paraphrase of this document with our AI Paraphraser
Document Page
APPLICATION SECURITY
1
Threats and Vulnerabilities of Cloud Computing: A Review
The title of this journal paper is Threats and Vulnerabilities of Cloud Computing:
A Review that was written by the Pericherla Satya Suryateja in the year 2018. According
to author cloud computing is an advanced technology in the field of computer science
that provides a platform to control the large amount of data (Suryateja, 2018). It also
provides many features to their consumers, for example, scalability, and data security
and monitors a large amount of data at a time. The main purpose of this article is to
highlight the threats and vulnerabilities of cloud computing and steps to improve the
security of cloud technology. It is observed that there are mainly three types of services
provided by the cloud computing such as SaaS, PaaS, and IaaS. In this modern
generation, it is very important to secure the data of any user for which information
technology developed this technology but there are several threats occurs in a cloud-
like data breach, malware attack, denial of service attack and vulnerable system
(Hashizume, Rosado, Fernández-Medina, & Fernandez, 2013). Data breach is a very
common security issue in cloud computing which occur due to lack of security and in
which data of users may be lost. It is studied that this is one of the leading security
threat in the sector of the cloud. In the year 2017 around 1.4 billion data were lost due
to lack of security and it also affected around 143 million individual’s computer
networks. Malware attacks occur when any user clicks on unwanted or fraud links and
most the hackers send these types of links on emails. With the help of this attack, people
can lose their private data or information (Suryateja, 2016). DOS is also a very common
security threat for cloud computing and in which hacker produce a large number of
traffic signals and transfer to the networks of an organization. Use of security
programmes is very best practice or process to address the problem of data breach or
security threats. According to this journal paper, there are few processes by which these
type of problem occur such as abuse of cloud services, lack of responsibility, insufficient
security tools and due to lack of security. In future researcher will describe the
prevention methods and steps to reduce the problem of hacking and breaching (Rao,
2016).
Document Page
APPLICATION SECURITY
2
Recommendation
It is recommended that cloud computing is very popular technology which is
used by many organization to maintain their data. Data breach is a very serious problem
for cloud computing and it is estimated that around 1.2 million people lost their
personal data or information in the year 2017. There are few steps provided by the
information technology to address this type of issue, for example, use of firewall and
antivirus software’s, people should protect their data by using authentic networks,
organizations can adopt encryption method to reduce hacking issues and reduce the use
of authentic servers and applications. Consumers should ensure that they avoid spam or
fraud emails and links because most the attackers send unwanted signals to users
personal accounts.
Document Page
APPLICATION SECURITY
3
References
Hashizume, K., Rosado, D. G., Fernández-Medina, E., & Fernandez, E. B. (2013). An
analysis of security issues for cloud computing. Journal of internet services and
applications, 4(1), 5.
Rao, B. T. (2016). A study on data storage security issues in cloud computing. Procedia
Computer Science, 92, 128-135.
Suryateja, P. S. (2016). A Comparative Analysis of Cloud Simulators. International
Journal of Modern Education & Computer Science, 8(4), 4-5.
Suryateja, P. S. (2018). Threats and Vulnerabilities of Cloud Computing: A
Review. International Journal of Computer Sciences and Engineering, 6(3), 297-
302.
chevron_up_icon
1 out of 4
circle_padding
hide_on_mobile
zoom_out_icon
[object Object]