Security Threats in Cloud and Preventive Measures Analysis Report

Verified

Added on  2021/04/21

|5
|589
|55
Report
AI Summary
This report addresses the security threats associated with cloud computing. It begins by defining cloud computing and its various forms, then delves into the specific threats, including data breaches, system vulnerabilities, and account hijacking. The report also explores advanced persistent threats and the potential for data loss. The main focus is on the preventive measures that can be taken to secure the cloud environment, such as controlling access based on user context, implementing risk-based approaches, enhancing visibility, and selecting secure cloud vendors. The report emphasizes the use of industry standards, encryption, and authentication protocols, and recommends encrypting data before uploading it to the cloud. The report also includes references to relevant academic sources.
Document Page
Running head: SECURITY THREATS IN CLOUD AND PREVENTION
Security Threats in Cloud and Prevention
[Name of the Student]
[Name of the University]
[Author note]
tabler-icon-diamond-filled.svg

Paraphrase This Document

Need a fresh take? Get an instant paraphrase of this document with our AI Paraphraser
Document Page
1SECURITY THREATS IN CLOUDS IN PREVENTION
Abstarct:
Cloud computing is a form of IT or Information Technology paradigm which is associate with
enabling of ubiquitous access to shared pools of configurable systems resources. This can also be
considered as a higher level service which can be provisioned at a rapid rate my making use of
minimal management effort. In general term cloud computing is the process of delivering hosted
services over the internet. There are several forms of cloud computing. Along with benefits of
cloud computing there also exists certain risks associated with it.
Document Page
2SECURITY THREATS IN CLOUDS IN PREVENTION
Introduction:
Cloud computing refers to the hosting of various services over the internet and this might
include the software developing platform, server, storage and software.
Security threats:
Along with several benefits there also certain risks for cloud computing and this includes
the following:
Breach of data might occur due to many reasons like human errors, vulnerabilities of the
application and many more. Data breach might be the primary aim of an attacker.
Vulnerabilities of the system. This might occur by use of bugs which the attacker uses so
as to infiltrate the cloud computing environment and steal data or take control of the
system and many more things can be done as well (Hamlen et al., 2012).
Hijacking of the accounts. Once the credentials of the user is available to the attacker
they can make use of eavesdropping for various purposes.
Advanced persistent threats. This is a type of cyberattack that infiltrates the system so as
to establish a foothold over the infrastructure of information technology and from there
the attacker steals the data.
Loss of data might occur in cloud due to various reasons like natural hazards or due to
malicious activities by hackers.
Preventive measure in cloud:
Some of the major preventive measures that can be adopted so as to protect the cloud
environment includes the following:
Document Page
3SECURITY THREATS IN CLOUDS IN PREVENTION
Gaining the right knowledge about who is accessing what in the cloud environment.
Limitation of the access to the data according to the context of the user (Goel & Jain,
2014).
Adaptation of risk-based approach so as to secure the assets in the cloud.
Building of ability so as to see through the cloud.
Asking the cloud vendors about what type of security measures they are having and also
about the location of their physical cloud server.
Creating of usernames and passwords which are unique
Using of industry standards as well as encryption and authentication protocols.
Lastly encrypting the data before uploading it into the cloud.
tabler-icon-diamond-filled.svg

Paraphrase This Document

Need a fresh take? Get an instant paraphrase of this document with our AI Paraphraser
Document Page
4SECURITY THREATS IN CLOUDS IN PREVENTION
References:
Goel, L., & Jain, V. (2014, March). A Review on Security Issues and Challenges of Mobile
Cloud Computing and Preventive Measures. In International Conference on Advances in
Computer Engineering and Applications ICACEA (5) (pp. 22-27).
Hamlen, K., Kantarcioglu, M., Khan, L., & Thuraisingham, B. (2012). Security issues for cloud
computing. Optimizing information security and advancing privacy assurance: new
technologies: new technologies, 150.
chevron_up_icon
1 out of 5
circle_padding
hide_on_mobile
zoom_out_icon
[object Object]