benefits of multiple deployment models.
Security Concerns Of Cloud Computing
What security concerns do the cloud service providers and clients need to take care of?
If we look closely, we can see quite a number of security concerns that we need to take care of while implementing or using the service of clouds.
Let’s discuss a few of them.
- The first security issue that we can think of is data breaches. In a multi-tenant cloud service, if the cloud service database is not designed properly, a single flaw in a single client’s application can give an attacker access to data of one or multiple clients. Encrypting data can be a solution, but if you lose the encryption key, you lose data. Again, keeping offline backups of data increase the possibility of data breaches.
- Secondly, we can think of the issue of data loss that the cloud service providers need to take care of. Data must be preserved from disasters like fire, flood, or earthquake.
- The next issue we can think of is account hijacking. If an attacker somehow hacks the account of the cloud service provider, he can eavesdrop on all the transactions, manipulate data, redirect the clients to illegitimate sites, and prepare for more attacks.
- Fourthly, there is the threat of insecure interfaces and APIs. Cloud service providers provide APIs and interfaces for using, managing, orchestrating, and monitoring cloud services. Weak interfaces and APIs can expose the threats of issues related to data confidentiality, integrity, availability, and accountability.
- The next threat is Denial of Service attacks. Cloud service providers bill their clients based on computing cycles and disk space consumed. An attacker, even if he may not be able to stop the services completely, he may consume much process cycles to affect the services to a significant extent.
- Cloud service providers also have to stay safe from malicious insiders. They have to monitor properly all its employees, contractors, or business partners who access the cloud, network, services, and data. A malicious insider or irresponsible access to data can lead to serious threats.
- The seventh issue is the abuse of clouds. A malicious user should not use the processing power of clouds for the purpose of breaking encryption keys or hacking a system. A cloud service provider needs to take care of the abuse of its clouds.
- Cloud service providers provide multiple clients with resources like CPUs, GPUs, and caches. A cloud must be designed to offer strong isolation properties. If an integral component gets compromised, it exposes the entire environment to the potential for compromise and breach.
So, if you are a cloud service provider or a user, it is always good to keep these concerns in mind.
Interested readers will get more information on what fog computing is and how it is different from cloud computing here: What is fog computing?
Security Fundamentals Practice Tests
The Security Fundamentals Practice Tests test one’s fundamental knowledge of cyber security. The practice tests are good for those who are preparing for various certification exams like the CCNA, CCNP, or CompTIA. They are also good for students and IT/security professionals who want to improve their understanding of cybersecurity.










































0 Comments