Personal tools

Cloud Computing and Security

West Virginia State_111220A
[West Virginia - Forbes]


- Overview

Cloud computing security or, more simply, cloud security refers to a broad set of policies, technologies, applications, and controls utilized to protect virtualized IP, data, applications, services, and the associated infrastructure of cloud computing. Cloud security entails securing cloud environments against unauthorized use/access, distributed denial of service (DDOS) attacks, hackers, malware, and other risks. It is a sub-domain of computer security, network security, and, more broadly, information security.  

In recent years, many businesses have adopted cloud-based computing services that enable users to access software applications, data storage, and other services via an internet connection rather than relying on physical infrastructure. Embracing this technology comes with many benefits such as reduced operational costs and increased efficiency.  

Although opting for such systems can be highly beneficial to organizations, they have also become the target of cyberthreats. If these systems are not properly configured or maintained, attackers are more likely to be able to exploit vulnerabilities in the systems’ security and gain access to sensitive information.

Certainly many companies remain concerned about the security of cloud services, although breaches of security are rare. How secure you consider cloud computing to be will largely depend on how secure your existing systems are. In-house systems managed by a team with many other things to worry about are likely to be more leaky than systems monitored by a cloud provider's engineers dedicated to protecting that infrastructure.

  

[More to come ...]


Document Actions