This website uses cookies to ensure you have the best experience. Learn more

Security In The Cloud Essay

1724 words - 7 pages

Rahul Shah
Paper #1
Digital Hardware Basics
Security in the cloud

Hackers have gotten there way into every technological gadget out there. Something simple as browsing the web can give hackers information about the people’s data. Before Cloud computing, hackers were stealing data from the physical hard drive by implementing a virus that would open a back door and send the data straight to the hacker’s server. As security measure Enterprises, small businesses and the normal consumers have started to store data on the cloud. However, what the user or business fails to understand is that the information on the cloud is just as vulnerable to be hacked as the physical information stored on the hard drive. As technology emerges, the cloud is uprising and users are resorting to it to store information, which needs to be properly implanted to prevent information from being stolen or lost.
The most important question is what is cloud computing, and why is it important for storing and securing data. According to an article in pc mag “cloud computing means storing and accessing data and programs over the internet instead of your computer’s hard drive” (Griffith 2013). For the data to be considered cloud the data must stored online and be synchronized with devices. For example , just take a look at what the Iphone does and how it correlates when it sync’s with I cloud . When that data such as pictures, music, and contacts is backed up it store the data not just on the local storage but also on the Cloud server so numerous apple products can access it. An misconception about the cloud is that it is storing data on something like office network ,which is clearly not the case because an office network has a server physical server that is accessed and the cloud is clearly an internet based storage that is synched with other devices.
Even though the cloud is Internet based storage for consumers, it is completely different in terms of businesses. Business profit money by storing there data on to the cloud and making the consumer pay for that data to be accessed. An good illustration of this would be Netflixs; they provide a wide range of movies that can be streamed on any device that the user may have at any given time over the internet. As everyone knows that the Netflixs employee’s are not doing this as an “ pro bono case”; they are simply storing movies on the cloud so that they can make a profit of some sort from the consumer. Another example that might come to mind might be the application Drop box and how users are lured to purchase space for storing there data on the company server. Drop box offers an cloud based server that gives people an option to store an extensive amount of data on there server and retreat at any given time through any device that can be connected to the internet.
Another important factor to consider when discussing cloud computing is understanding its advantages and disadvantages. One...

Find Another Essay On Security in The Cloud

the identification and analysis of information system in the business enterprise at each management level, the suitability of information system for the chosen firm, the security of the information...

3968 words - 16 pages Media has the maximum level of security at every level of management and in each of the information system they use. Employee and customer records must be kept secured so that no one can access it. Example: T-Mobile customers' private details were sold to a rival firm. So, in this case security of data is very important. (www.16) (Laudon, K. Pg. 434-442) CLOUD COMPUTING: Cloud computing is a general term for anything that

Store Your Data in the Cloud

1809 words - 8 pages cloud storage came out. Cloud storage works with a combination of an on-line backup or storage service and cloud computing for data management. All the information that received from user is located in the server which means some other people called as a data center. Data centers can be located anywhere in the world that depending on your storage provider. The provider responsible to take care the security and privacy of

Security in the Computer World

1434 words - 6 pages social networking websites opened more doors to information breach. According to a survey held by Global information security survey (GISS), 60% of enterprise found their level of increased risk due to use of social networking, cloud computing and personal devices in the enterprise which resulted in an increase of 46% in their annual investment of information security. Generally, attackers try to target small businesses for financial crimes. Small

Security in the Business Environment

1919 words - 8 pages Standards Organization (ISO) 17799:2000 and the IT Infrastructure Library (ITIL) Best Practice in Security Management. Introduction This service management function (SMF) provides information about security management for organizations that have deployed, or are considering deploying, Microsoft or other technologies in a data center or other enterprise-level computing environment. The guide assumes that the reader is familiar with the

Security in The Grand Inquisitor

1415 words - 6 pages Think back to your childhood. Was it one filled with happy memories? The majority of us can say yes to this question. Most of us grew up in a innocent, carefree world. Being free of adult responsibilities, we could play all day without having to deal with the issues of the adult world. Back then, we had the security of our parents. They were always there making our decisions for us. We were told when to go to bed, what to wear, and what to eat

cyber security in the millitary

1155 words - 5 pages . These 1100 people are ,in the words of General Keith Alexander( director of the united states cyber command) responsible for “directing the defense ensuring the operation of the Department of Defense’s information networks, and helping to ensure freedom of action for the United States military and its allies—and, when directed, for defending the nation against attacks in cyberspace”. There are trained personnel that handle the security of most

A Case Study on the cyber-attack in cloud computing

2545 words - 10 pages Cloud computing is predicted to be the future technology. This paradigm is considered to be offering infinite resources and comprehensive security, due to the application of modern techniques and highly skilled personnel employed. Despite of highly skilled manpower is looking after the cloud; cybercriminals have managed to attack cloud. This work undertakes the study of threats that exist in cloud computing, the type of industries on target of

Retrieving the Top-K Ranked Secure Sensor Data in Cloud

762 words - 4 pages - With the advent of cloud computing, publishers are motivated to store their complex data management systems from local sites to public cloud for greater flexibility and economic savings. But for protecting data privacy, and also to avoid information leakage, sensed data have to be encrypted before outsourcing onto the cloud servers. Considering the huge number of data users and documents in cloud, it is critical for the search service to

Social Security In The Future? Maybe Not

2275 words - 9 pages Social Security In the Future? Maybe Not      It was early spring in the year 2048 and my bithday was coming up this August 26. I would be turning 70 years and retirring. I am not looking forward to it as much as I thought. My whole life I dreamed of moving to Florida and living on the beach when I retired. I planned on traveling a lot seeing the great sites the country has to offer. All of these plans have changed

Terrorism: Changing Security in the United States

1216 words - 5 pages In the past few decades, there have been various terrorist attacks throughout the world. Most importantly, countless acts of terrorism have been committed in the United States of America, that have gradually influenced the way the American security system and security at public buildings, public places, are run. Because of this act of terror, the American government has made protecting its citizens and country a top priority. These attacks, and

Crisis in the Social Security Administration

2354 words - 9 pages As an advocate for the Social Security Administration (SSA), I would like to suggest the following proposal for your examination and potential action. The SSA, one of Americas leading organization that serves to the benefit of the public, is undergoing a series of crises. The agency functions through a top-down system of authority. Although, at first this may seem as the best method of running such a large entity, in reality it creates a

Similar Essays

Security Polices On The Cloud Essay

1041 words - 5 pages Security in the cloud is achieved, in part, through third party controls and assurance much like in traditional outsourcing arrangements. But since there is no common cloud computing security standard, there are additional challenges associated with this. Many cloud vendors implement their own proprietary standards and security technologies, and implement differing security models, which need to be evaluated on their own merits. In a vendor

Using Data Encryption For Security In Cloud Computing

2098 words - 8 pages remotely access their information from many different locations and they are saving money not having to invest in the servers. Security and privacy issues are a concern within cloud computing. The introduction of cloud computing has presented some security challenges that many consumers may question. There are a number of possible security issues or risks pertaining to how the data is stored and secured within cloud computing. This research paper

Ensuring Data Security Using Homomorphic Encryption In Cloud Computing

1302 words - 5 pages providing results of calculations on encrypted data without knowing the raw data on which the calculation was carried out, with respect of the data confidentiality. some important security services including authentication, encryption and decryption are provided in Cloud Computing system. REFERENCES: [1] Vic (J.R.) Winkler, “Securing the Cloud, Cloud Computer Security, Techniques and Tactics”, Elsevier, 2011. [2] Pascal Paillier. Public

Cloud Computing Virtualization – A Threat To Security Of The System

2040 words - 9 pages The main aim of this paper is to study the concept of cloud computing through virtualization, how security is compromised in cloud computing and how we can secure the system from security breach in case of virtualization. Keywords: cloud computing, Hypervisor, Virtual machine, Virtualization Security. 1. INTRODUCTION Cloud computing is a model for enabling convenient, on demand network access to a shared pool of configurable computing