Chuyển đến nội dung chính

What is Cloud computing security?

Cloud computing security is the set of control-based technologies and policies designed to adhere to regulatory compliance rules and protect information, data applications and infrastructure associated with cloud computing use.



Cloud computing security or, more simply, cloud security is an evolving sub-domain of computer security, network security, and, more broadly, information security. It refers to a broad set of policies, technologies, and controls deployed to protect data, applications, and the associated infrastructure of cloud computing.

SECURITY ISSUES ASSOCIATED WITH THE CLOUD
Cloud computing and storage solutions provide users and enterprises with various capabilities to store and process their data in third-party data centers. Organizations use the Cloud in a variety of different service models (SaaS, PaaS, and IaaS) and deployment models (Private, Public, Hybrid, and Community). There are a number of security concerns associated with cloud computing. These issues fall into two broad categories: security issues faced by cloud providers (organizations providing software-, platform-, or infrastructure-as-a-service via the cloud) and security issues faced by their customers (companies or organizations who host applications or store data on the cloud). The responsibility is shared, however. The provider must ensure that their infrastructure is secure and that their clients’ data and applications are protected, while the user must take measures to fortify their application and use strong passwords and authentication measures.

When an organization elects to store data or host applications on the public cloud, it loses its ability to have physical access to the servers hosting its information. As a result, potentially sensitive data is at risk from insider attacks. According to a recent Cloud Security Alliance Report, insider attacks are the sixth biggest threat in cloud computing. Therefore, Cloud Service providers must ensure that thorough background checks are conducted for employees who have physical access to the servers in the data center. Additionally, data centers must be frequently monitored for suspicious activity.

In order to conserve resources, cut costs, and maintain efficiency, Cloud Service Providers often store more than one customer's data on the same server. As a result, there is a chance that one user's private data can be viewed by other users (possibly even competitors). To handle such sensitive situations, cloud service providers should ensure proper data isolation and logical storage segregation.

The extensive use of virtualization in implementing cloud infrastructure brings unique security concerns for customers or tenants of a public cloud service. Virtualization alters the relationship between the OS and underlying hardware - be it computing, storage or even networking. This introduces an additional layer - virtualization - that itself must be properly configured, managed and secured. Specific concerns include the potential to compromise the virtualization software, or "hypervisor". While these concerns are largely theoretical, they do exist. For example, a breach in the administrator workstation with the management software of the virtualization software can cause the whole datacenter to go down or be reconfigured to an attacker's liking.

CLOUD SECURITY CONTROLS
Cloud security architecture is effective only if the correct defensive implementations are in place. An efficient cloud security architecture should recognize the issues that will arise with security management. The security management addresses these issues with security controls. These controls are put in place to safeguard any weaknesses in the system and reduce the effect of an attack. While there are many types of controls behind a cloud security architecture, they can usually be found in one of the following categories:

Deterrent controls
These controls are intended to reduce attacks on a cloud system. Much like a warning sign on a fence or a property, deterrent controls typically reduce the threat level by informing potential attackers that there will be adverse consequences for them if they proceed. (Some consider them a subset of preventive controls.)

Preventive controls
Preventive controls strengthen the system against incidents, generally by reducing if not actually eliminating vulnerabilities. Strong authentication of cloud users, for instance, makes it less likely that unauthorized users can access cloud systems, and more likely that cloud users are positively identified.

Detective controls
Detective controls are intended to detect and react appropriately to any incidents that occur. In the event of an attack, a detective control will signal the preventative or corrective controls to address the issue. System and network security monitoring, including intrusion detection and prevention arrangements, are typically employed to detect attacks on cloud systems and the supporting communications infrastructure.

Corrective controls
Corrective controls reduce the consequences of an incident, normally by limiting the damage. They come into effect during or after an incident. Restoring system backups in order to rebuild a compromised system is an example of a corrective control.

DIMENSIONS OF CLOUD SECURITY
It is generally recommended that information security controls be selected and implemented according and in proportion to the risks, typically by assessing the threats, vulnerabilities and impacts. Cloud security concerns can be grouped in various ways; Gartner named seven[9] while the Cloud Security Alliance identified fourteen areas of concern. Cloud Application Security Brokers (CASB) are used to add additional security to cloud services.

SECURITY AND PRIVACY
Identity management 
Every enterprise will have its own identity management system to control access to information and computing resources. Cloud providers either integrate the customer’s identity management system into their own infrastructure, using federation or SSO technology, or a biometric-based identification system,[1] or provide an identity management solution of their own. CloudID, for instance, provides a privacy-preserving cloud-based and cross-enterprise biometric identification solutions for this problem. It links the confidential information of the users to their biometrics and stores it in an encrypted fashion. Making use of a searchable encryption technique, biometric identification is performed in encrypted domain to make sure that the cloud provider or potential attackers do not gain access to any sensitive data or even the contents of the individual queries.

Physical security 
Cloud service providers physically secure the IT hardware (servers, routers, cables etc.) against unauthorized access, interference, theft, fires, floods etc. and ensure that essential supplies (such as electricity) are sufficiently robust to minimize the possibility of disruption. This is normally achieved by serving cloud applications from 'world-class' (i.e. professionally specified, designed, constructed, managed, monitored and maintained) data centers.

Personnel security 
Various information security concerns relating to the IT and other professionals associated with cloud services are typically handled through pre-, para- and post-employment activities such as security screening potential recruits, security awareness and training programs, proactive.

Privacy 
Providers ensure that all critical data (credit card numbers, for example) are masked or encrypted and that only authorized users have access to data in its entirety. Moreover, digital identities and credentials must be protected as should any data that the provider collects or produces about customer activity in the cloud.

DATA SECURITY
There are a number of security threats associated with cloud data services, not only covering traditional security threats, e.g., network eavesdropping, illegal invasion, and denial of service attacks, but also including specific cloud computing threats, e.g., side channel attacks, virtualization vulnerabilities, and abuse of cloud services. To throttle the threats the following security requirements are to be met in a cloud data service.

Data Confidentiality
Data confidentiality is the property that data contents are not made available or disclosed to illegal users. Outsourced data is stored in a cloud and out of the owners' direct control. Only authorized users can access the sensitive data while others, including CSPs, should not gain any information of the data. Meanwhile, data owners expect to fully utilize cloud data services, e.g., data search, data computation, and data sharing, without the leakage of the data contents to CSPs or other adversaries.

Data Access Controllability
Access controllability means that a data owner can perform the selective restriction of access to his data outsourced to cloud. Legal users can be authorized by the owner to access the data, while others can not access it without permissions. Further, it is desirable to enforce fine-grained access control to the outsourced data, i.e., different users should be granted different access privileges with regard to different data pieces. The access authorization must be controlled only by the owner in untrusted cloud environments.

Data Integrity
Data integrity demands maintaining and assuring the accuracy and completeness of data. A data owner always expects that his data in a cloud can be stored correctly and trustworthily. It means that the data should not be illegally tampered, improperly modified, deliberately deleted, or maliciously fabricated. If any undesirable operations corrupt or delete the data, the owner should be able to detect the corruption or loss. Further, when a portion of the outsourced data is corrupted or lost, it can still be retrieved by the data users.

Tự Học tiếng Anh Giao Tiếp

Tự Học tiếng Anh Giao Tiếp
Những video tự học tiếng Anh giao tiếp đơn giản dễ thuộc

Bài đăng phổ biến từ blog này

Cách hôn một chàng trai lần đầu tiên trong đời

Bạn đã tìm được chàng trai hoàn hảo để hôn, điều quan trọng là bạn biết phải làm gì và như thế nào. Hôn giỏi thực sự quan trọng, nhưng rất may là điều này lại dễ dàng nếu bạn có những thói quen tốt. Chỉ cần làm theo những bước đơn giản này và bạn sẽ trở thành chuyên gia ngay lập tức!   1- TRƯỚC KHI HÔN 1- Hãy đảm bảo hơi thở của bạn thơm mát. Hơi thở thơm mát quan trọng khi hôn bởi bạn muốn đưa ra càng nhiều lý do càng tốt để chàng trai tiếp tục hôn bạn. Hãy dùng kẹo cao su hoặc kẹo bạc hà và luôn luôn đánh răng trước khi gặp chàng. Hãy nhớ, hôi miệng không phải là tận cùng thế giới nhưng hãy tránh nó nếu bạn có thể. Đừng ăn đồ ăn nặng mùi, đồ cay, hoặc đồ có vị tỏi trước khi gặp chàng. Nhắc lại, nếu bạn không thể tránh được chúng thì cũng không phải là vấn đề quá to tát, nhưng tốt hơn là nên tránh tất cả cùng một lúc. 2- Đảm bảo bạn chọn bộ cánh đẹp nhất. Bạn không thể luôn luôn lên kế hoạch sẽ hôn một chàng trai ở đâu và khi nào, nhưng bạn có thể cố gắng chuẩ...

Tác hại của việc cho trẻ học tiếng Anh sớm và những điều cha mẹ cần lưu ý

Ngôn ngữ không chỉ là công cụ giao tiếp mà còn đóng vai trò quan trọng trong việc hình thành tư duy, sáng tạo và thể hiện bản thân của trẻ. Tuy nhiên, việc cho trẻ học tiếng Anh quá sớm, nếu không được thực hiện đúng cách, có thể mang lại nhiều tác hại hơn là lợi ích. Bài viết này sẽ phân tích những tác động tiêu cực của việc học tiếng Anh sớm và đưa ra những gợi ý để cha mẹ hỗ trợ trẻ phát triển ngôn ngữ một cách cân bằng và hiệu quả. Tác hại của việc học tiếng Anh sớm 1. Cản trở sự phát triển tiếng mẹ đẻ Tiếng mẹ đẻ là nền tảng để trẻ phát triển tư duy và giao tiếp. Khi trẻ học tiếng Anh quá sớm, đặc biệt từ những nguồn không chuẩn (như tài liệu không được thiết kế phù hợp hoặc giáo viên không phải người bản ngữ), khả năng sử dụng tiếng Việt có thể bị ảnh hưởng. Trẻ phải phân bổ thời gian và năng lượng cho cả hai ngôn ngữ, dẫn đến việc giảm thời gian khám phá, vui chơi và phát triển tiếng mẹ đẻ. Điều này có thể khiến trẻ chậm phát triển từ vựng, ngữ pháp và cấu trúc câu trong tiếng V...

Apple's $275 billion secret deal

Apple CEO Tim Cook is said to have signed a $275 billion deal with China to operate without a hit. CEO Apple Tim Cook. Photo: Guardian According to The Information,Apple signed a 1,250-word memorandum of engagement in 2016 with China's National Development and Reform Commission. The five-year deal, in which Apple agreed to assist China in creating advanced manufacturing technologies, using a variety of components from suppliers in the country, prioritized contracting with local software companies, and invested directly in Chinese technology companies. Apple has also embarked on research with universities and trained skilled human resources for the country. In addition, it has promised billions of dollars to build R&D facilities, open more retail stores and implement renewable energy projects. Based on the documents obtained, The Information estimates Apple's deals are worth about $275 billion over about 10 years. If the two sides do not object, the agreement will automatica...

7 ưu điểm khi học tiếng Anh bằng AI so với cách học truyền thống

Trong thời đại công nghệ 4.0, trí tuệ nhân tạo (AI) đã và đang cách mạng hóa nhiều lĩnh vực, bao gồm cả giáo dục. Đặc biệt, việc học tiếng Anh bằng AI mang lại nhiều ưu điểm vượt trội so với phương pháp học truyền thống, từ tính cá nhân hóa, sự linh hoạt, đến hiệu quả học tập và chi phí.  Bài viết này sẽ phân tích chi tiết 7 ưu điểm nổi bật của việc sử dụng AI trong học tiếng Anh, đồng thời so sánh với các hạn chế của phương pháp truyền thống để làm rõ sự khác biệt.   1. Cá nhân hóa lộ trình học tập Một trong những ưu điểm lớn nhất của việc học tiếng Anh bằng AI là khả năng cá nhân hóa. Các nền tảng AI sử dụng thuật toán phân tích dữ liệu để đánh giá trình độ, thói quen học tập, và điểm yếu của từng người học. Dựa trên thông tin này, AI thiết kế lộ trình học tập phù hợp, tập trung vào những kỹ năng mà người học cần cải thiện nhất. Ví dụ, nếu bạn yếu về phát âm, AI sẽ ưu tiên các bài tập luyện phát âm hoặc hội thoại. Trong khi đó, phương pháp học truyền thống thường áp dụng một...

Awesome Chevy Impala

Awesome Chevy Impala photos collection, Amazing Chevrolet Impala 1965 Chevy Impala 1965 Chevy Impala 1966 Chevrolet Impala 396 325HP Sport Coupe 1966 Chevrolet Impala SS 1967 Chevy Impala 1967 Chevy Impala SS 1967 Chevrolet Impala 1968 Chevrolet Impala Fastback 1968 Impala Super Sport Fastback 327 1968 SS Chevy Impala 1969 Chevrolet Impala 1969 Chevrolet Impala SS 1970 Chevy Impala 4 door sedan 1970 Chevrolet Impala 454 Coupe The Chevrolet Impala is a full-size car built by Chevrolet for model years 1958 to 1985, 1994 to 1996, and 2000 to present. The Chevrolet Impala derived its name from the African antelope of the same name. The Impala was Chevrolet's most expensive passenger model through 1965, and had become the best-selling automobile in the United States.

The Evolution and History of the Muscle Car

1964 Pontiac GTO The muscle car is one of the most significant innovations ever created by American vehicle manufacturers. Throughout their over 70-year history, starting in the late 1940s and continuing into today, these cars have cemented their place as a central piece of American culture. While most car enthusiasts view the 1960s and 1970s as the muscle car glory days, these vehicles pushed through challenges and manufacturers continue producing exceptional models in the present day. If you love cars and driving, you'll want to learn more about the most famous muscle cars, their origins and their rich history. You may also be interested in finding out answers to common questions about them. Origins of the Muscle Car The first American muscle car debuted in 1949, with Oldsmobile offering the Rocket 88. This car featured a lightweight body built from the Oldsmobile 76 and a high-compression overhead valve V8. This combination of a roaring engine and a light body made the vehicle t...