Chuyển đến nội dung chính

What is Cloud computing security?

Cloud computing security is the set of control-based technologies and policies designed to adhere to regulatory compliance rules and protect information, data applications and infrastructure associated with cloud computing use.



Cloud computing security or, more simply, cloud security is an evolving sub-domain of computer security, network security, and, more broadly, information security. It refers to a broad set of policies, technologies, and controls deployed to protect data, applications, and the associated infrastructure of cloud computing.

SECURITY ISSUES ASSOCIATED WITH THE CLOUD
Cloud computing and storage solutions provide users and enterprises with various capabilities to store and process their data in third-party data centers. Organizations use the Cloud in a variety of different service models (SaaS, PaaS, and IaaS) and deployment models (Private, Public, Hybrid, and Community). There are a number of security concerns associated with cloud computing. These issues fall into two broad categories: security issues faced by cloud providers (organizations providing software-, platform-, or infrastructure-as-a-service via the cloud) and security issues faced by their customers (companies or organizations who host applications or store data on the cloud). The responsibility is shared, however. The provider must ensure that their infrastructure is secure and that their clients’ data and applications are protected, while the user must take measures to fortify their application and use strong passwords and authentication measures.

When an organization elects to store data or host applications on the public cloud, it loses its ability to have physical access to the servers hosting its information. As a result, potentially sensitive data is at risk from insider attacks. According to a recent Cloud Security Alliance Report, insider attacks are the sixth biggest threat in cloud computing. Therefore, Cloud Service providers must ensure that thorough background checks are conducted for employees who have physical access to the servers in the data center. Additionally, data centers must be frequently monitored for suspicious activity.

In order to conserve resources, cut costs, and maintain efficiency, Cloud Service Providers often store more than one customer's data on the same server. As a result, there is a chance that one user's private data can be viewed by other users (possibly even competitors). To handle such sensitive situations, cloud service providers should ensure proper data isolation and logical storage segregation.

The extensive use of virtualization in implementing cloud infrastructure brings unique security concerns for customers or tenants of a public cloud service. Virtualization alters the relationship between the OS and underlying hardware - be it computing, storage or even networking. This introduces an additional layer - virtualization - that itself must be properly configured, managed and secured. Specific concerns include the potential to compromise the virtualization software, or "hypervisor". While these concerns are largely theoretical, they do exist. For example, a breach in the administrator workstation with the management software of the virtualization software can cause the whole datacenter to go down or be reconfigured to an attacker's liking.

CLOUD SECURITY CONTROLS
Cloud security architecture is effective only if the correct defensive implementations are in place. An efficient cloud security architecture should recognize the issues that will arise with security management. The security management addresses these issues with security controls. These controls are put in place to safeguard any weaknesses in the system and reduce the effect of an attack. While there are many types of controls behind a cloud security architecture, they can usually be found in one of the following categories:

Deterrent controls
These controls are intended to reduce attacks on a cloud system. Much like a warning sign on a fence or a property, deterrent controls typically reduce the threat level by informing potential attackers that there will be adverse consequences for them if they proceed. (Some consider them a subset of preventive controls.)

Preventive controls
Preventive controls strengthen the system against incidents, generally by reducing if not actually eliminating vulnerabilities. Strong authentication of cloud users, for instance, makes it less likely that unauthorized users can access cloud systems, and more likely that cloud users are positively identified.

Detective controls
Detective controls are intended to detect and react appropriately to any incidents that occur. In the event of an attack, a detective control will signal the preventative or corrective controls to address the issue. System and network security monitoring, including intrusion detection and prevention arrangements, are typically employed to detect attacks on cloud systems and the supporting communications infrastructure.

Corrective controls
Corrective controls reduce the consequences of an incident, normally by limiting the damage. They come into effect during or after an incident. Restoring system backups in order to rebuild a compromised system is an example of a corrective control.

DIMENSIONS OF CLOUD SECURITY
It is generally recommended that information security controls be selected and implemented according and in proportion to the risks, typically by assessing the threats, vulnerabilities and impacts. Cloud security concerns can be grouped in various ways; Gartner named seven[9] while the Cloud Security Alliance identified fourteen areas of concern. Cloud Application Security Brokers (CASB) are used to add additional security to cloud services.

SECURITY AND PRIVACY
Identity management 
Every enterprise will have its own identity management system to control access to information and computing resources. Cloud providers either integrate the customer’s identity management system into their own infrastructure, using federation or SSO technology, or a biometric-based identification system,[1] or provide an identity management solution of their own. CloudID, for instance, provides a privacy-preserving cloud-based and cross-enterprise biometric identification solutions for this problem. It links the confidential information of the users to their biometrics and stores it in an encrypted fashion. Making use of a searchable encryption technique, biometric identification is performed in encrypted domain to make sure that the cloud provider or potential attackers do not gain access to any sensitive data or even the contents of the individual queries.

Physical security 
Cloud service providers physically secure the IT hardware (servers, routers, cables etc.) against unauthorized access, interference, theft, fires, floods etc. and ensure that essential supplies (such as electricity) are sufficiently robust to minimize the possibility of disruption. This is normally achieved by serving cloud applications from 'world-class' (i.e. professionally specified, designed, constructed, managed, monitored and maintained) data centers.

Personnel security 
Various information security concerns relating to the IT and other professionals associated with cloud services are typically handled through pre-, para- and post-employment activities such as security screening potential recruits, security awareness and training programs, proactive.

Privacy 
Providers ensure that all critical data (credit card numbers, for example) are masked or encrypted and that only authorized users have access to data in its entirety. Moreover, digital identities and credentials must be protected as should any data that the provider collects or produces about customer activity in the cloud.

DATA SECURITY
There are a number of security threats associated with cloud data services, not only covering traditional security threats, e.g., network eavesdropping, illegal invasion, and denial of service attacks, but also including specific cloud computing threats, e.g., side channel attacks, virtualization vulnerabilities, and abuse of cloud services. To throttle the threats the following security requirements are to be met in a cloud data service.

Data Confidentiality
Data confidentiality is the property that data contents are not made available or disclosed to illegal users. Outsourced data is stored in a cloud and out of the owners' direct control. Only authorized users can access the sensitive data while others, including CSPs, should not gain any information of the data. Meanwhile, data owners expect to fully utilize cloud data services, e.g., data search, data computation, and data sharing, without the leakage of the data contents to CSPs or other adversaries.

Data Access Controllability
Access controllability means that a data owner can perform the selective restriction of access to his data outsourced to cloud. Legal users can be authorized by the owner to access the data, while others can not access it without permissions. Further, it is desirable to enforce fine-grained access control to the outsourced data, i.e., different users should be granted different access privileges with regard to different data pieces. The access authorization must be controlled only by the owner in untrusted cloud environments.

Data Integrity
Data integrity demands maintaining and assuring the accuracy and completeness of data. A data owner always expects that his data in a cloud can be stored correctly and trustworthily. It means that the data should not be illegally tampered, improperly modified, deliberately deleted, or maliciously fabricated. If any undesirable operations corrupt or delete the data, the owner should be able to detect the corruption or loss. Further, when a portion of the outsourced data is corrupted or lost, it can still be retrieved by the data users.

Tự Học tiếng Anh Giao Tiếp

Tự Học tiếng Anh Giao Tiếp
Những video tự học tiếng Anh giao tiếp đơn giản dễ thuộc

Bài đăng phổ biến từ blog này

1967 Pontiac GTO

  The Pontiac GTO is an American muscle car that was built by Pontiac in generations from 1964 to 1974 model years, and by GM's subsidiary Holden in Australia from 2004 to 2006. 1967 Pontiac GTO 1969 Pontiac GTO the "Judge" The first three generations of the Pontiac GTO was a muscle car of the 1960s and 1970s era.The Pontiac GTO was known as the judge of all muscle cars. the Pontiac GTO is considered by some to have started the trend with all four domestic automakers offering a variety of competing models. 1970 Pontiac GTO "Judge" For the 1964 and 1965 model years, the GTO was an optional package on the intermediate-sized Pontiac Tempest. The GTO became its own model from 1966 to 1971. It became an option package again for the 1972 and 1973 intermediate Le Mans. For 1974, the GTO option package was offered on the compact-sized Ventura. 1971 Pontiac GTO The GTO was selected Motor Trend Car of the Year in 1968.It was the only muscle car in the world which containe...

Cách đơn giản loại bỏ rỉ sét bằng điện phân

Điện phân là một cách đơn giản và hiệu quả để loại bỏ rỉ sét và phục hồi kim loại mà không làm hỏng bề mặt như chà nhám hoặc đánh bằng chổi cước thép. Điện phân hoạt động tốt nhất trên sắt và thép. Không nên điện phân trên thép không gỉ, vì nó có thể giải phóng khí crom độc hại. Điện phân hoạt động như thế nào Điện phân xảy ra khi một dòng điện trực tiếp, điện áp thấp (DC) được truyền qua hai mảnh kim loại lơ lửng trong dung dịch hóa học (chất điện phân). Dòng điện gây ra sự truyền ion giữa hai mảnh kim loại, phá vỡ rỉ sét trên kim loại nối với điện cực âm (cực âm) trong khi ăn mòn kim loại nối với điện cực dương (cực dương). Vì điện phân không ảnh hưởng đến kim loại bên dưới, nó hoàn hảo để làm sạch các công cụ, khôi phục đồ cổ và nới lỏng các bu lông bị rỉ sét. Vật liệu cần thiết cho điện phân Điện phân nên được thực hiện trong một khu vực có nhiều thông gió, vì nó giải phóng một lượng nhỏ khí hydro và oxy, có thể dễ cháy nếu chúng tích tụ. Để loại bỏ rỉ sét bằng điện phân, bạn sẽ cầ...

1968 Dodge Charger

  1968 Dodge Charger - Awesome American Muscle Car 1968 Dodge Charger R/T  The Dodge Charger is a brand of automobiles marketed by Dodge. The first Charger was a show car in 1964. There have been several different production Chargers, built on three different platforms and sizes. In the U.S., the Charger nameplate has been used on subcompact hatchbacks, full-sized sedans, and personal luxury coupes. The current version is a four-door sedan.

Đồ chiên nướng cháy có thể làm tăng nguy cơ đau tim và đột quỵ lên 60%

Các nhà khoa học đang cảnh báo mọi người về một hóa chất được tạo ra khi nấu một số loại thực phẩm phổ biến của gia đình. Họ nói rằng nó có thể làm tăng nguy cơ đau tim và đột quỵ lên 60%. Được gọi là Acrylamide, nó được sản xuất khi các loại thực phẩm như khoai tây, bánh mì và cà phê được đun nóng. Nó phổ biến trong carbohydrate bị cháy và gây ra bởi phản ứng giữa nhiệt và đường tự nhiên dẫn đến chuyển sang màu nâu.   Tác dụng của Acrylamide Acrylamide được tìm thấy trong các bữa ăn được sản xuất thông qua nấu ăn công nghiệp, bao gồm thực phẩm siêu chế biến. Trong nhiều năm, đã có những lo ngại rằng acrylamide có thể tạo ra các phản ứng trong cơ thể có khả năng dẫn đến ung thư. Tuy nhiên, một nhóm các nhà nghiên cứu Tây Ban Nha đã phát hiện ra một nguy cơ tiềm ẩn khác từ việc uống acrylamide: bệnh tim mạch. Nghiên cứu về acrylamide Các nhà nghiên cứu đã công bố những gì họ tìm thấy trên tạp chí Nutrients. Đối với nghiên cứu, họ đã kiểm tra hàng chục nghiên cứu kéo dài từ năm 2007 ...

The reason why Microsoft spent record money to buy Activision Blizzard

The acquisition of Activision Blizzard for $ 68.7 billion is considered to help Microsoft move deeper into the metaverse. Microsoft's acquisition of Activision Blizzard is today's biggest deal in the gaming segment. Photo: Reuters This is the largest merger in the technology sector, surpassing the event Dell bought EMC for $ 67 billion in 2016. The amount Microsoft spent also far exceeded the $ 26 billion it spent to buy the social network LinkedIn. According to Bloomberg, there are 5 reasons for the company to do this. Increase position in the game field If the transaction between Microsoft and Activision Blizzard is approved by regulators, the US software corporation will become the third-largest game company globally after China's Tencent and Japan's Sony. In fact, both companies also admitted that they want to "go home" to increase their position in the game field. "Activision cannot compete on its own in the new world of games," said Bobby Kotic...

Brain chip technology can transform the smartphone industry

Neuralink was founded by billionaire Elon Musk, a company specializing in neural technology based in San Francisco. The company is developing a brain-computer interface to treat neurological ailments like Alzheimer's, dementia and spinal cord injuries. Essentially, this is a network of tiny electrodes linked to the brain, allowing humans to communicate wirelessly with everything and everyone around them. Those inexplicable beliefs, fears, hopes, anxiety, and abstractions will become clear thanks to Neuralink's technology. In addition, it can allow humans to communicate with animals. Last year, the company started testing the Neuralink chip in Gertrude pigs. This may be considered unethical by many, but when it is scientifically understood and what it really means, the chip transplantation will be accepted as any groundbreaking discovery human has ever witnessed. . Of course, that doesn't deny the fact that putting a chip in an animal brain - and in the future, the human bra...

PUBLIC CLOUD vs PRIVATE CLOUD

The services cloud computing are distinguished primarily in Public Cloud, Private Cloud and a composite form, called Hybrid Cloud. What are the advantages and disadvantages related to each solution? What would be the most appropriate service for your company?  We start to see more in detail what are the available cloud types. Public cloud The public cloud is provided by an external provider that, through the Internet, makes available IT resources necessary to support the business of a company. It is a cloud infrastructure is shared by multiple users, in which the provider is also responsible for configuring and managing the service. Advantages: Lower costs One of the main benefits of the public cloud is very competitive costs, due to the elimination of the cost of purchasing and maintaining the IT infrastructure as well as the specialized personnel assigned to service management. Potentially unlimited scalability Resources are distributed "on demand", facilitating the cha...