-
Essay / Cloud - 662
Today, cloud is becoming a coexisting part of our daily lives as the need for easy access is essential for any individual or business. There are a variety of apps to choose from for storing information online, such as DropBox, iCloud, and Google Drive. We must, however, ask ourselves how safe are we when using these forms of online storage applications for our data? I would like to take an in-depth look at cloud computing, the types of clouds available, and some of the security issues associated with the cloud. It is in any entity's best interest to prepare for the unexpected when using the cloud and choose the right type of cloud to use. The most commonly popularized cloud types are public, private, and hybrid. Public cloud computing is administered and provided by external sources such as Amazon Simple Storage Service. Public cloud computing is billed on a pay-as-you-go basis and is easily scalable as more space is required. With the cloud's ability to employ services as they are used, it can just as easily remove them. There are many services that offer a specific amount of data space to users for free. However, for a company's employees, it is important to store confidential information when using a private cloud. Never place customer or financial information on the public cloud. Private cloud computing is typically managed and run by internal users in a company's on- or off-site data center. A private cloud keeps all information confidential according to the strict guidelines of an organization or company. The business must verify that the appropriate amount of resources are being used at all times so that the cloud is properly maintained. It is in turn that the resources will be kept in the middle of paper...... and precautions in data encryption so that passwords and authentication are taken seriously so as not to be stolen. Passwords and information can be recovered by interception. These forms include: loss of governance, network sniffing, SQL injections, and malicious code insertion. Insecurities can be found in deleting your data which may not be totally deleted after requesting this to be done through your cloud provider. However, by knowing your provider's terms, it helps to know that they can still offer you top-notch protection. Some ways to strengthen your own protection can be Works Cited http://www.unitiv.com/it-solutions-blog/bid/77277/6-Types-of-Cloud-Computing http://www.bu.edu/infosec/howtos /how-to-store-your-data-securely-in-the-cloud/JAMIL, D. and ZAKI, H. CLOUD COMPUTING SECURITY.http://www.enisa.europa.eu/activities/risk-management