Date:26/04/16
Using cloud-powered technologies means you need to provide your service provider with access to important business data. Meanwhile, being a public service opens up cloud service providers to security challenges on a routine basis. The ease in procuring and accessing cloud services can also give nefarious users the ability to scan, identify and exploit loopholes and vulnerabilities within a system.
For instance, in a multi-tenant cloud architecture where multiple users are hosted on the same server, a hacker might try to break into the data of other users hosted and stored on the same server. Thus, a number of security measures should be taken to ensure protection from such threats, while using cloud technologies.
Considering this, the Electronic Security Center of the Ministry of Communications and High Technologies, suggests that users should use complex passwords for accessing data stored in the "cloud" service accounts. According to experts, sensitive data shouldn’t be stored in "cloud". Usually frequently used files are stored there. For example, passwords for access to different accounts shouldn’t be kept in “cloud”.
It is recommended to use antivirus programs to make sure that files and operating systems of devises are protected from malwares. Users are also advised to become familiar with the terms of use and privacy policy before using cloud technologies. Cloud servers where data is stored should be audited with SSAE 16, SAS 70 SOC 2. The intrusion detection and prevention system of firewall should be activated to ensure protection against interferences. Besides that, provider of “cloud” services should regularly back up data stored in “cloud”. Otherwise, data can be erased irretrievably from a “cloud” server.
Note that cloud services are internet-based services that provide shared processing resources and data to computers and other devices on demand. It is a model for enabling ubiquitous, on-demand access to a shared pool of configurable computing resources (e.g., networks, servers, storage, applications and services), which can be rapidly provisioned and released with minimal management effort.
Cloud computing and storage solutions provide users and enterprises with various capabilities to store and process their data in third-party data centers. It relies on sharing of resources to achieve coherence and economy of scale, similar to a utility (like the electricity grid) over a network.
A cloud service can dynamically scale to meet the needs of its users, and because the service provider supplies the hardware and software necessary for the service, there’s no need for a company to provision or deploy its own resources or allocate IT staff to manage the service. Examples of cloud services include online data storage and backup solutions, Web-based e-mail services, hosted office suites and document collaboration services, database processing, managed technical support services and more.
How to protect data while using cloud technologies?
There is no doubt that businesses can reap huge benefits from cloud computing. However, with the many advantages, come some drawbacks as well. One of the main disadvantages of cloud computing is the transfer of data to third parties. Although cloud service providers implement the best security standards and industry certifications, storing data and important files on external service providers always opens up risks.Using cloud-powered technologies means you need to provide your service provider with access to important business data. Meanwhile, being a public service opens up cloud service providers to security challenges on a routine basis. The ease in procuring and accessing cloud services can also give nefarious users the ability to scan, identify and exploit loopholes and vulnerabilities within a system.
For instance, in a multi-tenant cloud architecture where multiple users are hosted on the same server, a hacker might try to break into the data of other users hosted and stored on the same server. Thus, a number of security measures should be taken to ensure protection from such threats, while using cloud technologies.
Considering this, the Electronic Security Center of the Ministry of Communications and High Technologies, suggests that users should use complex passwords for accessing data stored in the "cloud" service accounts. According to experts, sensitive data shouldn’t be stored in "cloud". Usually frequently used files are stored there. For example, passwords for access to different accounts shouldn’t be kept in “cloud”.
It is recommended to use antivirus programs to make sure that files and operating systems of devises are protected from malwares. Users are also advised to become familiar with the terms of use and privacy policy before using cloud technologies. Cloud servers where data is stored should be audited with SSAE 16, SAS 70 SOC 2. The intrusion detection and prevention system of firewall should be activated to ensure protection against interferences. Besides that, provider of “cloud” services should regularly back up data stored in “cloud”. Otherwise, data can be erased irretrievably from a “cloud” server.
Note that cloud services are internet-based services that provide shared processing resources and data to computers and other devices on demand. It is a model for enabling ubiquitous, on-demand access to a shared pool of configurable computing resources (e.g., networks, servers, storage, applications and services), which can be rapidly provisioned and released with minimal management effort.
Cloud computing and storage solutions provide users and enterprises with various capabilities to store and process their data in third-party data centers. It relies on sharing of resources to achieve coherence and economy of scale, similar to a utility (like the electricity grid) over a network.
A cloud service can dynamically scale to meet the needs of its users, and because the service provider supplies the hardware and software necessary for the service, there’s no need for a company to provision or deploy its own resources or allocate IT staff to manage the service. Examples of cloud services include online data storage and backup solutions, Web-based e-mail services, hosted office suites and document collaboration services, database processing, managed technical support services and more.
Views: 434
©ictnews.az. All rights reserved.Similar news
- Cellphone Use May Raise Cancer Risk
- Australian police pushes cyber safety education
- Vietnam aims to lead in e-government
- Senate Website Gets Hacked
- US builds net for cyber war games
- Japan enacts anti-computer virus law
- India passes law vs e-waste
- Anonymous Declares War On The City Of Orlando
- Microsoft highlights evolving dangers as online identity data proliferates
- Consumers want internet security to be provided by banks
- Government facilities targets of cyber attack
- South Korean web attacks might been war drill
- Sri Lanka to Establish National Passport Database to Increase Border Security
- Hi-tech crime agencies set to employ information security professionals
- Phone hacking and online campaign bring down the News of the World