Preview

Security Risks in Cloud Computing

Good Essays
Open Document
Open Document
924 Words
Grammar
Grammar
Plagiarism
Plagiarism
Writing
Writing
Score
Score
Security Risks in Cloud Computing
Security Risks in Cloud Computing
University Writing Essentials / ENG 147
Security Risks in Cloud Computing

With technology as advanced as it is today, most find that security in Cloud computing is more secure and better when in fact the risks are higher than ever before. What could be presumed safe, could in fact present a major vulnerability in the eyes of a hacker. When accessing the Cloud, users depend on the security, which in turn subjects them to security risks in privacy, security, and data accessibility. If users avoid these risks, it can lead to grave results that could include losing sensitive information or worse, having someone’s identity stolen. David Geer states how these vulnerabilities and risks lead to problems by saying, “While these cloud applications may offer quick resolution to specific feature needs, the risks and vulnerabilities they introduce can lead to significant costs in damages...”. Privacy, Security, and Data are risks users take today when depending fully on the security Cloud has to offer. (Geer, 2013, par 21).

In today 's world in Cloud Computing, data can be easily accessed from any unknown source with Internet capabilities. Due to the limitless control this may present, the user may find that their privacy has been unknowingly invaded. Hidden from the users, most applications in today 's cloud computing are made up of either "Software as a service" (SaaS) or proprietary software. Both of these types of software collect information, inputted by the user, and record it for marketing use. In addition, this information can be stored away for others to access, leaving the account in the hands of someone unknown. In efforts to reaching a solution, Richard M. Stallman, a fighter for digital property rights, goes on to tell users that in order to make your data private, "users should refrain from employing SaaS applications and utilize freeware programs". (Stallman, 2013).

In a world, where users all take computers for



References: Pacella, R. (2013).Hacking is a Significant Threat to Cloud Computing. (2013). Technology and the Cloud. Retrieved from http://ic.galegroup.com.ezproxy.apollolibrary.com/ic/ovic/ViewpointsDetailsPage/ViewpointsDetailsWindow?failOverType=&query=&prodId=OVIC&windowstate=normal&contentModules=&display-query=&mode=view&displayGroupName=Viewpoints&dviSelectedPage=&limiter=&u=uphoenix_uopx&currPage=&source=&disableHighlighting=&displayGroups=&sortBy=&zid=&search_within_results=&p=OVIC&action=e&catId=&activityType=&scanId=&documentId=GALE%7CEJ3010846205 Sallman, R. (2013). Cloud Computing Threatens User Freedom and Should Be Avoided. Technology and the Cloud. Retrieved from http://ic.galegroup.com.ezproxy.apollolibrary.com/ic/ovic/ViewpointsDetailsPage/ViewpointsDetailsWindow?failOverType=&query=&prodId=OVIC&windowstate=normal&contentModules=&display-query=&mode=view&displayGroupName=Viewpoints&dviSelectedPage=&limiter=&u=uphoenix_uopx&currPage=&source=&disableHighlighting=&displayGroups=&sortBy=&zid=&search_within_results=&p=OVIC&action=e&catId=&activityType=&scanId=&documentId=GALE%7CEJ3010846203

You May Also Find These Documents Helpful

  • Better Essays

    Cloud computing is a fast growing information technology trend that many companies including Google, Microsoft, and IBM are currently looking to get a stake in as demand for the service grows. Cloud computing is the concept of allowing both individuals and businesses to store data and applications on remote servers (owned and operated by a third party company), rather than on their own hard drives and data centers. The service boasts the ability to securely access data and applications from just about any device with an internet connection, allowing for such services as streaming music from a personal collection from multiple devices, and even to business development and storage of applications on remote servers. For the past few years, cloud computing has quickly grown in popularity, and as such, has come with its own set of risks and security concerns. As use of this service grows by both consumers and businesses, it will no doubt continue to attract the attention of hackers and cyber criminals, as it offers a central repository of data that can contain everything from financial statements, to company intellectual property. On 7/11/2011, eweek.com posted an article called “Cloud Computing Security: 10 Ways to Enforce It”, which attempts to give several suggestions on the best way to ensure that cloud computing is as safe as it is convenient.…

    • 1626 Words
    • 7 Pages
    Better Essays
  • Good Essays

    Security attacks. A huge number of attacks are been made on cloud every day by malicious programs.…

    • 470 Words
    • 2 Pages
    Good Essays
  • Satisfactory Essays

    In this article, Patrick Thibodeau comments on Federal CIO Vivek Kundra’s claim that cloud computing concerns are exaggerated. Thibodeau explains clearly the claims made by Kundra about the overall security with cloud computing. Thibodeau blames the scare of cloud computing to IT developers belief of a status quo. Thibodeau concludes the article with a few success stories of basic cloud computing services working in the U.S. Government.…

    • 659 Words
    • 3 Pages
    Satisfactory Essays
  • Better Essays

    Trust is not easily defined, but most people agree that when it comes to cloud computing, transparency is essential to creating trust. Businesses must be able to see cloud service providers are complying with agreed data security standards and practices. These must include controls around who has access to data, staff security vetting practices, and the technologies and processes to segregate, backup and delete data. Suppliers of cloud technologies and services are quick to claim that cloud computing is well equipped to provide the necessary controls. Virtualization, they argue, underlies cloud computing, and therein lies the potential to achieve hitherto impossible levels of security. While virtualization is viewed with suspicion and fear by many IT directors, suppliers like RSA, IBM and other say that the technology enables organizations to build security into the infrastructure and automate security processes, to surpass traditional data protection…

    • 1351 Words
    • 6 Pages
    Better Essays
  • Good Essays

    Security plays a significant role in today’s corporations and mitigating risks to a company’s most valuable asset, data, is important. With data breaches, such as the one experienced by Target, the Department of Homeland Security as well as the Internal Revenue System, it is becoming increasingly obvious that no one is immune. Securing data is complex and with the advent of cloud services where information is now gathered and stored in various locations throughout the globe, securing that data continues to be a challenge. Even as we implement policies and procedures to secure our environment, we are now partnering with many companies and vendors that must also follow the same guidelines to ensure a company’s assets.…

    • 1286 Words
    • 6 Pages
    Good Essays
  • Best Essays

    “Cloud” computing is the fanciest buzzword in the computer industry, currently surpassing the last big term “web 2.0”. Every big player in the computer industry launched a cloud service last year. Notable examples are iCloud by Apple, (Apple 2012) or Microsoft Cloud Services (Microsoft 2011), copying various innovators like Google or Dropbox, who offer similar services since much longer. The latter is the most successful company in the private usage of a file-cloud, since 2007 it has acquired over 50 million users (Dropbox 2012). The success of Dropbox lies more in its simplicity rather than its functionality, the company never uses words like sync or cloud, it simply works for the user (Carr 2011).…

    • 3770 Words
    • 16 Pages
    Best Essays
  • Better Essays

    Secure Cloud

    • 1589 Words
    • 7 Pages

    CSQ1: Although cloud computing have the potential to deliver powerful benefits, they pose new challenges to system security and reliability. Cloud computing is indeed cloudy, and due to lack of transparency it creates so many problems. One of the major security issue is cloud computing is highly distributed. Cloud applications and application mash-ups reside in virtual libraries in large remote data centers and server mainly supplies business services and data management for multiple corporate and organizations clients.…

    • 1589 Words
    • 7 Pages
    Better Essays
  • Good Essays

    assignment IST309

    • 1030 Words
    • 3 Pages

    The purpose of this paper is to talk about how security concerns of cloud computing matter to business as well as to other organizations and looking for the solution of the problems. Public cloud computing provides immense convenience but at the same time consists of huge privacy and security risks. The paper will discuss this problem from survey done by other researchers and the realistic problems cause by leakage of cloud data.…

    • 1030 Words
    • 3 Pages
    Good Essays
  • Powerful Essays

    Cloud computing

    • 12413 Words
    • 50 Pages

    Jump up ^ Vizard, Michael. "How Cloudbursting 'Rightsizes ' the Data Center", (2012-06-21). Slashdot. [11]…

    • 12413 Words
    • 50 Pages
    Powerful Essays
  • Good Essays

    Risk Management Strategies

    • 1210 Words
    • 5 Pages

    Taking a step towards cloud is a big challenge but it is a great start to modernize the organization. The entire software framework of the system will be affected by this change. It’s not simple as said, it involves numerous unexpected complexities which are to be dealt with. It would also take significant development effort in terms of software development. With such big changes in hand system security and integrity cannot be compromised and issues in privacy and security are a major concern. Like mentioned above many questions arise when security and privacy of the system is considered. A strong security framework is essential to perform operations like authorization, restriction, identity management, etc.…

    • 1210 Words
    • 5 Pages
    Good Essays
  • Better Essays

    Research Paper

    • 1786 Words
    • 8 Pages

    “Every kid coming out of Harvard, every kid coming out of school now thinks he can be the next Mark Zuckerberg, and with these new technologies like cloud computing, he actually has a shot” (Andreessen, 2012). Cloud computing is what allows businesses today to pay for what is only consumed. This access to real time computing environment that extends information technology infrastructure of a company’s capabilities is unprecedented. Companies who have to use expensive capital cost and employee labor costs to spin up a working infrastructure that a company could use to go to market. The National Institute of Standards and Technology defines the cloud as “a model for enabling ubiquitous, convenient, on-demand network access to a shared pool of configurable computing resources (e.g., networks, servers, storage, applications and services) that can be rapidly provisioned and released with minimal management effort or service provider interaction” (Engle, 2012). This would also add time to how rapidly the business could get to market. This sustainable competitive business advantage is important for businesses to stay relevant into today’s marketplace. Now businesses can access this computing infrastructure quickly and cheaply without a significant startup costs. Cloud computing will and has changed the game forever. With this information building a career in cloud computing will be the cornerstone of the future technologist resume.…

    • 1786 Words
    • 8 Pages
    Better Essays
  • Powerful Essays

    One of the most serious concerns is the possibility of confidentiality violations. Either maliciously or accidentally, cloud provider’s employees can tamper with or leak a company’s data. Such actions can severely damage the reputation or finances of a company. In order to prevent confidentiality violations, cloud services’ customers might resort to encryption. While encryption is effective in securing data before it is stored at the provider, it cannot be applied in services where data is to be computed, since the unencrypted data must reside in the memory of the host running the computation.…

    • 4011 Words
    • 17 Pages
    Powerful Essays
  • Satisfactory Essays

    For the vast majority of businesses, modern commercial cloud applications provide exceptionally high levels of security, including data protection and back-up, and are usually more secure than the majority of on-premise applications.…

    • 929 Words
    • 4 Pages
    Satisfactory Essays
  • Better Essays

    Cloud Computing

    • 917 Words
    • 3 Pages

    Arma International (2010) Information Management: Putting a Lock on Cloud Based Information, http://content.arma.org/IMM/JulyAug10/IMM0710puttingalockoncloud-basedinformation.aspx. March 1, 2014…

    • 917 Words
    • 3 Pages
    Better Essays
  • Better Essays

    Cloud Computing

    • 1194 Words
    • 5 Pages

    Over the last few years, cloud computing has been evolving leading to many customers utilizing the cloud computing technology. Basically cloud computing is based on delivering varied resources through the internet (also called the cloud) that depends on complex architecture that enables providers to make use of different models and be able to deliver on different services. Although cloud computing features are meant to entice the customers to use its services, however, a cloud security concern has become the pertinent issue to cloud computing. Security concerns emanating from cloud computing have hindered IT experts to move to cloud computing.…

    • 1194 Words
    • 5 Pages
    Better Essays