3. 1.What is
Cloud
Computing?
● Cloud computing is the delivery of different services
through the Internet. These resources include tools
and applications like data storage, servers,
databases, networking, and software.
● Rather than keeping files on a proprietary hard drive
or local storage device, cloud-based storage makes it
possible to save them to a remote database. As long
as an electronic device has access to the web, it has
access to the data and the software programs to run
it.
4. What is Cloud security?
Cloud security is a collection of procedures and technology designed to
address external and internal threats to business security.
Cloud security is a discipline of cyber security dedicated to securing
cloud computing systems. This includes keeping data private and safe
across online-based infrastructure, applications, and platforms.
5. Why is it important?
● As companies continue to migrate to the cloud, understanding the
security requirements for keeping data safe has become critical.
● Every component — from core infrastructure to small data like emails
and documents — can now be located and accessed remotely on
24/7 web-based connections. Threat actors can now target large
multi-organizational data centers and cause immense data breaches.
6. What are the security risks in cloud
?
1- DATA LOSS
➔It is also known as Data leakage because it is a process in which
data is being deleted, corrupted, and unreadable by a user, software,
or application.
➔It is the most common cloud security risk.
2-HACKED INTERFACES AND API
➔As cloud computing is completely dependent on Internet, so, these
APIs and interfaces are available in the public domain that can be
accessed by third party easily and harmed and hacked by the
hackers in a matter of time.
➔So, protecting Interfaces and APIs is also very important.
7. What are the security risks in cloud
?
3- DATA BREACH
➔It is the process in which the confidential data is viewed, accessed,
or stolen by the third party without any authorization, so
organization’s data is hacked by the hackers.
4-VENDOR LOCK-IN
➔It is one of the biggest security risks in cloud computing.
➔Organizations may face difficulty while transferring their services
from one vendor to another, as different vendors provide different
platforms that can caught difficulty while moving one cloud to another
without experiencing issues such as high costs,lrgal constraints, or
technical incompatibilities.
8. What are the security risks in cloud
?
5- SPECTRE AND MELTDOWN
➔It allows program to view and steal data which is currently processed
on computer that can run on personal computers, mobile, and in the
cloud. It can store the password, your personal information such as
images, emails, documents in the memory of other running
programs.
6-DENIAL OF SERVICES(DOS) ATTACKS
➔It occurs when the system receives too much traffic to buffer the
server.
➔Mostly, Dos attackers target web servers of large organization such
as banking, media companies, etc.
➔To recover the data, DoS attackers charge a great deal of time and
money to handle the data.
9. What are the security risks in cloud
?
7- ACCOUNT HIJACKING
➔It is a serious security risk in cloud computing.
➔It is the process in which individual user’s account or organization’s
cloud account( bank account, email account, social media account) is
stolen by hackers.
➔The hackers use the stolen account to perform unauthorized
activities.
10.
11. How to secure?
1-Encryption
Encryption is one of the best ways to secure your cloud computing
systems. There are several different ways of using encryption::
1. Communications encryption with the cloud in their entirety.
2. Particularly sensitive data encryption, such as account credentials.
3. End-to-end encryption of all data that is uploaded to the cloud.
2-Identity and access management(IAM)
IAM tools and services allow enterprises to deploy policy-driven
enforcement protocols for all users attempting to access both on-premises
and cloud-based services. The core functionality of IAM is to create digital
identities for all users so they can be actively monitored and restricted
when necessary during all data interactions.
12. How to secure?
3-Data loss prevention(DLP)
Data loss prevention (DLP) services offer a set of tools and services
designed to ensure the security of regulated cloud data. DLP solutions
use a combination of remediation alerts, data encryption, and other
preventative measures to protect all stored data, whether at rest or in
motion.
4-Security information and event management(SIEM)
It provides a comprehensive security orchestration solution that
automates threat monitoring, detection, and response in cloud-based
environments.
13. Basic cyber security solution tips
1-Never leave the default settings unchanged.
2-Use strong passwords.
3-Use a password manager.
4-Protect all the devices.
5-Back up your data regularly.
6-Modify permissions.
7-Protect yourself with anti-virus and anti-malware.
8-Avoid accessing your data on public Wi-Fi.
9-Actively manage your accounts and services.
10-Have a look at all these points regularly.