Cloud

662 Words2 Pages

Today the cloud is becoming a coexistent part of our daily lives as the need for easy accessibility is a must to any individual or business. There are a variety of applications to choose from to store information online such as DropBox, iCloud, and Google Drive. We must ask ourselves however, how secure are we in using these forms of online storage applications for our data? I would like to examine in depth cloud computing, the types of cloud available for use, and some of the security issues associated with the cloud. It is to the benefit any entity to be prepared for the unexpected when using the cloud and choosing the right type of cloud for use.
The types of cloud most commonly popularized are public, private, and hybrid. Public cloud computing is administered and provided by outside sources such as Amazon Simple Storage Service. Public cloud computing is billed on an as used basis and has easy scalability as more space in required. Through the ability of the cloud to employ services as used, it can just as easily un-employ them. There are many services that offer for free a specific amount of data space to users. For employees in a business however, it is of importance to store confidential information under the use of a private cloud. Never put information pertaining to customers or finances on the public cloud.
Private cloud computing is typically managed and executed by internal users in a data center on or offsite for a business. A private cloud maintains all confidential information under the strict guidelines of an organization or business. The company should keep in check that the proper amount of resources are being utilized at all times so that the cloud is properly maintained. This is turn will keep resources from...

... middle of paper ...

...e precautions in encryption of data so passwords and authentication are taken seriously to not be stolen. Passwords and information can be taken through interception. Such forms include: loss of governance, network sniffing, SQL injections, and insertion of malicious code. Insecurities can be found in the deletion of your data which may not be totally deleted after requesting it to be done through your cloud provider. However, in getting to know the terms of your provider it is beneficial to know that they can still offer you top notch protection. Some ways in furthering your own protection can be

Works Cited

http://www.unitiv.com/it-solutions-blog/bid/77277/6-Types-of-Cloud-Computing

http://www.bu.edu/infosec/howtos/how-to-safely-store-your-data-in-the-cloud/

JAMIL, D., & ZAKI, H. CLOUD COMPUTING SECURITY.

http://www.enisa.europa.eu/activities/risk-management

More about Cloud

Open Document