Module 8. Securing The Cloud
Securing The Cloud
CONCEPT
Cloud computing is the use of internet-based servers to store data and run applications remotely, managed by service providers. Users rent storage and computing resources, which can be accessed globally. This is especially useful for companies needing to process large data without investing in costly infrastructure.
TYPES
- Private Cloud – Dedicated to one organization; suitable for sensitive data.
- Public Cloud – Shared by many users; managed by a provider.
- Community Cloud – Shared by organizations with common interests.
- Hybrid Cloud – Combines multiple cloud types, allowing data portability while maintaining their distinct advantages.
TYPES OF CCS
- Infrastructure as a Service (IaaS): Provides basic IT resources like virtual machines, networks, and storage. It forms a flexible remote IT system, used by individuals and organizations—for example, storing photos or music in the cloud.
- Platform as a Service (PaaS): Allows users to run applications without managing the underlying infrastructure. The cloud provider handles the system setup and maintenance.
- Software as a Service (SaaS): Delivers complete software applications over the internet. The provider manages everything, and users access the service through web interfaces, such as email or social media platforms.
ADVANTAGES
- Flexibility: Cloud services offer scalable resources on demand. Businesses can quickly adjust storage, computing power, or applications based on their needs without investing in physical infrastructure.
- Cost effectiveness: Cloud computing reduces the need for upfront hardware purchases and maintenance. Users typically pay only for the resources they use, helping lower overall IT costs.
- Portability: Data and applications stored in the cloud can be accessed from anywhere with an internet connection, using various devices. This supports remote work and collaboration across locations.
THREATS
- Data breach: Unauthorized access to sensitive information stored in the cloud. This can happen due to weak access controls, poor encryption, or vulnerabilities in the cloud provider’s systems.
- Data loss: Permanent loss of data due to accidental deletion, system failure, or lack of proper backups. It can also occur during data migration or from ransomware attacks.
- Account hacking: Attackers may gain control of cloud user accounts through phishing, weak passwords, or reused credentials, allowing them to steal or manipulate data.
- Disgruntled insider: An internal employee with access to cloud systems may intentionally cause harm, deleting data, leaking sensitive information, or sabotaging services.
- Technology loopholes: Bugs or flaws in cloud software, APIs, or configurations can be exploited by attackers to bypass security or gain unauthorized access.
- Shared space: Cloud services are typically multi-tenant environments, meaning multiple customers share the same physical infrastructure. Poor isolation can lead to one user accessing another’s data.
- Vulnerable user interfaces: Web interfaces and dashboards used to manage cloud services may have weak security or exploitable flaws, allowing attackers to manipulate cloud resources.
HOW TO SECURE
To secure their data on the cloud, users should take regular backups, use strong passwords, enable two-step authentication, encrypt their data, and avoid storing sensitive information online. Maintaining good online habits is also essential.
Comments
Post a Comment