Cloud Computing And Banking Security

Cloud Computing and Banking Security

I have talked about security in cloud computing many times before, explaining why it is just as safe as conventional networking security, even citing its benefits over the conventional. However, there are many who still find cloud computing security lacking.

Individuals which still worry about cloud security, are those that fall under the financial institution category like banks, brokers, lenders and the like. They do not trust third party cloud computing providers and vendors, at least not with their most sensitive information and data. They might use cloud computing for some things like websites and applications that they think they can risk security with, but they would never consider parting with direct access of their financial and other similar data.

The biggest reason behind this is simpler than most would imagine as it has something to do with numbers and probability, thought they probably would not admit it is something as basic as that and would rather cite some technical issue like migration and data integrity. Those are valid points, but they are not truly even problems. With ease and security of data migration through cloning and inter-server data transfers with services like Cloud Velocity, migration is truly a no pain no worry process. The real reason as I have said is the probability of a successful attack. Government systems and financial data systems are under attack multiple times a day, and a sizeable majority of these fail at the first lines of defense. The probability of a successful attack is always real, and this probability of success increases as the number of attempts increases.

When data systems reside behind closed and secret doors, very few people will be able to access it, never mind knowing about it. However, the moment that data resides in the cloud, a sign bearing the words “Step right! Take your chance to earn millions of dollars!” goes up as well; it is inherently an invite to all attackers of all skill levels to at least try. Inevitably the success of an unscrupulous individual/s will prevail. A basic analogy would be to keeping a jar of cookies on a high table when there are a lot of kids around as opposed to keeping it out of reach and out of sight inside the cupboard.

In this case, it’s not a matter of technology but a matter of probability. No matter how advanced your security measures are men can open locks that are made by other men, it is best to keep those that try to a minimum.

By Abdul Salam

About Abdul

Abdul is a senior consultant with Energy Services, and author of numerous blogs, books, white papers, and tutorials on cloud computing and accomplished technical writer with CloudTweaks. He earned his bachelor’s degree in Information Technology, followed by an MBA-IT degree and certifications by Cisco and Juniper Networks.

He has recently co-authored: Deploying and Managing a Cloud Infrastructure: Real-World Skills for the CompTIA Cloud+ Certification (Wiley).

View All Articles

Sorry, comments are closed for this post.

CloudTweaks is recognized as one of the leading influencers in cloud computing, infosec, big data and the internet of things (IoT) information. Our goal is to continue to build our growing information portal by providing the best in-depth articles, interviews, event listings, whitepapers, infographics and much more.

CloudTweaks Comic Library