Is Cloud Computing Experiencing The Same Security Threats As Enterprise Computing?

Is Cloud Computing Experiencing The Same Security Threats As Enterprise Computing?

Is Cloud Computing Experiencing the Same Security Threats as Enterprise Computing?

People have always feared that cloud computing is inherently lacking in security because of the distribution methods used, allowing it to be more public than necessary. But research and reports indicate that it is not less secure than enterprise computing as they actually both suffer from the same types of attack. And it does not matter if you are a small organization or a large one you will still be the target of cyber-attacks as most of them are opportunistic in nature.security threats report

While organizations and businesses are the target of online attacks, the real entryways for these attacks are unsecured personal computers. These form the backbone of the cyber-criminal’s arsenal. Hijacked computers referred to as zombies or bots are being used to make brute force attacks on different networks both within the cloud infrastructure and on-premise infrastructure. No one is actually safe, whatever kind of infrastructure that they are using. Others might be more privy to attacks due to the nature of their service like banks or the possible wealth of information that they bring, like government networks and industry leaders in technology research.

According to Alert Logic’s Fall 2012 State of the Cloud Security Report, the variations in the threat activity across the industry is not as important as where the infrastructure is located. Attacks are not industry specific or organizational size specific, they depend on the infrastructure. This means that anything that can be possibly accessed from outside, whether enterprise or cloud, has equal chances of being attacked because as mentioned, attacks are opportunistic in nature.

The reason why cyber-attacks are indiscriminate to industry and size would be due to the nature of the attacker’s weapon, the internet. Web application-based attacks hit both service provider environments (53% of organizations) and on-premise environments (44% of organizations). But as a plus for cloud computing’s side, on-premise environment users or customers actually suffer more incidents than those of service provider environments. On-premise environment users experience an average of 61.4 attacks while service provider environment customers averaged only with 27.8 while on-premise environment users also suffered significantly more brute force attacks compared to their counterparts.

Despite real research and facts being provided by security service providers like Alert Logic, many organizations still base their infrastructure decisions on the “myth” that cloud computing is inherently less secure compared to enterprise computing or on-premise services. But instead of focusing their attention to these perceptions, organizations should be focusing on leveraging factual data to evaluate their own vulnerabilities and then create a better plan for their security.

By Abdul Salam

About Abdul

Abdul is a senior consultant with Energy Services, and author of numerous blogs, books, white papers, and tutorials on cloud computing and accomplished technical writer with CloudTweaks. He earned his bachelor’s degree in Information Technology, followed by an MBA-IT degree and certifications by Cisco and Juniper Networks.

He has recently co-authored: Deploying and Managing a Cloud Infrastructure: Real-World Skills for the CompTIA Cloud+ Certification (Wiley).

View All Articles

One Response to Is Cloud Computing Experiencing The Same Security Threats As Enterprise Computing?

  1. I think this is a relevant question “Is Cloud Computing Experiencing The Same Security Threats As Enterprise Computing?” First and foremost is that the architecture is fundamentally based on sharing resources and moving data around for collaboration and scalability.  This contradicts the basic principles of data security and compliance, which focus on restricting access and controlling data flow.  Once the data is out of organizations’ hands and into the cloud, how can security be assured?
    If the platform cannot be protected by the organization, then the data itself must be secured before it reaches the cloud.  The primary means to this is in granular, selective data protection, via tokenization or masking, to allow different classification levels.  Tokenized or masked data holds no value to a potential thief, and allows applications to operate on selective portions of the data that bleed through.
    The data will then be secured across the enterprise and into the cloud, and only via policy retained at the organization’s security center can the sensitive data ever be revealed to authorized parties or applications that require it.  A separation of duties, isolating security administration to security personnel, can ensure protection from internal threats.
    Since the data itself is secured, this can reduce the requirements for auditing and monitoring, which are also issues in a cloud environment.
    Practicing in this way can allow organizations to rest easy, knowing that their data is safe wherever it goes, and continue to take advantage of the numerous efficiencies in cloud computing.
    Ulf Mattsson | CTO | Protegrity (m) +1.203.570.6919

Cloud Computing: On The Fringe or Mainstream?

Cloud Computing: On The Fringe or Mainstream?

Cloud Computing Revenue Numbers Imagine that your viewpoint is shared by 5% of people. You’d be in a fringe political party, perhaps, or share a fondness for some obscure sport or hobby. Or you’d be a proponent of Cloud Computing. Because the reality is that after many years of technical development, entrepreneurial freneticism, and big-company marketing,…

5 Companies That Took On The Small Business Cloud – And Won

5 Companies That Took On The Small Business Cloud – And Won

The Small Business Cloud We take a look at 5 world-leading tech companies that have brought ground-breaking new cloud services to SMEs  Plenty of organisations have broken into new markets with innovative cloud-based products. Discover which companies have successfully taken on the small business Cloud. Cloud based computer systems are ideally suited to support the…

Are You Sure You Are Ready For The Cloud: Security

Are You Sure You Are Ready For The Cloud: Security

Cloud Security For the last several months, we have been discussing ways to make sure you are ready for the next step in your IT evolution: Cloud. When review the different steps of making sure you are ready, one that I have intentionally avoided was Security. I spoke to you about “Security of Business”, but…

5 Companies That Took On The Small Business Cloud – And Lost

5 Companies That Took On The Small Business Cloud – And Lost

5 Companies That Took On The Small Business Cloud The growth of cloud based business support systems has been staggering, and while some major software houses have quickly positioned themselves as forerunners in the move to the Cloud, there are several high-flying companies that have so far failed to provide small businesses with the level…

New Smartphones From Apple, Samsung and HTC Promise To Light Up 2016

New Smartphones From Apple, Samsung and HTC Promise To Light Up 2016

New Smartphones from Apple, Samsung and HTC (Sponsored post courtesy of Verizon Wireless) The launch of the Galaxy S7 Edge at the Mobile World Congress in Barcelona during February was the first shot in a vintage year for mobile phones. The S7 is an incredible piece of hardware, but launches from HTC and Apple later in the…

Featured Sponsored Articles
How Successful Businesses Ensure Quality Team Communication

How Successful Businesses Ensure Quality Team Communication

Quality Team Communication  (Sponsored post courtesy of Hubgets) Successful team communication and collaboration are as vital to project and overall business success as the quality of products and services an organization develops. We rely on a host of business tools to ensure appropriate customer interactions, sound product manufacturing, and smooth back-end operations. However, the interpersonal relationships…

Featured Sponsored Articles
How To Develop A Business Continuity Plan Using Internet Performance Management

How To Develop A Business Continuity Plan Using Internet Performance Management

Internet Performance Management Planning CDN Performance Series Provided By Dyn In our previous post, we laid out the problems of business continuity and Internet Performance Management in today’s online environment.  In this article, we will take a look at some of the ways you can use traffic steering capabilities to execute business continuity planning and…

Featured Sponsored Articles

CloudTweaks is recognized as one of the leading influencers in cloud computing, infosec, big data and the internet of things (IoT) information. Our goal is to continue to build our growing information portal by providing the best in-depth articles, interviews, event listings, whitepapers, infographics and much more.

Sponsor