The Lighter Side Of The Cloud – The Cloud Pole
The Lighter Side Of The Cloud – Brain Cramp
The Lighter Side Of The Cloud – Synchronization
Is Cloud Computing Experiencing The Same Security Threats As Enterprise Computing?

Is Cloud Computing Experiencing The Same Security Threats As Enterprise Computing?

Is Cloud Computing Experiencing the Same Security Threats as Enterprise Computing?

People have always feared that cloud computing is inherently lacking in security because of the distribution methods used, allowing it to be more public than necessary. But research and reports indicate that it is not less secure than enterprise computing as they actually both suffer from the same types of attack. And it does not matter if you are a small organization or a large one you will still be the target of cyber-attacks as most of them are opportunistic in nature.security threats report

While organizations and businesses are the target of online attacks, the real entryways for these attacks are unsecured personal computers. These form the backbone of the cyber-criminal’s arsenal. Hijacked computers referred to as zombies or bots are being used to make brute force attacks on different networks both within the cloud infrastructure and on-premise infrastructure. No one is actually safe, whatever kind of infrastructure that they are using. Others might be more privy to attacks due to the nature of their service like banks or the possible wealth of information that they bring, like government networks and industry leaders in technology research.

According to Alert Logic’s Fall 2012 State of the Cloud Security Report, the variations in the threat activity across the industry is not as important as where the infrastructure is located. Attacks are not industry specific or organizational size specific, they depend on the infrastructure. This means that anything that can be possibly accessed from outside, whether enterprise or cloud, has equal chances of being attacked because as mentioned, attacks are opportunistic in nature.

The reason why cyber-attacks are indiscriminate to industry and size would be due to the nature of the attacker’s weapon, the internet. Web application-based attacks hit both service provider environments (53% of organizations) and on-premise environments (44% of organizations). But as a plus for cloud computing’s side, on-premise environment users or customers actually suffer more incidents than those of service provider environments. On-premise environment users experience an average of 61.4 attacks while service provider environment customers averaged only with 27.8 while on-premise environment users also suffered significantly more brute force attacks compared to their counterparts.

Despite real research and facts being provided by security service providers like Alert Logic, many organizations still base their infrastructure decisions on the “myth” that cloud computing is inherently less secure compared to enterprise computing or on-premise services. But instead of focusing their attention to these perceptions, organizations should be focusing on leveraging factual data to evaluate their own vulnerabilities and then create a better plan for their security.

By Abdul Salam

Abdul

Abdul Salam is IT professional and an accomplished technical writer with CloudTweaks. He earned his undergraduate degree in Information Technology followed by a postgraduate degree in Business Informatics. Abdul possess over 3 years’ experience in technical & business writing with deep knowledge in Cloud Computing, VMware,Oracle, Oracle ERP, Cloud ERP, Microsoft Technologies and Network Communications (Cisco, Juniper). Visit his LinkedIn profile at: http://linkd.in/TtFu7X

One Response to Is Cloud Computing Experiencing The Same Security Threats As Enterprise Computing?

  1. I think this is a relevant question “Is Cloud Computing Experiencing The Same Security Threats As Enterprise Computing?” First and foremost is that the architecture is fundamentally based on sharing resources and moving data around for collaboration and scalability.  This contradicts the basic principles of data security and compliance, which focus on restricting access and controlling data flow.  Once the data is out of organizations’ hands and into the cloud, how can security be assured?
    If the platform cannot be protected by the organization, then the data itself must be secured before it reaches the cloud.  The primary means to this is in granular, selective data protection, via tokenization or masking, to allow different classification levels.  Tokenized or masked data holds no value to a potential thief, and allows applications to operate on selective portions of the data that bleed through.
    The data will then be secured across the enterprise and into the cloud, and only via policy retained at the organization’s security center can the sensitive data ever be revealed to authorized parties or applications that require it.  A separation of duties, isolating security administration to security personnel, can ensure protection from internal threats.
    Since the data itself is secured, this can reduce the requirements for auditing and monitoring, which are also issues in a cloud environment.
    Practicing in this way can allow organizations to rest easy, knowing that their data is safe wherever it goes, and continue to take advantage of the numerous efficiencies in cloud computing.
    Ulf Mattsson | CTO | Protegrity (m) +1.203.570.6919

Popular

5 Considerations You Need To Review Before Investing In Data Analytics

5 Considerations You Need To Review Before Investing In Data Analytics

Review Before Investing In Data Analytics Big data, when handled properly, can lead to big change. Companies in a wide variety of industries are partnering with data analytics companies to increase operational efficiency and make evidence-based business decisions. From Kraft Foods using business intelligence (BI) to cut customer satisfaction analysis time in half, to a…

Five Signs The Internet of Things Is About To Explode

Five Signs The Internet of Things Is About To Explode

The Internet of Things Is About To Explode By 2020, Gartner estimates that the Internet of Things (IoT) will generate incremental revenue exceeding $300 billion worldwide. It’s an astoundingly large figure given that the sector barely existed three years ago. We are now rapidly evolving toward a world in which just about everything will become…

Unusual Clandestine Cloud Data Centre Service Locations

Unusual Clandestine Cloud Data Centre Service Locations

Unusual Clandestine Cloud Data Centre Service Locations Everyone knows what the cloud is, but does everybody know where the cloud is? We try to answer that as we look at some of the most unusual data centre locations in the world. Under the Eyes of a Deity Deep beneath the famous Uspenski Cathedral in the…

The Industries That The Cloud Will Change The Most

The Industries That The Cloud Will Change The Most

The Industries That The Cloud Will Change The Most Cloud computing is rapidly revolutionizing the way we do business. Instead of being a blurry buzzword, it has become a facet of everyday life. Most people may not quite understand how the cloud works, but electricity is quite difficult to fathom as well. Anyway, regardless of…

Cloud Infographic – Interesting Big Data Facts

Cloud Infographic – Interesting Big Data Facts

Big Data Facts You Didn’t Know The term Big Data has been buzzing around tech circles for a few years now. So much, in fact, that you’re probably getting sick of hearing about it. Here are some interesting facts you might not know about big data via The Visual Capitalist: Big Data got its start in the…

Recent

Cloud Infographic: Backing Up And Storing Your Data Is No Joke

Cloud Infographic: Backing Up And Storing Your Data Is No Joke

Backing Up And Storing Your Data Is No Joke When was the last time you backed up any of your precious documents on your hard drive? March 31st was the annual “World Backup Day” which helps create awareness of the importance of backing up your files.  Tech professionals and consumers alike can benefit from backing up.…

The Many Hats Of Today’s IT Managers

The Many Hats Of Today’s IT Managers

The Many Hats of IT Managers In years past, the IT department of most large organizations was much like a version of Middle Earth: a mysterious nether world where people who seemed infinitely smarter than the rest of us bustled around, speaking and typing languages that appeared indecipherable, yet, which made our world work. They…

Savvy Businesses Leverage Enterprise Cloud PaaS

Savvy Businesses Leverage Enterprise Cloud PaaS

Savvy Businesses Leverage Enterprise Cloud PaaS Imagine a workshop full of tools: hammers, wrenches and screwdrivers. These simple tools can be used on a variety of materials: wood, brick, polymer and so on. But are these basic tools the best and enough for all materials and all projects? No, some projects require more specialized tools.…

Sponsored Posts

From C:\Prompt To CYOD – The Timely Shift To Desktop as a Service

From C:\Prompt To CYOD – The Timely Shift To Desktop as a Service

The Timely Shift to Desktop as a Service There may be some colleagues lurking within any given workforce who remember what a C:\> prompt meant. Much like the ring from Middle Earth, it had the power to make things happen. Desktop computers at that time were large grey beasts, with their only wired connection being…

Cloud Logo Sponsors

hp Logo CityCloud-PoweredByOpenstack-Bluesquare_logo_100x100-01
cisco_logo_100x100 vmware citrix100
Site 24x7


Contributor Spotlight

Established in 2009, CloudTweaks is recognized as one of the leading influencers in cloud computing, big data and internet of things (IoT) information. Our goal is to continue to build our growing information portal, by providing the best in-depth articles, interviews, event listings, whitepapers, infographics and much more.

Branded Content Programs

Advertising