Is Cloud Computing Experiencing The Same Security Threats As Enterprise Computing?

Is Cloud Computing Experiencing The Same Security Threats As Enterprise Computing?

Is Cloud Computing Experiencing the Same Security Threats as Enterprise Computing?

People have always feared that cloud computing is inherently lacking in security because of the distribution methods used, allowing it to be more public than necessary. But research and reports indicate that it is not less secure than enterprise computing as they actually both suffer from the same types of attack. And it does not matter if you are a small organization or a large one you will still be the target of cyber-attacks as most of them are opportunistic in nature.security threats report

While organizations and businesses are the target of online attacks, the real entryways for these attacks are unsecured personal computers. These form the backbone of the cyber-criminal’s arsenal. Hijacked computers referred to as zombies or bots are being used to make brute force attacks on different networks both within the cloud infrastructure and on-premise infrastructure. No one is actually safe, whatever kind of infrastructure that they are using. Others might be more privy to attacks due to the nature of their service like banks or the possible wealth of information that they bring, like government networks and industry leaders in technology research.

According to Alert Logic’s Fall 2012 State of the Cloud Security Report, the variations in the threat activity across the industry is not as important as where the infrastructure is located. Attacks are not industry specific or organizational size specific, they depend on the infrastructure. This means that anything that can be possibly accessed from outside, whether enterprise or cloud, has equal chances of being attacked because as mentioned, attacks are opportunistic in nature.

The reason why cyber-attacks are indiscriminate to industry and size would be due to the nature of the attacker’s weapon, the internet. Web application-based attacks hit both service provider environments (53% of organizations) and on-premise environments (44% of organizations). But as a plus for cloud computing’s side, on-premise environment users or customers actually suffer more incidents than those of service provider environments. On-premise environment users experience an average of 61.4 attacks while service provider environment customers averaged only with 27.8 while on-premise environment users also suffered significantly more brute force attacks compared to their counterparts.

Despite real research and facts being provided by security service providers like Alert Logic, many organizations still base their infrastructure decisions on the “myth” that cloud computing is inherently less secure compared to enterprise computing or on-premise services. But instead of focusing their attention to these perceptions, organizations should be focusing on leveraging factual data to evaluate their own vulnerabilities and then create a better plan for their security.

By Abdul Salam

About Abdul

Abdul is a senior consultant with Energy Services, and author of numerous blogs, books, white papers, and tutorials on cloud computing and accomplished technical writer with CloudTweaks. He earned his bachelor’s degree in Information Technology, followed by an MBA-IT degree and certifications by Cisco and Juniper Networks.

He has recently co-authored: Deploying and Managing a Cloud Infrastructure: Real-World Skills for the CompTIA Cloud+ Certification (Wiley).

View All Articles

One Response to Is Cloud Computing Experiencing The Same Security Threats As Enterprise Computing?

  1. I think this is a relevant question “Is Cloud Computing Experiencing The Same Security Threats As Enterprise Computing?” First and foremost is that the architecture is fundamentally based on sharing resources and moving data around for collaboration and scalability.  This contradicts the basic principles of data security and compliance, which focus on restricting access and controlling data flow.  Once the data is out of organizations’ hands and into the cloud, how can security be assured?
    If the platform cannot be protected by the organization, then the data itself must be secured before it reaches the cloud.  The primary means to this is in granular, selective data protection, via tokenization or masking, to allow different classification levels.  Tokenized or masked data holds no value to a potential thief, and allows applications to operate on selective portions of the data that bleed through.
    The data will then be secured across the enterprise and into the cloud, and only via policy retained at the organization’s security center can the sensitive data ever be revealed to authorized parties or applications that require it.  A separation of duties, isolating security administration to security personnel, can ensure protection from internal threats.
    Since the data itself is secured, this can reduce the requirements for auditing and monitoring, which are also issues in a cloud environment.
    Practicing in this way can allow organizations to rest easy, knowing that their data is safe wherever it goes, and continue to take advantage of the numerous efficiencies in cloud computing.
    Ulf Mattsson | CTO | Protegrity (m) +1.203.570.6919

Consequences Of Combining Off Premise Cloud Storage and Corporate Data

Consequences Of Combining Off Premise Cloud Storage and Corporate Data

Off Premise Corporate Data Storage Cloud storage is a broad term. It can encompass anything from on premise solutions, to file storage, disaster recovery and off premise options. To narrow the scope, I’ve dedicated the focus of today’s discussion to the more popular cloud storage services—such as Dropbox, Box, OneDrive—which are also known as hosted,…

The Industries That The Cloud Will Change The Most

The Industries That The Cloud Will Change The Most

The Industries That The Cloud Will Change The Most Cloud computing is rapidly revolutionizing the way we do business. Instead of being a blurry buzzword, it has become a facet of everyday life. Most people may not quite understand how the cloud works, but electricity is quite difficult to fathom as well. Anyway, regardless of…

Internet Of Things – Industrial Robots And Virtual Monitoring

Internet Of Things – Industrial Robots And Virtual Monitoring

Internet Of Things – Industrial Robots And Virtual Monitoring One of the hottest topics in Information and Communication Technology (ICT) is the Internet of Things (IOT). According to the report of International Telecommunication Union (2012), “the Internet of things can be perceived as a vision with technological and societal implications. It is considered as a…

Cloud Computing – A Requirement For Greater Innovation

Cloud Computing – A Requirement For Greater Innovation

Cloud Computing Innovation Sao Paulo, Brazil has had trouble with both energy and water supplies as of late. Despite it is the rainy period. Unfortunately Sao Paulo is very dependent on its rain as a majority of its power is generated from large dams. No water, no energy. Difficult situation for a city of some…

Infographic: The Evolving Internet of Things

Infographic: The Evolving Internet of Things

Evolving Internet of Things  The Internet of Things, or IoT, a term devised in 1999 by British entrepreneur Kevin Ashton, represents the connection of physical devices, systems and services via the internet, and Gartner and Lucas Blake’s new infographic (below) explores the evolution of the IoT industry, investigating its potential impact across just about every…

5 Considerations You Need To Review Before Investing In Data Analytics

5 Considerations You Need To Review Before Investing In Data Analytics

Review Before Investing In Data Analytics Big data, when handled properly, can lead to big change. Companies in a wide variety of industries are partnering with data analytics companies to increase operational efficiency and make evidence-based business decisions. From Kraft Foods using business intelligence (BI) to cut customer satisfaction analysis time in half, to a…

Cloud Infographic – Big Data Analytics Trends

Cloud Infographic – Big Data Analytics Trends

Big Data Analytics Trends As data information and cloud computing continues to work together, the need for data analytics continues to grow. Many tech firms predict that big data volume will grow steadily 40% per year and in 2020, will grow up to 50 times that. This growth will also bring a number of cost…

Containerization: The Bold Face Of The Cloud In 2016

Containerization: The Bold Face Of The Cloud In 2016

Containerization And The Cloud “Right now, the biggest technology shift in the cloud is a rapid evolution from simple virtual machine (VM) hosting toward containerization’’ says the CTO of Microsoft Azure, Mark Russinovitch, a man who deals with the evolving cloud infrastructure every day. In his words, containerization is “an incredibly efficient, portable, and lightweight…

Cloud Infographic – The Data Scientist

Cloud Infographic – The Data Scientist

Data Scientist Report The amount of data in our world has been exploding in recent years. Managing big data has become an integral part of many businesses, generating billions of dollars of competitive innovations, productivity and job growth. Forecasting where the big data industry is going has become vital to corporate strategy. Enter the Data…

7 Common Cloud Security Missteps

7 Common Cloud Security Missteps

Cloud Security Missteps Cloud computing remains shrouded in mystery for the average American. The most common sentiment is, “It’s not secure.” Few realize how many cloud applications they access every day: Facebook, Gmail, Uber, Evernote, Venmo, and the list goes on and on… People flock to cloud services for convenient solutions to everyday tasks. They…