Saturday, July 20, 2024
HomeComputerCloud Computing - Is It Safe?

Cloud Computing – Is It Safe?

There are essentially two kinds of computing environments:

On-premises computing is the conventional shape of computing in that you or your company personal and control your own systems. All the packages you operate and your facts documents are for your very own computer systems to your own premises either on individual PCs or on an in-house nearby region community.

In cloud computing, with the aid of contrast, your packages and files are held remotely on the Internet (in cyberspace) in a community of servers operated by way of a 3rd party. You get entry to applications and work in your documents out of your PC by logging directly to the network.

 Cloud Computing

Cloud offerings are supplied through cloud-website hosting companies, corporations consisting of Google, Amazon, Oracle Cloud, Rackspace, Microsoft Azure, and so forth. There is nothing basically new, approximately the concept of cloud services. If you’re the usage of Gmail, Hotmail, or Yahoo on your emails, you’re the usage of cloud offerings and, in all likelihood, have been for years.

What is fairly new is the varieties of offerings that are being supplied in cloud surroundings. These now move some distance past email to cover all the IT services that an on-premises computing environment could supply, along with accounting, advertising and marketing, human assets, and so on.

Advantages of cloud computing

Cloud computing has numerous blessings over on-premises computing:

1) You can run software or get entry to your documents from anywhere in the world using any PC.

2) Cloud computing is inexpensive.

3) You want much less technical expertise.

4) Cloud computing can provide higher overall performance.

5) Cloud computing is eminently scalable. Increasing the number of packages you operate or the number of facts you save does now not require a heavy investment; you simplest want to recommend the cloud-web hosting adviser.

Given these benefits, it was no surprise that there was a good-sized speedy adoption of cloud computing over a previous couple of years. Analysts estimate that the growth charge of all spending on cloud IT will quickly be at the least four instances quicker than the boom charge of all spending on on-premises computing. Indeed, analysts are awaiting the annual boom charge of spending on cloud computing to common 23.Five% compound from now till 2017. With the aid of that 12 months, spending on cloud services will possibly account for one-sixth of all spending on IT products, inclusive of packages, gadget infrastructure software, and basic garage.


Given the rapid boom in cloud computing, the big query of the path is whether cloud computing is safe. Is it more or much less safe than on-premises computing? The short answer is that cloud computing isn’t much less safe than on-premises computing. However, the threats are relatively one-of-a-kind in nature, although they may be converging.


Generally speaking, there are six foremost threats to computer safety. These are:

Malware – is a malicious software program including viruses, trojans, worms, adware, and zombies. Malware is set up on both a PC in your house office or a cloud-computing server. Where malware gives control of a network of computer systems to a malicious institution (e.g., to send unsolicited mail), it is referred to as a botnet. Web app attack – is an attack in which web-based totally programs are focused. It is one of the maximum not unusual kinds of assault on the Internet.

Brute force assault – works by trying all feasible combos of letters or numbers with a purpose to find out a cipher or secret key. For example, you may crack a password using time and again seek to bet it. Modern computing energy and pace make brute pressure a feasible form of assault. Recon – is a reconnaissance hobby. This is used to select sufferers that are each susceptible and valuable.

Vulnerability scan – is an exploit using a unique program to get entry to weaknesses in computer systems, structures, networks, or applications to generate facts for planning an assault. App attack – is an attack in opposition to an application or carrier that is not running on the web, i.e., the program may be on a computer someplace.


A honeypot is a decoy internet site, community, gadget, or utility that has been intentionally designed to be at risk of attack. Its cause is to accumulate records approximately attackers and the way they paintings.

Honeypots permit researchers to:

accumulate records on new and rising malware and determine tendencies in threats identify the resources of attacks which include information of their IP addresses determine how attacks take place and how best to counteract them determine attack signatures (pieces of code which can be particular to unique portions of malware) so that anti-virus software program can recognize them expand defenses in opposition to specific threats. Honeypots have proved to be beneficial in erecting defenses against hackers.

The Spring 2014 Cloud Security Report

Cloud Computing

Alert Logic offers security services for both on-premises and cloud computing structures. The organization commenced issuing cloud safety reports in 2012. Its Spring 2014 Cloud Security Report covers the yr finishing the thirtieth September 2013. This file is based totally on a mixture of real-international safety incidents experienced by way of Alert Logic’s clients and information gathered from a series of honeypots the company set up worldwide. The report throws some exciting mild of on-premises and cloud computing security referring to the organization’s clients. Here are some of the highlights:

[1] Computing is moving an increasing number of from on-premises to cloud-primarily based computing. The varieties of assaults that focus on on-premises systems are now focused on cloud environments. This might be because of the growing fee of ability victims inside the cloud.

[2] Although attacks on cloud environments increase in frequency, the cloud isn’t always inherently less cozy than traditional on-premises computing.

[3] The frequency of attacks in each on-premises and cloud computing has extended for most styles of threats, though for a few forms of threats, it has fallen. Here are the principal points of assessment among both computing environments:

The maximum accepted varieties of assaults towards on-premises clients have been malware attacks (which includes botnets) at 56% for the duration of the six months ending thirtieth September. At simplest eleven%, these attacks had been a good deal less common among cloud customers. However, the number of cloud customers experiencing these assaults is growing quickly, extra than doubling in 12 months.

Attacks using brute pressure multiplied from 30% to 44% of cloud clients but remained strong in on-premises environments at an excessive forty-nine%. Vulnerability scans jumped dramatically in each environment. Brute force attacks and vulnerability scans are now taking place at almost identical rates in on-premises and cloud environments. Web app attacks are more likely among cloud customers. However, these assaults are down year-on-yr in each cloud and on-premises computing, as are recons. App assaults increased barely in each class of customers.

The maximum familiar styles of attacks range between on-premises and cloud environments. In on-premises computing, the pinnacle three were malware (56% of clients), brute pressure (49%), and vulnerability scans (forty%), even as inside the cloud, the most commonplace incidents were brute force, vulnerability scans, and web app assaults, each of which affected forty four% of customers.

[4] The incidents related to Alert Logic’s cloud-primarily based honeypots varied in exclusive parts of the world. Those hosted in Europe attracted twice as many attacks as honeypots in Asia and four more than honeypots in the USA. This may be due to malware ‘factories’ running in Eastern Europe and Russia trying out their efforts locally before deploying them at some point in the arena.

[5] Chillingly, 14% of the malware amassed through honeypots became not detectable by using 51% of the arena’s top antivirus carriers. Even extra horrifying: this turned into no longer because those have been emblem-new malware; much of the malware that changed into overlooked changed into repackaged versions of older malware and consequently have to have been detected.

The report concluded with an announcement that safety inside the cloud is a shared duty. This is something that man or woman marketers, in addition to small and medium-sized businesses, generally tend to forget about. In cloud computing, the carrier provider is chargeable for the basics, for protective the computing surroundings. But the consumer is one hundred% liable for what takes place inside that surroundings and, to make certain safety, she or he desires to have a few technical expertise.


Advertisements by cloud service providers appear to mean that cloud computing is safer than on-premises computing. This is virtually now not genuine. Both environments appear to be similarly safe or dangerous viz-a-viz hackers and their malicious applications.

Irving Frazier
Irving Frazier
Future teen idol. Devoted communicator. Typical student. General analyst. Alcohol expert.Earned praise for training inflatable dolls in Deltona, FL. Was quite successful at building Virgin Mary figurines in Fort Walton Beach, FL. Had moderate success testing the market for saliva in Washington, DC. Earned praised for my work testing the market for basketballs in Fort Lauderdale, FL. Earned praised for my work importing teddy bears in Gainesville, FL. Spent the better part of the 90's developing shaving cream in Jacksonville, FL.

Most Popular