Pages

Cloud Computing Security Issues

Cloud computing brings many innovations and advances in the information technology fields. Cloud allows businesses to focus on their business. It does not solve all of today's security problems and can cause more security problems that will need to be addressed. The power of cloud computing can be harnessed against other clouds to limit there performance. New attacks on the cloud system will keep security engineers busy to keep your data secure. Cloud computing is a colloquial expression used to describe a variety of different computing concepts that involve a large number of computers that are connected through a real-time communication applications and networks.

High availability and central administration make cloud with fast moving requirements make it appealing to cyber crime related people. What happens when an attacker gains access to your personal information. They can use credit card information to open different accounts. Critical applications housing sensitive data should not be built on a community or shared AMI. The difficulties of detecting malicious code are enormous and hackers know this. Each cloud service provides an interface to manage the system in the cloud which can introduce security risks. If an attacker is able to gain access to the management console directly he can alter the way the application runs.
Armando Fox is an Adjunct Associate Professor at UC Berkeley and a co-founder of the Berkeley AMP Lab. During his previous time at Stanford, he received teaching and mentoring awards from the Associated Students of Stanford University, the Society of Women Engineers, and Tau Beta Pi Engineering Honor Society. He was named one of the "Scientific American 50" in 2003 and is the recipient of an NSF CAREER award and the Gilbreth Lectureship of the National Academy of Engineering.

With cloud based offerings attacks are not as clear cut when dealing with stand alone systems. The attacker is able to tamper with the virtual machine settings or can modify the application running they will have access to your data on that virtual machine. Once a hacker gains access to a user's session he will have a wealth of personal information. Once the vicious AMI is launched from the account holder it can perform a number of malicious actions and take much personal data. After an attack the victim can see data was removed without their consent.

The hacker can attack the different billing models of the business and collect information on credit cards and personal data.The attacked application can charge the victim for going over their capacity since it can require band with to stop the attack. Today we use computing in very large amounts which make us targets to hackers.

In previous lives he helped design the Intel Pentium Pro microprocessor and founded a successful startup to commercialize his UC Berkeley dissertation research on mobile computing.Cloud computing

Use and distribution of this article is subject to our Publisher Guidelines
whereby the original author's information and copyright must be included.

0 comments:

Post a Comment

Related Posts Plugin for WordPress, Blogger...