Cloud Computing
Please find the attached questionaire
Review in 350 words or more the video below called Cloud Security Myths.
Use at least three sources. Include at least 3 quotes from your sources enclosed in quotation marks and cited in-line by reference to your reference list. Cite your sources. Do not copy. Write an essay format not in bulleted, numbered or other list format.
Topic Cloud security myths
Read and respond to below two student’s discussions. (5-6 lines would be more sufficient) reflecting on your own experience, challenging assumptions, pointing out something new you learned, offering suggestions
#1. Posted by Suprith
Even in this day and age, some businesses remain fearful of the Cloud. Data security for a business is paramount and with so many companies feeling comfortable about moving their business to the Cloud, surely the Cloud cannot be as risky as we are led to believe. Following are the common myths related to security in cloud.
On premise systems are much faster than cloud: It’s interesting that so many business leaders still consider on-premise business systems as so much safer than Cloud solutions. Yet storing data on-premise is asking to keep all the data under one box. Far too many businesses still have on-site servers that are inherently risky due to location, questionable back-up processes and defective security measures. Servers in unsecured places and business owners with data backed up to USB devices on keyrings are worryingly common. The malicious theft of data from a disgruntled employee, a fraudulent act from an unscrupulous insider and negligent/accidental behavior that creates a security breach, are still far more common than cyber-attacks. An on-premise server offers ‘insiders’ far greater access to the company’s precious data. It’s important to keep concerns about the Cloud in context. If the combined purchasing power of a global installed base can make best-in-class security and availability affordable to the majority, then surely anything that takes the risks out of a business is a good thing.
All Clouds are created equal: There are so many different offerings of Cloud services that bunching them all together under one heading can be misleading. At a personal level, for example, most people don’t know where their data is anymore. So, when you save your iPhone photos to iCloud or manage your Facebook profile all the data resides in cloud. What happens if you can’t access it one day or it disappears altogether? This may be a small risk to an individual, but this level of uncertainty would be entirely unacceptable for a business.
Cloud security has little to do with technology partner: The term “Cloud Computing” is popular so it stands to reason that traditional software companies see a wider market for their applications if they, too, are “Cloud”.
Be wary of re-engineered applications, or as some people call them “fake Clouds” which could be something as simple as your own software running on someone else’s server. This is not solving the challenge of moving to the Cloud, this is just taking your server off your premises and moving it somewhere else. If you want to enjoy the benefits of “true Cloud”, look for a partner who works only with true Cloud applications and does not volunteer for the onerous task of providing.
Business cloud system employs same level of security: Obviously, enterprise class business systems need to be far more secure than personal ‘data Clouds’. However, you can’t assume that all Cloud business solutions have the same level of security. The measures different providers put in place can be worlds apart! ‘Best in class’ Cloud providers have extremely tight security measures in place. Research is a must here. Security is a primary consideration and so each business needs to conduct its own diligence.
#2. Posted by Raja
Security is constantly a major worry in data innovation. Companies burn a large number of dollars consistently on security. Nowadays every association moving to cloud since cloud gives different administrations at more affordable. Despite the fact that associations moving their infrastructure and applications and databases to the cloud security is as yet a worry. There are numerous worries or fantasies about cloud security. There are numerous specialists composed article on cloud security. Few people say cloud is more secure it is more secure than some other security. Then again, there are numerous articles composed on cloud security vulnerabilities. Here are few ways how we can secure the cloud.
Few people are saying that cloud is more affordable. Numerous associations moved to cloud with the idea of cloud is more affordable. It is difficult to state whether the cloud is costly or not. Since, association pay cash for cloud administrations, however they don’t go through administrations to full degree. For certain associations cloud is less expensive yet for different associations it is over the top expensive. Everything relies upon up to which degree they utilize the cloud administrations. Few cloud legends will say that cloud isn’t secure. The public cloud is one of the cloud organizations models that cloud offers. According to articles cloud suppliers are burning through a large number of dollars on security. They have most complex Security Incident and Event Management systems and security activity focuses. Still a portion of the associations couldn’t exploit the cloud security. Cloud security is a mutual duty. Additionally, the possibility of public cloud verifies everything. General society cloud suppliers are liable for verifying their very own network. Cloud clients ought to comprehend this before they move their information and applications to the cloud. Another fantasy is cloud consistence is progressively unpredictable in the cloud. It is dubious some of the time what sort of consistence is required for cloud administrations.
As per “Tripwire Guest Authors” on Feb 6, 2018 analysis the cloud is simpler to assault. With the present innovation nothing is difficult to infiltrate. Then again, there are numerous approaches to avoid stopping every one of these entrances. The cloud is persistently fixing the any security vulnerabilities. Additionally, cloud utilizes two firewalls, i) internal/inside firewall, and ii) outside/external firewall. There is another fantasy about information security in cloud. It says anybody can get to the information in cloud. Since the cloud is shared anybody can get to different information in cloud. It isn’t totally obvious that others can get to the information.
Few of different myths says that we can’t check how our information is being utilized. By using the cloud internal logs Cloud suppliers will identify which employee doing what and what kind of changes. Additionally, cloud specialists will perform the security checks to keeps an eye on their own representatives and do some individual verifications. These are a few portions of the fantasies that are going on about cloud. At last these all are fantasies. At whatever point we contrast the cloud security and on location stockpiling arrangement the cloud security is better.