SlideShare a Scribd company logo
Are Cloud Applications and Data more
Vulnerable to Attacks?
Cloud computing is a trillion dollar business to eliminate organizational IT
Storage infrastructures. And “The Cloud” has a great capacity for transporting
terabytes of data at very fast speed.
The risks are dependent on the security risks’ assessment, mitigation, and
response, i.e., Disaster Recovery Plan, Number of Data Centers’ accesses and
locations, Fallback Recovery and or Protection systems, and Regulatory
Compliance Measures.
By Sonia Usih 1
Once a Cloud internet communication protocol is established, it is possible to
share services of Client’s Application, Platform, Infrastructure, and Server,
including all Data (information).
“Data in storage” of the Cloud environments are more “Vulnerable to Attacks.”
Explained in the Technet magazine in July 2013 by Dan C. Marinescu,
Professor of Computer Science, http://technet.microsoft.com/en-
us/magazine/dn271884.aspx
“The most significant challenge is security…Highly sensitive applications
related to critical infrastructure management, health-care applications and others
will most likely be hosted by private clouds … The Software as a Service
(SaaS) model faces similar challenges as other online services required to
protect private information, such as financial or health-care services … Still,
such services are vulnerable to DoS attacks and malicious insiders.
Data in storage is most vulnerable to attack, so devote special attention
to protecting storage servers. The data replication necessary to ensure continuity
of service in case of storage system failure increases vulnerability. Data
encryption may protect data in storage, but eventually data must be decrypted for
processing. Then it’s exposed to attack … The Infrastructure as a Service
(IaaS) model is by far the most challenging to defend against attacks. Indeed,
an IaaS user has much more freedom than the other two cloud delivery models.
An additional source of concern is that the considerable cloud resources could be
used to initiate attacks against the network and the computing infrastructure …
Virtualization is a critical design option for this model, but it exposes
the system to new sources of attack. The trusted computing base (TCB) of a
virtual environment includes not only the hardware and the hypervisor but also
the management OS. You can save the entire state of a virtual machine (VM)
to a file to allow migration and recovery … Yet this possibility challenges
the strategies to bring the servers belonging to an organization to a
desirable and stable state. Indeed, an infected VM can be inactive
By Sonia Usih 2
when the systems are cleaned up. Then it can wake up later and
infect other systems. This is another example of the deep
intertwining of desirable and undesirable effects of basic cloud
computing technologies.”
By Sonia Usih 3

More Related Content

PDF
Csathreats.v1.0
PPT
Information Governance and technology
PPTX
Cloud Computing Security Threats and Responses
PDF
Excellent Manner of Using Secure way of data storage in cloud computing
PPTX
Security and Privacy Challenges in Cloud Computing Environments
PDF
Investigative analysis of security issues and challenges in cloud computing a...
PDF
PaaSword: A Holistic Data Privacy and Security by Design Framework for Cloud ...
PDF
SECURITY APPREHENSIONS IN DIFFERENT REGIONS OF CLOUD CAPTIOUS GROUNDS
Csathreats.v1.0
Information Governance and technology
Cloud Computing Security Threats and Responses
Excellent Manner of Using Secure way of data storage in cloud computing
Security and Privacy Challenges in Cloud Computing Environments
Investigative analysis of security issues and challenges in cloud computing a...
PaaSword: A Holistic Data Privacy and Security by Design Framework for Cloud ...
SECURITY APPREHENSIONS IN DIFFERENT REGIONS OF CLOUD CAPTIOUS GROUNDS

What's hot (20)

PPT
Ahearn Cloud Presentation
PPT
PaaSword: A Holistic Data Privacy and Security by Design Framework for Cloud ...
PDF
Risk Management in the Cloud
PPT
Unit 3 -Data storage and cloud computing
PPTX
Cloud computing
PDF
The NIST Definition of Cloud Computing
PPTX
Security in cloud computing
PDF
Enhancing Data Storage Security in Cloud Computing Through Steganography
PPTX
Research proposal on Computing Security and Reliability - Phdassistance.com
PDF
Infographic - Cloud Hosting and Tenancy
PPTX
Cloud Computing
PDF
Strategy for Holistic Security
PDF
A SECURITY FRAMEWORK IN CLOUD COMPUTING INFRASTRUCTURE
PPT
Lee Newcombe, Capgemini “Security threats associated with cloud computing”
PPT
CLOUD COMPUTING AND STORAGE
PPTX
Cloud computing security
PDF
DATA STORAGE SECURITY CHALLENGES IN CLOUD COMPUTING
PDF
A survey on data security in cloud computing issues and mitigation techniques
PDF
A Survey of Cloud Computing Security Issues and Consequences
PDF
Security Concerns in Cloud Computing
Ahearn Cloud Presentation
PaaSword: A Holistic Data Privacy and Security by Design Framework for Cloud ...
Risk Management in the Cloud
Unit 3 -Data storage and cloud computing
Cloud computing
The NIST Definition of Cloud Computing
Security in cloud computing
Enhancing Data Storage Security in Cloud Computing Through Steganography
Research proposal on Computing Security and Reliability - Phdassistance.com
Infographic - Cloud Hosting and Tenancy
Cloud Computing
Strategy for Holistic Security
A SECURITY FRAMEWORK IN CLOUD COMPUTING INFRASTRUCTURE
Lee Newcombe, Capgemini “Security threats associated with cloud computing”
CLOUD COMPUTING AND STORAGE
Cloud computing security
DATA STORAGE SECURITY CHALLENGES IN CLOUD COMPUTING
A survey on data security in cloud computing issues and mitigation techniques
A Survey of Cloud Computing Security Issues and Consequences
Security Concerns in Cloud Computing
Ad

Similar to Are Cloud Applications and Data more Vulnerable to Attacks? (20)

PDF
Protecting Dynamic Datacenters From the Latest Threats
PDF
A Multi-Level Security for Preventing DDOS Attacks in Cloud Environments
DOC
Security Issues in Cloud Computing by rahul abhishek
PDF
Cloud technology to ensure the protection of fundamental methods and use of i...
PDF
Iaetsd cloud computing and security challenges
PDF
Literature Review: Security on cloud computing
PDF
SECURE CLOUD ARCHITECTURE
PDF
New Approaches to Security and Availability for Cloud Data
 
PDF
Security threat issues and countermeasures in cloud computing
PDF
MIST Effective Masquerade Attack Detection in the Cloud
PDF
Migration of Virtual Machine to improve the Security in Cloud Computing
PDF
Secure Virtualization for Cloud Environment Using Guest OS and VMM-based Tech...
PDF
wp-security-dbsec-cloud-3225125
PDF
B1802041217
DOCX
CSEC630 individaul assign
PDF
Security Issues in Cloud Computing Cloud computing has come a vital tool for ...
PDF
Security Issues in Cloud Computing by rahul abhishek
PDF
Project 3
PDF
N017259396
PDF
Internal & External Attacks in cloud computing Environment from confidentiali...
Protecting Dynamic Datacenters From the Latest Threats
A Multi-Level Security for Preventing DDOS Attacks in Cloud Environments
Security Issues in Cloud Computing by rahul abhishek
Cloud technology to ensure the protection of fundamental methods and use of i...
Iaetsd cloud computing and security challenges
Literature Review: Security on cloud computing
SECURE CLOUD ARCHITECTURE
New Approaches to Security and Availability for Cloud Data
 
Security threat issues and countermeasures in cloud computing
MIST Effective Masquerade Attack Detection in the Cloud
Migration of Virtual Machine to improve the Security in Cloud Computing
Secure Virtualization for Cloud Environment Using Guest OS and VMM-based Tech...
wp-security-dbsec-cloud-3225125
B1802041217
CSEC630 individaul assign
Security Issues in Cloud Computing Cloud computing has come a vital tool for ...
Security Issues in Cloud Computing by rahul abhishek
Project 3
N017259396
Internal & External Attacks in cloud computing Environment from confidentiali...
Ad

More from Sonia Usih, PMP, MCPM, BSc. (11)

DOC
Transformation Challenges USA
DOC
If you have Knowledge
DOC
Transformational servant-innovation leadership
DOC
To be sustainable
DOC
My computer Hi-jacked
DOC
The National Security Agency (NSA) -- PRISM Surveillance System _Not a Surpri...
PPT
Compliance legal-regulatory risks in terms of documenting
PPT
SoniaUsihEngineeringGRAD1987
PPT
Sonia Usih Career Brand
PPT
Create Value In Projects Through Information Ecology2
PPT
New Change Implementation
Transformation Challenges USA
If you have Knowledge
Transformational servant-innovation leadership
To be sustainable
My computer Hi-jacked
The National Security Agency (NSA) -- PRISM Surveillance System _Not a Surpri...
Compliance legal-regulatory risks in terms of documenting
SoniaUsihEngineeringGRAD1987
Sonia Usih Career Brand
Create Value In Projects Through Information Ecology2
New Change Implementation

Recently uploaded (20)

PPTX
Improved_Leadership_in_Total_Quality_Lesson.pptx
PPT
Claims and Adjustment Business_Communication.pptx.ppt
PPTX
Course Overview of the Course Titled.pptx
PPTX
Course Overview of the Course Titled.pptx
PDF
Air India AI-171 Crash in Ahmedabad A Tragic Wake-Up Call.
PPTX
Consulting on marketing-The needs wants and demands are a very important comp...
PPTX
Project Management Methods PERT-and-CPM.pptx
PDF
The-Power-of-Communication (1).pdf......
PDF
Features of Effective decision making in Management
PPTX
Human Resources management _HR structure
PPTX
Chapter One an overview of political economy
PPTX
MY GOLDEN RULES la regla de oro jhonatan requena
PPTX
Supervisory Styles and When to Use Them!
PDF
1_Corporate Goverance presentation topic
PDF
CISSP - Domain 7: Security Operations - InfoSec Institute
PDF
Contemporary management and it's content
PDF
CHAPTER 14 Manageement of Nursing Educational Institutions- planing and orga...
PDF
Equity at the Helm_ Guiding Schools Through Inclusive Leadership by Dr.pdf
PPTX
Leadership for Industry 4.0 And Industry 5.0
PDF
Leveraging Intangible Assets Through Campus Entrepreneurship and Tech Transfer
Improved_Leadership_in_Total_Quality_Lesson.pptx
Claims and Adjustment Business_Communication.pptx.ppt
Course Overview of the Course Titled.pptx
Course Overview of the Course Titled.pptx
Air India AI-171 Crash in Ahmedabad A Tragic Wake-Up Call.
Consulting on marketing-The needs wants and demands are a very important comp...
Project Management Methods PERT-and-CPM.pptx
The-Power-of-Communication (1).pdf......
Features of Effective decision making in Management
Human Resources management _HR structure
Chapter One an overview of political economy
MY GOLDEN RULES la regla de oro jhonatan requena
Supervisory Styles and When to Use Them!
1_Corporate Goverance presentation topic
CISSP - Domain 7: Security Operations - InfoSec Institute
Contemporary management and it's content
CHAPTER 14 Manageement of Nursing Educational Institutions- planing and orga...
Equity at the Helm_ Guiding Schools Through Inclusive Leadership by Dr.pdf
Leadership for Industry 4.0 And Industry 5.0
Leveraging Intangible Assets Through Campus Entrepreneurship and Tech Transfer

Are Cloud Applications and Data more Vulnerable to Attacks?

  • 1. Are Cloud Applications and Data more Vulnerable to Attacks? Cloud computing is a trillion dollar business to eliminate organizational IT Storage infrastructures. And “The Cloud” has a great capacity for transporting terabytes of data at very fast speed. The risks are dependent on the security risks’ assessment, mitigation, and response, i.e., Disaster Recovery Plan, Number of Data Centers’ accesses and locations, Fallback Recovery and or Protection systems, and Regulatory Compliance Measures. By Sonia Usih 1
  • 2. Once a Cloud internet communication protocol is established, it is possible to share services of Client’s Application, Platform, Infrastructure, and Server, including all Data (information). “Data in storage” of the Cloud environments are more “Vulnerable to Attacks.” Explained in the Technet magazine in July 2013 by Dan C. Marinescu, Professor of Computer Science, http://technet.microsoft.com/en- us/magazine/dn271884.aspx “The most significant challenge is security…Highly sensitive applications related to critical infrastructure management, health-care applications and others will most likely be hosted by private clouds … The Software as a Service (SaaS) model faces similar challenges as other online services required to protect private information, such as financial or health-care services … Still, such services are vulnerable to DoS attacks and malicious insiders. Data in storage is most vulnerable to attack, so devote special attention to protecting storage servers. The data replication necessary to ensure continuity of service in case of storage system failure increases vulnerability. Data encryption may protect data in storage, but eventually data must be decrypted for processing. Then it’s exposed to attack … The Infrastructure as a Service (IaaS) model is by far the most challenging to defend against attacks. Indeed, an IaaS user has much more freedom than the other two cloud delivery models. An additional source of concern is that the considerable cloud resources could be used to initiate attacks against the network and the computing infrastructure … Virtualization is a critical design option for this model, but it exposes the system to new sources of attack. The trusted computing base (TCB) of a virtual environment includes not only the hardware and the hypervisor but also the management OS. You can save the entire state of a virtual machine (VM) to a file to allow migration and recovery … Yet this possibility challenges the strategies to bring the servers belonging to an organization to a desirable and stable state. Indeed, an infected VM can be inactive By Sonia Usih 2
  • 3. when the systems are cleaned up. Then it can wake up later and infect other systems. This is another example of the deep intertwining of desirable and undesirable effects of basic cloud computing technologies.” By Sonia Usih 3