Cloud Computing – Is It Safe?

There are basically varieties of computing environments:

On-premises computing is the traditional shape of computing in which you or your organization personal and manipulates your own systems. All the applications you use, and your statistics files are to your personal computers on your very own premises, both on person PCs or an in-residence neighborhood vicinity community.

In cloud computing, by using assessment, your packages and documents are held remotely on the Internet (in cyberspace) in a community of servers operated by a 3rd celebration. You get right of entry to programs and paintings to your documents out of your PC without a doubt via logging directly to the network.

Cloud services are provided by using cloud-hosting carriers, companies including Google, Amazon, Oracle Cloud, Rackspace, Microsoft Azure, etc.

There is nothing essentially new about the concept of cloud services. If you are using Gmail, Hotmail, or Yahoo for your emails, you’re the use of cloud services and likely have been for years.

What is notably new is the styles of offerings that are being presented in cloud-surroundings. These now move far past electronic mail to cowl all of the IT offerings that on-premises computing surroundings might supply, including accounting, marketing, human resources, and so on.


  • [1]
  • [2]
  • [3]
  • [4]
  • [5]

Advantages of cloud computing

Cloud computing has several benefits over on-premises computing:

1) You can run software or get entry to your documents from everywhere in the international the usage of any computer.

2) Cloud computing is cheaper.

Three) You need much less technical information.

4) Cloud computing supplies a better performance.

5) Cloud computing is eminently scalable. Increasing the variety of programs you operate or the number of statistics your shop does no longer require heavy funding; you only need to advocate the cloud web hosting adviser.

Given these advantages, it no wonders that there was a giant speedy adoption of cloud computing over the previous couple of years. Analysts estimate that the growth fee of all spending on the cloud, IT will quickly be a minimum of 4 instances quicker than the boom price of all spending on on-premises computing.

Indeed, analysts anticipate the yearly increase fee of spending on cloud computing to average 23.5% compound from now till 2017. Also, through that yr spending on cloud services will in all likelihood account for one-6th of all spending on IT merchandise, which includes packages, gadget infrastructure software programs, and basic storage.

Given the speedy increase in cloud computing, the huge question of direction is whether cloud computing is secure. Is it more or much less secure than on-premises computing?

The brief answer is that cloud computing is not much less secure than on-premises computing. However, the threats are somewhat special in nature, even though they may be converging.


Generally speaking, there are six foremost threats to laptop security. These are:

Malware – is malicious software that includes viruses, trojans, worms, adware, and zombies. Malware is mounted on both a PC in your own home workplace or a cloud-computing server. Where malware offers a community of computers to a malicious group (e.g., to ship spam), it’s far known as a botnet.

Web app attack – is an assault wherein net-based applications are targeted. It is one of the maximum common kinds of attacks on the Internet.

Brute force assault – works by using trying all viable combos of letters or numbers so that you can discover a cipher or secret key. For example, you may crack a password using, again and again, trying to wager it. Modern computing energy and speed make brute force a viable shape of assault.

Recon – is a reconnaissance hobby. This is used to pick victims who are each susceptible and valuable.

A vulnerability test – is an exploit using special software to access weaknesses in computers, systems, networks, or packages to generate records for making plans for an assault.

App assault – is an attack against an application or carrier that is not jogging at the web, i.e., this system will be on a computer somewhere.


A honeypot is a decoy internet site, community, machine, or software that has been intentionally designed to be vulnerable to attack. Its motive is to accumulate facts approximately attackers and the way they paintings.

Honeypots permit researchers to:

gather statistics on new and rising malware and determine tendencies in threats
pick out the sources of assaults, which include info of their IP addresses
determine how attacks take the area and the way first-class to counteract them
decide attack signatures (portions of code which can be precise to unique pieces of malware) so that anti-virus software program can realize them
develop defenses in opposition to specific threats
Honeypots have proved to be valuable in erecting defenses towards hackers.

The Spring 2014 Cloud Security Report

Alert Logic gives security services for each on-premises and clouds PC structure. The company commenced issuing cloud safety reviews in 2012. Its Spring 2014 Cloud Security Report covers the yr ending 30th September 2013.

This record is based on an aggregate of actual-world safety incidents experienced using Alert Logic’s customers and records gathered from a chain of honeypots the employer set up around the sector.

The document throws some exciting light on the safety of on-premises and cloud computing regarding the employer’s customers. Here are a number of the highlights:

[1] Computing is transferring increasingly more from on-premises to cloud-based computing, and the forms of attacks that focus on on-premises systems at the moment are concentrated on cloud environments. This might be because of the increasing fee of capability victims in the cloud.

[2] Although assaults on cloud environments increase in frequency, the cloud isn’t inherently less at ease than traditional on-premises computing.

[3] The frequency of attacks in both on-premises and cloud computing has accelerated for most varieties of threats, although it has fallen for a few forms of threats. Here are the principle factors of comparison among both computing environments:

The most commonplace sorts of assaults against on-premises clients had been malware assaults (inclusive of botnets) at fifty-six% at some point in the six months ending thirtieth September. At only eleven%, those attacks have been plenty less frequent amongst cloud clients. However, the quantity of cloud customers experiencing those assaults is rising quickly, extra than doubling in three hundred and sixty-five days.

Attacks the use of brute force elevated from 30% to 44% of cloud clients; however, they remained solid in on-premises environments at an excessive forty-nine%. Vulnerability scans jumped dramatically in each environment. Brute force assaults and vulnerability scans at the moment are happening at nearly identical rates in on-premises and cloud environments.

Web app assaults are more likely amongst cloud customers. However, those attacks are down year-on-year in each cloud and on-premises computing, as are recons. App attacks improved slightly in each class of customers.

The maximum universal forms of attacks vary among on-premises and cloud environments. In on-premises computing, the top 3 have been malware (fifty six% of clients), brute force (49%), and vulnerability scans (forty%), even as inside the cloud, the most, not unusual incidents were brute force, vulnerability scans, and net app assaults, each of which affected forty-four% of clients.

[4] The incidents related to Alert Logic’s cloud-based totally honeypots varied in specific components of the arena. Those hosted in Europe attracted two times as many assaults as honeypots in Asia and four times greater than honeypots within the USA. This can be because malware ‘factories ran in Eastern Europe and Russia, checking out their efforts domestically earlier than deploying them in the arena.

[5] Chillingly, 14% of the malware gathered by using honeypots became no longer detectable by using 51% of the world’s pinnacle antivirus vendors. Even extra horrifying: this changed into not because those were logo-new malware; lots of the malware that changed into overlooked changed into repackaged versions of older malware and as a consequence ought to had been detected.

The document concluded with a statement that security in the cloud is a shared obligation. This is something that person entrepreneurs, in addition to small and medium-sized organizations, generally tend to forget about.

In cloud computing, the service issue is chargeable for the basics, for defensive computing surroundings. But the consumer is a hundred% chargeable for what occurs within that surroundings and, to ensure safety, she or he wishes to have a few technical information.

About author

I work for WideInfo and I love writing on my blog every day with huge new information to help my readers. Fashion is my hobby and eating food is my life. Social Media is my blood to connect my family and friends.
    Related posts

    Computer Viruses and How to Deal With Them


    Buying a Well-Configured Computer


    The Ultimate Minicomputer Build Guide for Beginners


    Simple Tips to Recover Data from Damaged Hard Disk Drive

    Sign up for our newsletter and stay informed !