Cloud Computing – Is It Safe?

There are varieties of computing environments:

On-premises computing is the traditional shape of computing in which you or your organization personal and manipulates your systems. All the applications you use, and your statistics files are to your personal computers on your premises, both on individual PCs or an in-residence neighborhood vicinity community.

In cloud computing, by using assessment, your packages and documents are held remotely on the Internet (in cyberspace) in a community of servers operated by a 3rd celebration. You get the right to enter programs and paintings to your documents out of your PC without a doubt via logging directly to the network.


Cloud services are provided using cloud-hosting carriers, including Google, Amazon, Oracle Cloud, Rackspace, Microsoft Azure, etc.

There is nothing essentially new about the concept of cloud services. If you use Gmail, Hotmail, or Yahoo for your emails, you’re using cloud services and likely have been for years.

Notably, the styles of offerings presented are notably newcloud surroundings. These now move far past electronic mail to cover all the IT offerings that on-premises computing surroundings might supply, including accounting, marketing, human resources, etc.


  • [1]
  • [2]
  • [3]
  • [4]
  • [5]

Advantages of cloud computing

Cloud computing has several benefits over on-premises computing:

1) You can run software or get entry to your documents from everywhere in the international usage of any computer.

2) Cloud computing is cheaper.

Three) You need much less technical information.

4) Cloud computing supplies a better performance.

5) Cloud computing is eminently scalable. Increasing the variety of programs you operate or the number of statistics your shop does no longer requires heavy funding; you only need to advocate the cloud web hosting adviser.

Given these advantages, it is no wonder that cloud computing was rapidly adopted over the previous few years. Analysts estimate that the growth fee of all spending on cloud IT will be a minimum of 4 instances quicker than the boom price of all expenditures on on-premises computing.

Indeed, analysts anticipate the yearly increase in fee of spending on cloud computing to average 23.5% compound from now till 2017. Also, through that year, spending on cloud services will likely account for one-6th of all spending on IT merchandise, including packages, gadget infrastructure software programs, and basic storage.

Given the speedy increase in cloud computing, the huge question of direction is whether cloud computing is secure. Is it more or much less safe than on-premises computing?

The brief answer is that cloud computing is less secure than on-premises computing. However, the threats are somewhat special, even though they may converge.


Generally speaking, there are six foremost threats to laptop security. These are:

Malware – is malicious software that includes viruses, trojans, worms, adware, and zombies. Malware is mounted on an eiera PC in your home workplace or a cloud-computing server. It’s known as a botnet, where malware offers a community of computers to a malicious group (e.g., to ship spam).

Web app attack – is an assault wherein net-based applications are targeted. It is one of the most common kinds of attacks on the Internet.

Brute force assault works by trying all viable combos of letters or numbers to discover a cipher or secret key. For example, you may crack a password using, again and again, trying to wager it. Modern computing energy and speed make brute force a viable shape of assault.

Recon – is a reconnaissance hobby. This is used to pick victims who are each susceptible and valuable.

A vulnerability test – is an exploit using special software to access weaknesses in computers, systems, networks, or packages to generate records for making plans for an assault.

App assault – is an attack against an application or carrier that is not jogging on the web, i.e., this system will be on a computer somewhere.


A honeypot is a decoy internet site, community, machine, or software intentionally designed to be vulnerable to attack. Its motive is to accumulate facts about attackers and the way they paint.

Honeypots permit researchers to:

gather statistics on new and rising malware and determine tendencies in threats
pick out the sources of assaults, which include info on their IP addresses
determine how attacks take the area and the way to counteract them
decide attack signatures (portions of code that can be precise to unique pieces of malware) so that antivirus software programs can realize them
develop defenses in opposition to specific threats
Honeypots have proved to be valuable in erecting defenses against hackers.

The Spring 2014 Cloud Security Report

Alert Logic gives security services for each on-premises and cloud PC structure. The company commenced issuing cloud safety reviews in 2012. Its Spring 2014 Cloud Security Report covers the year ending 30 September 2013.

This record is based on an aggregate of actual-world safety incidents experienced using Alert Logic’s customers and descriptions gathered from a chain of honeypots the employer set up around the sector.

The document throws some exciting light on the safety of on-premises and cloud computing regarding the employer’s customers. Here are a number of the highlights:

[1] Computing is transferring increasingly more from on-premises to cloud-based computing, and the attacks that focus on on-premises systems are concentrated on cloud environments. This might be because of the increasing fee of capability victims in the cloud.

[2] Although assaults on cloud environments increase frequently, the cloud isn’t inherently less at ease than traditional on-premises computing.

[3] The frequency of attacks in both on-premises and cloud computing has accelerated for most threats, although it has fallen for a few forms of threats. Here are the principle factors of comparison among both computing environments:

The most commonplace sorts of assaults against on-premises clients had been malware assaults (inclusive of botnets) at fifty-six at some point in the six months ending thirtieth September. At only eleven, those attacks have been plenty less frequent amongst cloud clients. However, the quantity of cloud customers experiencing those assaults is rising quickly, more than doubling in three hundred and sixty-five days.

Attacks brute force elevated from 30% to 44% of cloud clients; however, they remained solid in on-premises environments at an excessive forty-nine%. Vulnerability scans jumped dramatically in each domain. Brute force assaults and vulnerability scans are happening at nearly identical rates in on-premises and cloud environments.

Web app assaults are more likely amongst cloud customers. However, those attacks are down year-on-year in each cloud and on-premises computing, as are recons. App attacks improved slightly in each class of customers.

The maximum universal forms of attacks vary among on-premises and cloud environments. In on-premises computing, the top 3 have been malware (fifty six% of clients), brute force (49%), and vulnerability scans (40); even inside the cloud, the most, not unusual incidents were brute force, vulnerability scans, and net app assaults, each of which affected forty-four% of clients.

[4] The incidents related to Alert Logic’s cloud-based total honeypots varied in specific arena components. Those hosted in Europe attracted two times as many assaults as honeypots in Asia and four times greater than honeypots within the USA. This can be because malware ‘factories ran in Eastern Europe and Russia, checking out their efforts domestically earlier than deploying them in the arena.

[5] Chillingly, 14% of the malware gathered using honeypots became no longer detectable by using 51% of the world’s pinnacle antivirus vendors. Even extra horrifying: this changed not because those were logo-new malware; lots of the malware that changed into overlooked became repackaged versions of older malware and, consequently, ought to have been detected.

The document concluded with a statement that security in the cloud is a shared obligation. People entrepreneurs, in addition to small and medium-sized organizations, generally tend to forget about this.

In cloud computing, the service issue is chargeable for the basics, for defensive computing surroundings. But the consumer is a hundred chargeable for what occurs within that surroundings, and to ensure safety, they wish to have a few technical information.

About author

I work for WideInfo and I love writing on my blog every day with huge new information to help my readers. Fashion is my hobby and eating food is my life. Social Media is my blood to connect my family and friends.
    Related posts

    The Dangerous World of Pro Ana Websites: Why They Should Be Avoided


    The Simple Steps on How to Recover Data from External Hard Disk


    5 Secrets About Your Computer You Need to Know


    A Short Survey of Java 9 Features and Highlights

    Sign up for our newsletter and stay informed !