{"id":12137,"date":"2015-02-13T10:00:53","date_gmt":"2015-02-13T10:00:53","guid":{"rendered":"https:\/\/www.whizlabs.com\/?p=12137"},"modified":"2015-02-13T10:00:53","modified_gmt":"2015-02-13T10:00:53","slug":"cloud-security","status":"publish","type":"post","link":"https:\/\/www.whizlabs.com\/blog\/cloud-security\/","title":{"rendered":"Cloud Security"},"content":{"rendered":"<p>\u201cEvery cloud has a silver lining\u201d goes the saying but I do wonder if the cloud that most of us are associated with in the IT world indeed has a silver lining or not. Yes, we will be discussing the cloud and its threats in this post.<\/p>\n<p>Most organizations mull their decision to move crucial data to the cloud just as parents ponder over choices about digital independence for their children. The cloud environment is undoubtedly a boon to many organizations based on some of the points listed below:<\/p>\n<ol>\n<li>It allows its employees to work from anywhere giving them additional flexibility<\/li>\n<li>This in turn enables streamlined processes<\/li>\n<li>The cloud also greatly reduces spending on infrastructure costs<\/li>\n<\/ol>\n<p>Since cost and flexibility hold sway over customers and employers a record number of corporations move their data to the cloud. From a security professional\u2019s perspective though, this is basically giving complete control of your data to someone else.<\/p>\n<p>Now that we have seen why corporations move to the cloud, let us next discuss cloud security threats.<\/p>\n<h3>Cloud security threats:<\/h3>\n<p>According to a report from Cloud security alliance, here are the top five cloud security threats:<\/p>\n<ol>\n<li>Data breach<\/li>\n<li>Data loss<\/li>\n<li>Account or service hijacking<\/li>\n<li>Malicious insiders<\/li>\n<li>Denial of service attacks\u00a0(The Notorious Nine &#8211; Cloud Computing Top Threats in 2013)<\/li>\n<\/ol>\n<p>Discussing these threats in more detail now.<\/p>\n<ol>\n<li><strong>Data breach :\u00a0<\/strong><span style=\"line-height: 1.5em\">\u201cData\u201d \u2013 this four letter word has a lot of magic today! It is this data that is being extracted, manipulated and studied with a lot of scrutiny. When this data falls into wrong hands, it gives CIOs and CEOs more misery and that is what is exactly meant by \u201cdata breach\u201d \u2013 information falling into wrong hands. According to Wikipedia, \u201cA data breach is a security incident in which sensitive, protected or confidential data is copied, transmitted, viewed, stolen or used by an individual unauthorized to do so\u201d. Examples of cloud data breaches include the Dropbox episode in 2012, Twitter episode in 2009 to name a few.<\/span><\/li>\n<li><strong>Data loss :<\/strong>\u00a0<span style=\"line-height: 1.5em\">Data loss is the permanent loss of data thereby crippling organizations and bringing them to a standstill. Reusing passwords for multiple websites is one of the primary reasons that this might happen.<br \/>\n<\/span><span style=\"line-height: 1.5em\">Data loss may happen when malicious attackers gain access to one account and gain control of other accounts (gmail, Twitter) and obliterate all information contained therein. Attackers are not the only reason why data loss occurs \u2013 natural calamities are another reason and it is always a good idea to backup.\u00a0<\/span><\/li>\n<li><strong>Account or service hijacking<\/strong> :\u00a0<span style=\"line-height: 1.5em\">Account or service hijacking again happens due to reuse of same password for multiple websites. Once an attacker gains access to your cloud account he\/she can manipulate the data and redirect all your traffic to other mischievous sites.<\/span><\/li>\n<li><strong>Malicious insiders :<\/strong>\u00a0<span style=\"line-height: 1.5em\">Having given control of an entire organization\u2019s private data to the CSP or the \u2018cloud service provider\u2019, there is always the risk of a malicious insider tampering the data.\u00a0<\/span><\/li>\n<li><strong>Denial of service attacks :<\/strong>\u00a0<span style=\"line-height: 1.5em\">These types of attacks prevent legitimate users from accessing services on the cloud thereby frustrating them and causing more financial and mental hardships.<\/span><\/li>\n<\/ol>\n<p>We discussed cloud security in the post \u2013 we will discuss the countermeasures to deal with cloud threats in yet another post.<\/p>\n<h4>Bibliography<\/h4>\n<p><i>The Notorious Nine &#8211; Cloud Computing Top Threats in 2013<\/i>. (n.d.). Retrieved from cloudsecurityalliance.com:<\/p>\n<p>https:\/\/downloads.cloudsecurityalliance.org\/initiatives\/top_threats\/The_Notorious_Nine_Cloud_Computing_Top_Threats_in_2013.pdf<\/p>\n<p>&nbsp;<\/p>\n","protected":false},"excerpt":{"rendered":"<p>\u201cEvery cloud has a silver lining\u201d goes the saying but I do wonder if the cloud that most of us are associated with in the IT world indeed has a silver lining or not. Yes, we will be discussing the cloud and its threats in this post. Most organizations mull their decision to move crucial data to the cloud just as parents ponder over choices about digital independence for their children. The cloud environment is undoubtedly a boon to many organizations based on some of the points listed below: It allows its employees to work from anywhere giving them additional [&hellip;]<\/p>\n","protected":false},"author":145,"featured_media":0,"comment_status":"open","ping_status":"open","sticky":false,"template":"","format":"standard","meta":{"_uag_custom_page_level_css":"","site-sidebar-layout":"default","site-content-layout":"","ast-site-content-layout":"default","site-content-style":"default","site-sidebar-style":"default","ast-global-header-display":"","ast-banner-title-visibility":"","ast-main-header-display":"","ast-hfb-above-header-display":"","ast-hfb-below-header-display":"","ast-hfb-mobile-header-display":"","site-post-title":"","ast-breadcrumbs-content":"","ast-featured-img":"","footer-sml-layout":"","theme-transparent-header-meta":"","adv-header-id-meta":"","stick-header-meta":"","header-above-stick-meta":"","header-main-stick-meta":"","header-below-stick-meta":"","astra-migrate-meta-layouts":"default","ast-page-background-enabled":"default","ast-page-background-meta":{"desktop":{"background-color":"var(--ast-global-color-4)","background-image":"","background-repeat":"repeat","background-position":"center center","background-size":"auto","background-attachment":"scroll","background-type":"","background-media":"","overlay-type":"","overlay-color":"","overlay-opacity":"","overlay-gradient":""},"tablet":{"background-color":"","background-image":"","background-repeat":"repeat","background-position":"center center","background-size":"auto","background-attachment":"scroll","background-type":"","background-media":"","overlay-type":"","overlay-color":"","overlay-opacity":"","overlay-gradient":""},"mobile":{"background-color":"","background-image":"","background-repeat":"repeat","background-position":"center center","background-size":"auto","background-attachment":"scroll","background-type":"","background-media":"","overlay-type":"","overlay-color":"","overlay-opacity":"","overlay-gradient":""}},"ast-content-background-meta":{"desktop":{"background-color":"var(--ast-global-color-5)","background-image":"","background-repeat":"repeat","background-position":"center center","background-size":"auto","background-attachment":"scroll","background-type":"","background-media":"","overlay-type":"","overlay-color":"","overlay-opacity":"","overlay-gradient":""},"tablet":{"background-color":"var(--ast-global-color-5)","background-image":"","background-repeat":"repeat","background-position":"center center","background-size":"auto","background-attachment":"scroll","background-type":"","background-media":"","overlay-type":"","overlay-color":"","overlay-opacity":"","overlay-gradient":""},"mobile":{"background-color":"var(--ast-global-color-5)","background-image":"","background-repeat":"repeat","background-position":"center center","background-size":"auto","background-attachment":"scroll","background-type":"","background-media":"","overlay-type":"","overlay-color":"","overlay-opacity":"","overlay-gradient":""}},"footnotes":""},"categories":[10],"tags":[617],"class_list":["post-12137","post","type-post","status-publish","format-standard","hentry","category-cloud-computing-certifications","tag-cloud-security"],"uagb_featured_image_src":{"full":false,"thumbnail":false,"medium":false,"medium_large":false,"large":false,"1536x1536":false,"2048x2048":false,"profile_24":false,"profile_48":false,"profile_96":false,"profile_150":false,"profile_300":false,"tptn_thumbnail":false,"web-stories-poster-portrait":false,"web-stories-publisher-logo":false,"web-stories-thumbnail":false},"uagb_author_info":{"display_name":"Sparsh Goyal","author_link":"https:\/\/www.whizlabs.com\/blog\/author\/sparsh\/"},"uagb_comment_info":83,"uagb_excerpt":"\u201cEvery cloud has a silver lining\u201d goes the saying but I do wonder if the cloud that most of us are associated with in the IT world indeed has a silver lining or not. Yes, we will be discussing the cloud and its threats in this post. Most organizations mull their decision to move crucial&hellip;","_links":{"self":[{"href":"https:\/\/www.whizlabs.com\/blog\/wp-json\/wp\/v2\/posts\/12137","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/www.whizlabs.com\/blog\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/www.whizlabs.com\/blog\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/www.whizlabs.com\/blog\/wp-json\/wp\/v2\/users\/145"}],"replies":[{"embeddable":true,"href":"https:\/\/www.whizlabs.com\/blog\/wp-json\/wp\/v2\/comments?post=12137"}],"version-history":[{"count":0,"href":"https:\/\/www.whizlabs.com\/blog\/wp-json\/wp\/v2\/posts\/12137\/revisions"}],"wp:attachment":[{"href":"https:\/\/www.whizlabs.com\/blog\/wp-json\/wp\/v2\/media?parent=12137"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/www.whizlabs.com\/blog\/wp-json\/wp\/v2\/categories?post=12137"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/www.whizlabs.com\/blog\/wp-json\/wp\/v2\/tags?post=12137"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}