PDF Google Drive Downloader v1.1


Báo lỗi sự cố

Nội dung text Unit-5-Cloud-Security.pdf



Cloud Computing (TU BCA VII Sem) Prepared by Bhawesh Kafle , Mechi Campus over extended periods of time, often adapting to the security measures intended to defend against them. Cloud security risks and solutions Cloud computing is continually transforming the way companies store, use, and share data, workloads, and software. The volume of cloud utilization around the globe is increasing, leading to a greater mass of sensitive material that is potentially at risk. The market for worldwide cloud computing is projected to grow to $191 billion in two years. There are many pros of cloud computing, which are driving more firms and individuals to the cloud. The benefits include low costs, improved employee productivity, and faster to market, among many more. Regardless of the great advantages, saving a firm’s workloads to a cloud service that is publicly hosted exposes the organization to new data security risks which cause unease for some firms’ IT departments and clients. With more and more data and software moving to the cloud, unique info-security challenges crop up. Here are the top cloud computing security risks that every firm faces. Cloud security risks 1. Theft or loss of intellectual property An outstanding 21% of data uploaded by companies to cloud-based file management services contain sensitive data. The analysis that was done by Skyhigh found that companies face the risk of having their intellectual property stolen. The Ponemon Institute and Surveying 409 IT investigated the risk posed by BYOC (bring your own cloud). The analysis revealed that most of the interviewees had no idea of the threat posed by bringing their own cloud storage devices to their organization. Employees unwittingly help cyber- criminals access sensitive data stored in their cloud accounts. Weak cloud security measures within an organization include storing data without encryption or failing to install multi-factor authentication to gain access to the service. 2. Compliance violations Organizations can quickly go into a state of non-compliance, which puts them in the risk of serious repercussions. BYOC is one of the ways companies often violate one of the tenets and regulations instituted by the government or Industrial Corporation. Whether it is FERPA for confidential student documents or HIPAA for private patient records, most firms operate under a regulatory body. bcanepaltu.com

Tài liệu liên quan

x
Báo cáo lỗi download
Nội dung báo cáo



Chất lượng file Download bị lỗi:
Họ tên:
Email:
Bình luận
Trong quá trình tải gặp lỗi, sự cố,.. hoặc có thắc mắc gì vui lòng để lại bình luận dưới đây. Xin cảm ơn.