Cloud Computing Definition | Cloud Security

Cloud Computing Definition | Cloud Security

Cloud Computing Definition

Cloud computing is an IT model, composed of hardware, software, networking, services and processes that together enable us to develop and deliver cloud
services through the Internet or a private network.

What is Cloud Service?

Services that are provided by a cloud and delivered over the Internet or a private network.

There are three types of cloud services available:

1. Infrastructure-as-a-service (IaaS):

This service provides infrastructure related components like virtual machines & other hardware and operating systems.

Examples of IaaS service providers are; Amazon Elastic Compute Cloud, Go Grid, Sun Grid.

2. Platform-as-a-service (PaaS):

It offers services like development tools, configuration management, and deployment platforms, allowing customers to develop, run, and manage applications without the complexity of building and maintaining the complete infrastructure.

Examples of PaaS service providers are; Microsoft Azure, Google app engine.

3. Software-as-a-service (SaaS):

It allows users to use cloud-based apps over the Internet like email, Microsoft office 365.

Example of SaaS service provider is; Salesforce Customer Relationship Management.

Cloud Computing Definition | Cloud Security

What is cloud deployment model?

A cloud deployment model is a cloud environment, distinguished by ownership, size, and access.

Mainly there are four types of cloud deployment models:

1. Public Cloud:

Services accessible over a network for public use.

2. Private Cloud:

Whole cloud infrastructure for a single company.

3. Hybrid Cloud:

Combination of more than one clouds offering benefits of multiple deployment models.

4. Community Cloud:

Shared infrastructure between various companies with common concerns like compliance or security.

Cloud Computing Definition | Cloud Security

What are the Cyber-Security concerns for cloud computing?

• Improper infrastructure design
• Data leakage
• Insecure APIs
• Insufficient logging and monitoring
• Malicious insider user
• Privilege escalation
• Natural disasters
• Hardware failure
• Weak authentication mechanism
• Weak encryption or cryptanalysis attack
• Theft of computer equipment
• No backup or weak backup configuration
• DOS attack
• Cross-site scripting attack
• Service hijacking attack
• Domain name system attack
• SQL injection attack
• Network sniffing attack

Cloud Security Testing – How to make secure cloud computing?

Cloud Computing Definition | Cloud Security

What is cloud penetration testing?

It is a method of evaluating the security controls implemented in the cloud system by performing real-life attacks.

Cloud security is the responsibility for both service provider and client.

Both external and internal penetration testing for the cloud is necessary since there are threats from hacker and internal employees also.

For cloud penetration testing, the scope should be:

• Web applications
• Mobile applications
• APIs
• Network
• Systems
• Firewall
• IDS
• Database

Best Cyber-Security practices for cloud

• The service provider must provide higher multi-tenancy. (Multi-tenancy means that a single instance of the software and the entire supporting infrastructure serves multiple customers). It secures cloud applications.
• Include “load balancing” to improve response time.
• Implement “Disaster Recovery Plan”.
• Encryption must be implemented.
• Enforce data protection, backup mechanism.
• Implement authentication, authorization and auditing processes properly.
• Review the cloud service provider’s security policies.
• Frequently update all the software, operating system, etc…
• Perform configuration audit for web servers, application servers and database servers.
• Wherever possible use two-factor authentication.
• Perform risk-assessment.
• Implement “incident detection” and “reporting” process.
• Do an audit, who is responsible for data security in the cloud.
• Create awareness about cloud security responsibilities.

73 Replies to “Cloud Computing Definition | Cloud Security”

  1. Undeniably consider that which you stated. Your favourite justification appeared to be at the internet the easiest thing to consider of.

    I say to you, I definitely get irked at the same time as people
    consider issues that they plainly don’t realize about. You managed to hit the nail upon the highest and
    defined out the whole thing with no need side-effects , other folks could
    take a signal. Will likely be back to get more.
    Thank you https://spartanmaleenhancement.net/

    1. Thanks for your feedback. I will be publishing more articles on cloud computing topic very soon. Please bookmark the URL.

  2. Very nice post. I just stumbled upon your blog and wished to say that I’ve really enjoyed browsing your blog posts.
    After all I’ll be subscribing to your feed and I hope you write again very soon!

  3. You could definitely see your expertise within the article you
    write. The arena hopes for more passionate writers like you
    who are not afraid to say how they believe.
    All the time follow your heart.

  4. Hey there! This post couldn’t be written any better! Reading this post reminds me of
    my previous room mate! He always kept talking about this.
    I will forward this post to him. Fairly certain he will have
    a good read. Many thanks for sharing!

  5. When I originally commented I clicked the “Notify me when new comments are added” checkbox and now each time a
    comment is added I get four e-mails with
    the same comment. Is there any way you can remove me from that service?
    Many thanks!

  6. Magnificent web site. Plenty of useful info here.
    I’m sending it to several buddies ans additionally sharing
    in delicious. And obviously, thank you on your effort!

  7. This is very interesting, You’re a very skilled blogger.
    I’ve joined your feed and stay up for in quest of extra of your fantastic post.
    Additionally, I’ve shared your site in my social networks

  8. No matter if some one searches for his required thing,
    therefore he/she wishes to be available that in detail, so that thing
    is maintained over here.

  9. Just wish to say your article is as amazing. The clearness in your put up is simply great and that i can think you’re an expert on this
    subject. Well with your permission let me to seize your RSS feed to keep up to date
    with approaching post. Thanks 1,000,000 and please carry on the enjoyable work.

  10. Great post however , I was wanting to know if you could write a litte more on this subject?
    I’d be very grateful if you could elaborate a little bit more.

    Cheers!

  11. I have been surfing online more than 4 hours today, yet I
    never found any interesting article like yours. It’s pretty worth enough for me.
    In my opinion, if all website owners and bloggers made good content as you did, the net
    will be much more useful than ever before.

  12. Hello there! Do you know if they make any plugins to protect against hackers?
    I’m kinda paranoid about losing everything I’ve worked hard on.
    Any suggestions?

    1. I would should suggest “manual security testing” of cloud environment will be more useful to protect against hacker. Plugin we can use but as a secondary solution only.

  13. Excellent goods from you, man. I have understand your stuff previous to and you’re just too excellent.
    I actually like what you’ve acquired here, certainly like what you
    are stating and the way in which you say it. You make
    it entertaining and you still take care of to keep it sensible.
    I can not wait to read much more from you. This is really a terrific site.

  14. You have made some good points there. I looked on the internet to find out more about
    the issue and found most individuals will go along with your views on this web site.

  15. I’m extremely impressed along with your writing talents
    and also with the structure for your blog.

    Is that this a paid subject matter or did you modify it
    yourself? Anyway keep up the excellent quality writing, it’s uncommon to look a nice blog like this one nowadays..

  16. I just couldn’t leave your site before suggesting that I actually loved
    the usual info an individual supply to your guests?

    Is gonna be back continuously in order to check up on new
    posts

  17. My relatives every time say that I am killing my time here at web, except I know I am getting familiarity everyday
    by reading such nice articles or reviews.

  18. I think that everything said was actually very
    reasonable. But, what about this? what if you were to create a awesome headline?
    I ain’t suggesting your information isn’t good.,
    however suppose you added something that makes
    people want more? I mean Cloud Computing Definition | Cloud Security is kinda plain. You could glance at Yahoo’s home page and watch how they write news titles to
    grab viewers interested. You might add a video or a related picture or two
    to get readers excited about what you’ve got to say.
    Just my opinion, it would bring your posts a little livelier.

  19. Hello there, just became alert to your blog through
    Google, and found that it is truly informative. I’m going to watch out for
    brussels. I will appreciate if you continue this in future.
    Lots of people will be benefited from your writing.
    Cheers!

  20. Hey there, You’ve done an excellent job. I’ll definitely digg it and personally recommend to my
    friends. I’m confident they will be benefited from this web site.

  21. I think this is among the most vital info for me.

    And i’m glad reading your article. But want to remark on some general things, The web site style
    is great, the articles is really excellent : D.
    Good job, cheers

Leave a Reply

Your email address will not be published.