Main Cloud Security Threats

in #idel3 years ago

37330260_275472799869090_345186826522198016_o.png

Cloud computing continues to transform the way companies use, store, and share data, applications, and workloads. It has also introduced a range of new security threats and challenges. With so much data going into the cloud — and into public cloud services in particular — these resources become natural targets for hackers. Here are the top issues in cloud security:

1.Data Breaches
A data breach might be the primary objective of a targeted attack or simply the result of human error, application vulnerabilities, or poor security practices. It might involve any kind of information that was not intended for public release, including personal health information, financial information, personally identifiable information, trade secrets, and intellectual property. A company’s cloud-based data may have value to different parties for different

  1. Insufficient identity credentials and access management

Bots masquerading as legitimate users, operators, or developers can read, modify, and delete data; issue control plane and management functions; snoop in data in transit or release malicious software that appears to originate from a legitimate source. A consequence of insufficient identity credentials and poor password management can result in unauthorized access to data,

  1. Insecure interfaces and application programming interfaces (APIs)

Cloud providers expose a set of software user interfaces (UIs) or APIs that customers use to manage and interact with cloud services. Provisioning, management, and monitoring are all performed with these interfaces, and the security and availability of general cloud services depend on the security of API. They need to be designed to protect against accidental and malicious attempts to circumvent policy.

  1. System vulnerabilities

System vulnerabilities are exploitable bugs in programs that attackers can use to infiltrate a system to steal data, taking control of the system or disrupting service operations. Vulnerabilities within the components of the operating system put the security of all services and data at significant risk. With the advent of multi-tenancy in the cloud, systems from various companies are placed close to each other and given access to shared memory and resources, creating a new attack surface.

  1. Account hijacking

Account or service hijacking is not new, but cloud services add a new threat to the landscape. If attackers gain access to a user’s credentials, they can eavesdrop on activities and transactions, manipulate data, return falsified information and redirect clients to illegitimate sites. Account or service instances might become a new base for attackers. With stolen credentials, attackers can often access critical areas of cloud computing services, allowing them to compromise the confidentiality, integrity, and availability of those services.

  1. Advanced persistent threats (APTs)

APTs are a parasitical form of cyber attack that infiltrates systems to establish a foothold in the IT infrastructure of target companies, from which they steal data. APTs pursue their goals stealthily over extended periods of time, often adapting to the security measures intended to defend against them. Once in place, APTs can move laterally through data centre networks and blend in with normal network traffic to achieve their objectives.

  1. Data loss
    Data stored in the cloud can be lost for reasons other than malicious attacks, CSA says. An accidental deletion by the cloud service provider, or a physical catastrophe such as a fire or earthquake, can lead to the permanent loss of customer data unless the provider or cloud consumer takes adequate measures to back up data, following best practices in business continuity and disaster recovery.
    Don’t want to lose your data? Choose IDM and forget about problems listed above!

mackbook-product.jpg

IDM has developed
a secure cloud service
for storage and transmission of data
The cloud service called BooBookBox has been successfully beta-tested and currently has more than 2000 permanent users.
Our unique service
is ready to use

Project team

0.jpg
For more information :
Iskender Syrgabekov
3rd degree connection3rd
Chairman and Founder – Equivalence AG
United Kingdom

0 (1).jpg

Web : https://myidm.io/
Yerkin Zadauly
3rd degree connection3rd
Member of the Board of Directors "equivalence AG"
Kazakhstan

0 (2).jpg

Whiteparer : https://myidm.io/img/doc/wp_en.pdf
Daan Elffers
2nd degree connection2nd
EMG Group
Cambridge, United Kingdom

0 (3).jpg

Naviin Kapoor
2nd degree connection2nd
Digitization | Blockchain Expert | Project Management | Business Analysis | Fintech | Business Transformation
United Arab Emirates

0 (4).jpg

Jim Carter
3rd degree connection3rd
IT Manager at Westlands Water District
Fresno, California Area

Partners

BWTLOGOA.png

clyde-and-co.jpg

Pasted-Graphic.jpg

Telegram : https://t.me/idmprotect_en

Facebook : https://www.facebook.com/IDMdatasec

Twitter : https://twitter.com/IDMdatasecurity

Medium :https://medium.com/@IDMdatasecurity

Author Info:

Bitcointalk Username: Roni1806

Bitcointalk Profile: https://bitcointalk.org/index.php?action=profile;u=1930269

ETH Wallet Address: 0x5B27cEd420021bf25e079D92E8Cc61f18FFbFAC5

Coin Marketplace

STEEM 0.32
TRX 0.06
JST 0.042
BTC 37765.05
ETH 2551.72
USDT 1.00
SBD 4.14