Showing posts with label computers. Show all posts
Showing posts with label computers. Show all posts

Monday, 19 March 2012

Security risks in Cloud Computing


This is an era of mobile broadband, smart phones, and users who run multiple computers and devices. Therefore it makes sense to move e-mail, photos, documents, calendar, notes, finance, and contacts to impressive web applications like Gmail, Evernote, Flickr, Google Docs, mint, etc. But the transferring of data to hosted web applications has its potential pitfalls and risks that are lost in all the hype around Cloud-centric systems.

Cloud Computing is one of the biggest changes in IT, with computing functions as a service with promising innovations that we can not yet imagine. Customers are both excited and nervous about the prospects of cloud computing. They are excited by the possibilities of reducing capital costs and the ability to strip them of infrastructure management, and focus on core competencies. What excites them most is the agility offered by the demand supply of computing and the ability to align information technology along business strategies.

At the same time, customers are also very concerned about the security risks of cloud computing and the loss of direct control over the systems they are responsible. Whether a company uses Software as a Service (SaaS) version of customer relationship management (CRM), creating offsite backups of company data, or setting up a page of social media marketing, it is trusting a third-party organization with business information.

While cloud computing can provide significant business cost reducing benefits, the service does come with some security risks. As per Gartner, a leading analyst firm, cloud computing is loaded with security risks. Customers must demand transparency, avoiding vendors that refuse to provide detailed information on security programs. It is very important to understand the qualifications of policy makers, architects, programmers and operators; risk control processes and technical mechanisms and the level of testing been done to verify that the service and control processes work as expected, and that vendors can identify unanticipated vulnerabilities.


  • Secure data transfer - All of the traffic in a network through clouds of the Internet, must be on a secure channel.
  • Secure software interfaces - Companies must be aware of software interfaces, or APIs, which are used to interact with cloud services, otherwise risk of being exposed to a variety of security issues related to confidentiality, integrity, availability and accountability arises.
  • Secure the data stored - Data should be securely encrypted when it is on the provider's servers and while it is being used by cloud service. According to Forrester, another analyst firm, some cloud providers ensure the protection of data used in the application or for disposal of your data.
  • User Access Control - Data stored on the server of a cloud provider can potentially be accessed by an employee of this service. Companies should ask suppliers for details on the people who manage their data and the level of access they have to it.

  • Separation of data - Each cloud-based service shares space on the provider's servers and other parts of the provider's infrastructure. Dangerous Subdivision Techniques, such as poor data encryption, may give other customers of the service an easy access inside your virtual container.
  • Lower Privacy Protection by Law - To search for a home or office, the authorities need a search warrant. But they do not need any warrants to obtain information stored on third-party's Web servers. Moreover, such research can also occur without the knowledge of the company.
  • Unavailability of the Server and Account Lockout - A great advantage of storing data on a server cloud is that the firm does not need to take backups anymore. But what would happen if the servers go down, and employees are dependent on the cloud for e-mail or to access the PowerPoint slideshow for an important presentation?


In conclusion, although a company must meet these safety issues with the cloud provider before entrusting their data to its servers, these risks should not be a stumbling block. Cloud computing also offers companies many benefits, so that instead of rejecting cloud computing, companies should establish strictcontrols and security measures in place.

Sunday, 18 March 2012

Peep in the world of Cloud Computing


My idea of cloud computing was always that it would be beneficial, but that it would actually save so much time was unthinkable.
In these times of increased workload and costs of production and the explosion of data, companies need a database that they can draw resources from, while reducing costs at the same time. Cloud computing has filled this need and has helped the business to act quickly. Not only reducing the amount of time it takes to complete a task by about 90%, but it also reduces the costs borne by the company drastically.


Previously, companies required bandwidth, servers, offices, developers, testers of various programs and other resources that costs a great sum. With cloud computing, all that these companies need is a computer that is connected to a cloud (a term for the Internet)! Open source software set the trend and what we have now is this huge cloud that hosts resources as programs, software, licenses, storage, servers, Web services, infrastructure (to run programs) and a variety tools in an accessible form.
All one need do is log in, search for the service in accordance with the need of the hour, adapt the service / program or ask for help, and start using it. The applications are not just based on IT anymore. You can find services related to HR, accounting and other such services, in addition to customized services. Large companies like Amazon.com and IBM offer storage space on demand. Purpose-built applications can be up and running in 2 days thanks to the development and testing done by millions of users. Services can be measured and selected. Cloud computing is a platform used by some common trading companies to interact with each other.


Perhaps the most comforting features of cloud computing is that it allows the company to pay for what it uses and nothing more, reducing the investment in hardware, software or services, making it similar to other utilities such as electricity. Users can have as little or as much of a service at a given time for as little or as long as they want. Companies also have the opportunity to subscribe to the cloud, or some vendors in a monthly basis and can stop whenever they want. It also offers complete restoration, share models, supports different languages and is easy to use. Also, users have several advantages such as security, new features and performance.

Cloud computing is a revolutionary change that is transforming the face of the business. Not only does it offer the true value to the costs that are pleasing, but it also allows management to focus on areas that may lead to more innovations. Cloud computing breaks the monotony of a rigid infrastructure by taking advantage of options that are flexible, economically viable and cut corners without cutting the bottom line of organizations.