Tuesday, May 5, 2020

Analysis of Security Threats and Challenges †MyAssignmenthelp.com

Question: Discuss about the Analysis of Security Threats and Challenges. Answer: Introduction: In this assignment Security threats in cloud computing and its relevant preventive methods have been discussed mainly because of its widely accepted existence. Organisations are solely dependent on cloud platform these days for storage of data or developing applications. Companies just need a technology that makes data available from anywhere and keep the information secure this is made possible by cloud computing (Jakimoski., 2018). Along with the use of cloud the hackers have also increased who are trying to exploit the security of the system. It is necessary to investigate the possible threats and their techniques to maintain the security. In this report various challenges are elaborated like ensuring data protection so that real benefits of cloud computing could be used (Roman, Lopez Mambo, 2018). Cloud computing has been adopted by everyone but it involves a huge risk of data breaching in which data is unavailable for a span of time. There frae various challenges involved secur ity of cloud computing to keep it work in reality (Ashktorab2 Reza., 2018). There are various preventive tools discussed like malware tools for removing the issue of insecure access points, data loss and distributed denial of service attack. Cloud computing preventive tools ensure that authentication and confidentiality of data is maintained as they are the key mechanism for user security (Coppolino, Antonio, Mazzeo Romano, 2017). In this report a detail focus would be done on the security issues in order to provide appropriate security measures in the cloud. This could be attained by keeping the track on all the privileges, and having a proper access control of information and discovering the recovery methods in the situation of cloud failure. References Ashktorab2 ,.V.Reza.S.(2018).Security Threats and Countermeasures in Cloud Computing.Retrieved from https://pdfs.semanticscholar.org/4ce8/91731f0dc7352d329b1f2dcc5b56cb8f6190.pd. Coppolino, L., DAntonio, S., Mazzeo, G., Romano, L. (2017). Cloud security: Emerging threats and current solutions.Computers Electrical Engineering,59, 126-140. Jakimoski.K.(2018).Security Techniques for Data Protection in Cloud Computing.Retrieved from https://www.sersc.org/journals/IJGDC/vol9_no1/5.pdf. Roman, R., Lopez, J., Mambo, M. (2018). Mobile edge computing, fog et al.: A survey and analysis of security threats and challenges.Future Generation Computer Systems,78, 680-698.

No comments:

Post a Comment

Note: Only a member of this blog may post a comment.