Cloud Computing – Is It Safe?

There are primarily two sorts of computing environments:

On-premises computing is the normal type of computing through which you or your organization personal and handle your individual programs. All of the purposes you utilize, in addition to your knowledge information, are in your individual computer systems by yourself premises both on particular person PCs or on an in-house native space community.

In cloud computing, against this, your purposes and information are held remotely on the Web (in our on-line world) in a community of servers which is operated by a 3rd celebration. You entry purposes and work in your information out of your PC just by logging on to the community.

Cloud companies are supplied by cloud-hosting suppliers, firms resembling Google, Amazon, Oracle Cloud, Rackspace, Microsoft Azure, and so forth.

There’s nothing basically new in regards to the idea of cloud companies. In case you are utilizing Gmail, Hotmail or yahoo to your emails, you’re utilizing cloud companies and possibly have been for years.

What is comparatively new is the forms of companies which can be being supplied in a cloud-environment. These now go far past e mail to cowl all of the IT companies that an on-premises computing surroundings would ship, resembling accounting, advertising and marketing, human sources and so forth.

Benefits of cloud computing

Cloud computing has a number of benefits over on-premises computing:

1) You’ll be able to run an software or entry your information from anyplace on the earth utilizing any laptop.

2) Cloud computing is cheaper.

3) You want much less technical information.

4) Cloud computing delivers a greater efficiency.

5) Cloud computing is eminently scalable. Rising the variety of purposes you utilize or the quantity of information you retailer doesn’t require a heavy funding; you solely must advise the cloud-hosting adviser.

Given these benefits it no shock that over the previous few years there was a widespread fast adoption of cloud computing. Analysts estimate that the expansion charge of all spending on cloud IT will quickly be not less than 4 occasions sooner than the expansion charge of all spending on on-premises computing.

Certainly, analysts expect the annual development charge of spending on cloud computing to common 23.5% compound from now till 2017. As well as, by that 12 months spending on cloud companies will in all probability account for one-sixth of all spending on IT merchandise, resembling purposes, system infrastructure software program, and fundamental storage.

Given the fast development in cloud computing, the large query, after all, is whether or not cloud computing is secure. Is it kind of secure than on-premises computing?

The brief reply is that cloud computing is just not much less secure than on-premises computing. Nonetheless, the threats are considerably completely different in nature, although they’re converging.


Usually talking, there are six main threats to laptop safety. These are:

Malware – is malicious software program resembling viruses, trojans, worms, spy ware and zombies. Malware is put in on both a PC in your home-office or a cloud-computing server. The place malware offers management of a community of computer systems to a malicious group (eg, to ship spam) it’s known as a botnet.

Internet app assault – is an assault through which web-based purposes are focused. It is likely one of the most typical types of assault on the Web.

Brute drive assault – works by making an attempt all potential combos of letters or numbers as a way to uncover a cipher or secret key. For instance, you can crack a password by repeatedly making an attempt to guess it. Fashionable computing energy and velocity makes brute drive a viable type of assault.

Recon – is reconnaissance exercise that’s used to decide on victims which can be each susceptible and useful.

Vulnerability scan – is an exploit utilizing a particular program to entry weaknesses in computer systems, programs, networks or purposes as a way to generate data for planning an assault.

App assault – is an assault in opposition to an software or service that’s not operating on the net, ie this system might be on a pc someplace.


honeypot is a decoy web site, community, system or software that has been deliberately designed to be susceptible to assault. Its goal is to collect details about attackers and the way they work.

Honeypots enable researchers to:


  • acquire knowledge on new and rising malware and decide developments in threats
  • determine the sources of assaults together with particulars of their IP addresses
  • decide how assaults takes place and the way greatest to counteract them
  • decide assault signatures (items of code which can be distinctive to explicit items of malware) in order that anti-virus software program can recognise them
  • develop defences in opposition to explicit threats


Honeypots have proved to be invaluable in erecting defences in opposition to hackers.

The Spring 2014 Cloud Safety Report

Alert Logic gives safety companies for each on-premises and cloud laptop programs. The corporate started issuing cloud safety experiences in 2012. Its Spring 2014 Cloud Safety Report covers the 12 months ending thirtieth September 2013.

This report is predicated on a mixture of real-world safety incidents skilled by Alert Logic’s prospects and knowledge gathered from a collection of honeypots the corporate arrange all over the world.

The report throws some fascinating gentle of the safety of on-premises and cloud computing regarding the corporate’s prospects. Listed below are a number of the highlights:

[1] Computing is shifting an increasing number of from on-premises to cloud-based computing and the sorts of assaults that concentrate on on-premises programs at the moment are concentrating on cloud environments. That is in all probability because of the growing worth of potential victims within the cloud.

[2] Though assaults on cloud environments are growing in frequency, the cloud is just not inherently much less safe than conventional on-premises computing.

[3] The frequency of assaults in each on-premises and cloud computing has elevated for many forms of threats, although for just a few forms of threats it has fallen. Listed below are the details of comparability between each computing environments:

Essentially the most prevalent forms of assaults in opposition to on-premises prospects have been malware assaults (together with botnets) at 56% in the course of the six months ending thirtieth September. At solely 11%, these assaults have been a lot much less frequent amongst cloud prospects. Nonetheless the variety of cloud prospects experiencing these assaults is rising shortly, greater than doubling in a single 12 months.

Assaults utilizing brute drive elevated from 30% to 44% of cloud prospects however remained steady in on-premises environments at a excessive 49%. Vulnerability scans jumped dramatically in each environments. Brute drive assaults and vulnerability scans at the moment are occurring at nearly the identical charges in on-premises and cloud environments.

Internet app assaults are extra probably amongst cloud prospects. Nonetheless these assaults are down year-on-year in each cloud and on-premises computing, as are recons. App assaults elevated barely in each classes of consumers.

Essentially the most prevalent forms of assaults fluctuate between on-premises and cloud environments. In on-premises computing the highest three have been malware (56% of consumers), brute drive (49%) and vulnerability scans (40%), whereas within the cloud the commonest incidents have been brute drive, vulnerability scans and net app assaults, every of which affected 44% of consumers.

[4] The incidents involving Alert Logic’s cloud-based honeypots various in numerous elements of the world. These hosted in Europe attracted twice as many assaults as honeypots in Asia and 4 occasions greater than honeypots within the USA. This can be attributable to malware ‘factories’ working in Jap Europe and Russia testing their efforts regionally earlier than deploying them all through the world.

Leave a Reply

Your email address will not be published. Required fields are marked *