Cloud Computing – Is It Safe?


There are essential styles of computing environments:

On-premises computing is the traditional shape of computing in that you or your employer personal and manipulate your own structures. In addition to your facts files, all the programs you use are on your own computer systems on your personal premises, either on individual PCs or on an in-house nearby location network.


In contrast, in cloud computing, your programs and files are held remotely on the Internet (in cyberspace) in a community of servers operated using a 3rd birthday party. You get admission to applications and paintings in your files from your PC virtually using logging on to the community. Cloud offerings are supplied with the aid of cloud web hosting vendors, agencies such as Google, Amazon, Oracle Cloud, Rackspace, Microsoft Azure, and so forth. There is nothing basically new about the idea of cloud services. If you are the user of Gmail, Hotmail, or Yahoo to your emails, you are using cloud services and, in all likelihood, have been for years. What is incredibly new is the kinds of offerings that might be being offered in a cloud environment. These now move far past electronic mail to cover all of the IT offerings that on-premises computing surroundings could supply, along with accounting, advertising, human assets, and so on.


Advantages of cloud computing

Cloud computing has numerous advantages over on-premises computing:

1) You can run software or get admission to your documents anywhere in the world using any computer.

2) Cloud computing is inexpensive.

3) You want less technical information.

4) Cloud computing provides higher performance.

5) Cloud computing is eminently scalable. Increasing the variety of packages you use or the quantity of data you store does now not require heavy funding; you best want to recommend the cloud website hosting adviser.

Given these blessings, it no marvels that there was a huge fast adoption of cloud computing over the previous couple of years. Analysts estimate that the growing price of all spending on the cloud. IT will soon be at a minimum four times faster than the growth price of all spending on on-premises computing. Indeed, analysts are looking ahead to the once a year boom price of spending on cloud computing to common 23.5% compound from now till 2017. With the aid of that 12 months, spending on cloud offerings will probably account for one-6th of all spending on IT products, including applications, device infrastructure software, and fundamental garage. Given the fast growth in cloud computing, the large query of the path is whether cloud computing is secure. Is it greater or less safe than on-premises computing? The short answer is that cloud computing isn’t less secure than on-premises computing. However, the threats are quite a one-of-a-kind in nature, though they may be converging.

Threats Generally speak, there are six essential threats to PC safety. These are:

Malware –

is malicious software program along with viruses, trojans, worms, adware, and zombies. Malware is mounted on either a PC in your private home-workplace or a cloud-computing server. Where malware gives manipulate a network of computers to a malicious institution (e.g., to send spam), it’s miles known as a botnet.

Web app assault –

is an assault in which net-primarily based packages are centered. It is one of the maximum commonplace varieties of attacks on the Internet.

Brute force attack –

works by attempting all feasible combinations of letters or numbers for you to discover a cipher or mystery key. For instance, you may crack a password via time and again seek to guess it. Modern computing power and speed make brute force a viable form of attack.

Recon –

is a reconnaissance hobby that is used to select sufferers who might be each inclined and precious.

Vulnerability experiment –

is an make the most using a unique program to get admission to weaknesses in computers, structures, networks, or applications, generating data for planning an attack. App attack – is an assault against a utility or carrier that isn’t always strolling at the internet, i.e., this system can be on a laptop someplace.


A honeypot is a decoy internet site, network, system, or software that has been intentionally designed to be at risk of assault. Its reason is to acquire data approximately attackers and the way they work.

Honeypots permit researchers to:

acquire statistics on new and rising malware and decide trends in threats
perceive the sources of attacks consisting of information of their IP addresses
decide how attacks take area and the way great to counteract them
decide assault signatures (portions of code that are specific to specific pieces of malware) so that anti-virus software can realize them
broaden defenses towards particular threats
Honeypots have proved to be beneficial in erecting defenses towards hackers.

The Spring 2014 Cloud Security Report


Alert Logic affords safety services for each on-premises and cloud PC structure. The employer started issuing cloud security reviews in 2012. Its Spring 2014 Cloud Security Report covers the year finishing thirtieth September 2013. This record is primarily based on an aggregate of real-world security incidents experienced with Alert Logic’s clients and statistics accrued from a chain of honeypots the agency installation around the arena. The report throws a few exciting milds of on-premises and cloud computing security regarding the organization’s customers. Here are some of the highlights:

[1] Computing is transferring an increasing number of from on-premises to cloud-primarily based computing. The varieties of attacks that concentrate on on-premises structures are now focused on cloud environments. This might be due to the growing cost of capability sufferers in the cloud.

[2] Although attacks on cloud environments increase in frequency, the cloud is not inherently less comfortable than conventional on-premises computing.

[3] The frequency of assaults in both on-premises and cloud computing has increased for maximum types of threats, though it has fallen for some forms of threats. Here are the main points of assessment among both computing environments:

The most normal sorts of assaults against on-premises customers had been malware assaults (which include botnets) at fifty-six% at some point in the six months ending thirtieth September. At handiest eleven%, these assaults have been much much less frequent among cloud customers. However, the wide variety of cloud clients experiencing those assaults is growing quickly, more than doubling in one year. Attacks using brute force multiplied by 30% to forty-four% of cloud clients but remained strong in on-premises environments at a high forty-nine%. Vulnerability scans jumped dramatically in both environments. Brute pressure attacks and vulnerability scans are actually taking place at almost equal charges in on-premises and cloud environments. Web app assaults are much more likely among cloud customers. However, those assaults are down year-on-year in each cloud and on-premises computing, as are recons. App assaults elevated barely in both classes of customers. The most generic forms of attacks vary among on-premises and cloud environments. In on-premises computing, the pinnacle 3 have been malware (56% of clients), brute force (49%), and vulnerability scans (forty%); at the same time as inside the cloud, the maximum not unusual incidents were brute pressure, vulnerability scans and web app assaults, every of which affected 44% of customers.

[4] The incidents related to Alert Logic’s cloud-based totally honeypots numerous in extraordinary elements of the world. Those hosted in Europe attracted two times as many attacks as honeypots in Asia and 4 instances more than honeypots inside the USA. This may be because malware ‘factories run in Eastern Europe and Russia, testing their efforts locally earlier than deploying them for the sector’s duration.

[5] Chillingly, 14% of the malware collected using honeypots turned into no longer detectable using fifty-one% of the world’s top antivirus companies. Even greater horrifying: this became not due to the fact those were emblem-new malware; much of the malware that was neglected turned into repackaged variations of older malware and hence need to had been detected.

The film concluded with an assertion that protection within the cloud is a shared duty. This is something that person entrepreneurs, as well as small and medium-sized businesses, tend to neglect. In cloud computing, the service issuer is responsible for the basics, for protective the computing environment. But the patron is 100% chargeable for what occurs inside that surroundings and, to ensure security, he or she wishes to have a few technical know-how.


Advertisements by using cloud carrier providers appear to suggest that cloud computing is more secure than on-premises computing. This is surely no longer real. Both environments seem to be equally secure or hazardous viz-a-viz hackers and their malicious programs. Attacks inside the cloud are increasing as capability goals have become extra ‘robbery-worth.’ Thus, the security inside the cloud desires to be just as strong as protection in on-premises environments. However, you cannot depend completely on antivirus software program companies to locate all assaults. Your first-rate wager is, therefore, to go into an annual protection settlement with an online computer preservation company that can periodically get right of entry to your computer(s) from a far off region and ensure that it’s far protected as well as viable. This need to no longer cost more than €one hundred twenty to €a hundred and fifty a yr relying on the wide variety of computers you have got.