In addition to Weibo, there is also WeChat
Please pay attention
WeChat public account
Shulou
2025-03-18 Update From: SLTechnology News&Howtos shulou NAV: SLTechnology News&Howtos > Servers >
Share
Shulou(Shulou.com)06/02 Report--
What factors will endanger the security of the server [199cloud-Ina]
I. data loopholes
The cloud environment faces many of the same security threats as the traditional enterprise network, but because a large amount of data is stored on the cloud server, the cloud server provider is likely to become the target of data theft. Vendors often deploy security controls to protect their environment, but ultimately the enterprise is responsible for protecting the data in the cloud. Companies may face lawsuits, criminal charges, investigations and business losses.
Passwords and certificates
Data vulnerabilities and other attacks usually come from lax authentication, weak password and key or certificate management. Companies should weigh the convenience of centralized identity against the risk of making storage sites the primary target of attackers. Using CVM, it is recommended to use various forms of authentication, such as one-time password, mobile phone authentication and smart card protection.
III. Interface and API intrusion
The IT team uses the interface and API to manage and interact with cloud servers, including cloud provisioning, management, orchestration, and regulation. API and interfaces are the most exposed parts of the system because they are usually accessible through the open Internet. Cloud server providers should do a good job of security coding check and strict entry testing. Use API security components, such as authentication, entry control and activity monitoring.
IV. Vulnerabilities of developed systems
Enterprises and other enterprises share experience, databases and other resources, forming a new target of attack. Fortunately, attacks on system vulnerabilities can be mitigated by using a "basic IT process". Add patches as soon as possible-the change control process for emergency patches ensures that remedies are correctly recorded and reviewed by the technical team. Vulnerable targets: developable bug and system vulnerabilities.
V. account hijacking
Phishing sites, fraud and software development are still rampant, and cloud servers take the threat to a new level, as attackers can have serious consequences if they successfully qieting, manipulate the business, and tamper with data. Therefore, all CVM management accounts, even service accounts, should be strictly regulated so that every transaction can be tracked to an owner. The key point is to protect the security authentication bound to the account from being stolen. Effective attack carriers: phishing websites, fraud, software development.
VI. Insiders with ulterior motives
Threats from insiders come from many sources: current or former employees, system managers, contractors, or business partners. Malice comes from a wide range of sources, including data theft and retaliation. Systems that rely solely on cloud server providers for security, such as encryption, are the most dangerous. It is important to keep an effective journal, monitor and review the activities of managers. Enterprises must minimize exposed access: encryption processes and keys, and minimize access.
7. APT virus
APT establishes a foothold by infiltrating the systems in the cloud server, and then steals data and intellectual property rights quietly for a long time. The IT department must keep abreast of the latest advanced attacks and deploy relevant protection policies (ID:ydotpub) against the CVM. In addition, by regularly strengthening the notification program to warn users, you can reduce the confusion caused by APT. Common ways to enter: spear phishing, direct attack, USB driver.
VIII. Permanent data loss
Reports of permanent data loss caused by supplier errors have been rare. But malicious hackers will still use permanent deletion of cloud data to hurt enterprises and cloud data centers. Compliance policies usually specify how long the company must keep audit records and other documents. The loss of this data can have serious regulatory consequences. It is recommended that cloud server providers decentralize data and applications to enhance protection: daily backup, offline storage.
IX. Sharing leads to potential crisis
The vulnerability of sharing technology poses a great threat to cloud servers. Cloud server vendors share infrastructure, platforms, and applications, and if vulnerabilities occur in any layer, they affect all. If an overall part is damaged-- such as a hypervisor, shared platform part, or application-- the entire environment is exposed to potential threats and vulnerabilities.
Welcome to subscribe "Shulou Technology Information " to get latest news, interesting things and hot topics in the IT industry, and controls the hottest and latest Internet news, technology news and IT industry trends.
Views: 0
*The comments in the above article only represent the author's personal views and do not represent the views and positions of this website. If you have more insights, please feel free to contribute and share.
Continue with the installation of the previous hadoop.First, install zookooper1. Decompress zookoope
"Every 5-10 years, there's a rare product, a really special, very unusual product that's the most un
© 2024 shulou.com SLNews company. All rights reserved.