In addition to Weibo, there is also WeChat
Please pay attention
WeChat public account
Shulou
2025-04-04 Update From: SLTechnology News&Howtos shulou NAV: SLTechnology News&Howtos > Servers >
Share
Shulou(Shulou.com)06/01 Report--
This article mainly explains "how is the security of cloud computing". The content of the explanation is simple and clear, and it is easy to learn and understand. let's follow the editor's train of thought. Let's study and learn "how is the security of cloud computing"?
With the rise and popularity of cloud computing, its security has become the biggest hidden danger, so what security issues should we pay attention to?
I. usability
When you are a customer of a public cloud provider, redundancy and fault tolerance are out of your control. In general, what the cloud provider will provide and how to do it will not be disclosed. These are completely opaque. Every cloud service provider claims to have strange fault tolerance and availability, but as time goes on, we continue to experience service outages for hours or even days.
The bigger worry is that customers have now lost several pieces of data, such as. It is either due to a problem with the cloud provider or from a malicious attacker. Cloud providers generally say they are doing a great job and have triple protection data backups. However, even if the supplier keeps ensuring that the data is backed up, they will lose the data permanently. So, if possible, your company should always back up the data shared in the cloud, or at least adhere to the law and protect its own right to compensation if the data is lost permanently.
Authentication, authorization and access control
Obviously, the access mechanisms that authenticate, authorize, and manipulate your cloud provider are critical, but largely depend on the process of their implementation. How long will it take them to troubleshoot and delete expired accounts? How many privileged accounts have access to their system and your company's data? What type of authentication is required by privileged users? Does your company directly share the same namespace with the supplier or other tenants? The experience of sharing the title space and certification to create a single sign-on (SSO) is infinitely productive, but it also greatly increases the risk.
Data protection is another big problem. If data encryption is used and implemented, is the private key shared among tenants? How many people in the cloud supplier team can see your company's data? Where is the physical storage of your company's data? What happens when the data is no longer needed? I'm not sure how many cloud suppliers would like to share specific answers to the above questions, but if you want to find out what you know and don't know, you should at least consult your supplier.
III. All rights
This danger comes as a surprise to many cloud customers, but often customers are not the only ones with data. Many public cloud service providers, including the largest and most famous, make it clear in their contracts that the stored data belongs to the supplier, not the customer.
Cloud suppliers expect to have data, because it gives them more legal protection if they make a mistake. In addition, they can find and mine customer data for the timing of self-invented revenue ratings. I even saw some, for example, some cloud suppliers went out of business and then sold their customers' private data as part of their assets to the next buyer. This is appropriately shocking. So you have to make sure that you are closed about what you know and don't know: who has your data, and does the cloud provider have the right to dispose of your data?
Through the above understanding, I hope you can effectively avoid these security issues, make rational use of cloud computing, and promote our daily work to be carried out more smoothly!
Thank you for your reading. the above is the content of "how is the Security of Cloud Computing". After the study of this article, I believe you have a deeper understanding of the security of cloud computing. The specific use of the situation also needs to be verified in practice. Here is, the editor will push for you more related knowledge points of the article, welcome to follow!
Welcome to subscribe "Shulou Technology Information " to get latest news, interesting things and hot topics in the IT industry, and controls the hottest and latest Internet news, technology news and IT industry trends.
Views: 0
*The comments in the above article only represent the author's personal views and do not represent the views and positions of this website. If you have more insights, please feel free to contribute and share.
Continue with the installation of the previous hadoop.First, install zookooper1. Decompress zookoope
"Every 5-10 years, there's a rare product, a really special, very unusual product that's the most un
© 2024 shulou.com SLNews company. All rights reserved.