Successfully reported this slideshow.
We use your LinkedIn profile and activity data to personalize ads and to show you more relevant ads. You can change your ad preferences anytime.

6 major cyber security risks to cloud computing

105 views

Published on

The global cloud market is expected to grow to $190+ billions by 2020, that’s a whopping number. Cloud computing has brought the advantage of lower cost of ownership of IT applications, super fast time to market, and unmatched surges in employee productivity.

Published in: Data & Analytics
  • Be the first to comment

  • Be the first to like this

6 major cyber security risks to cloud computing

  1. 1. 6 MAJOR CYBER SECURITY RISKS TO CLOUD COMPUTING
  2. 2.  Cloud computing has brought the advantage of lower cost of ownership of IT applications, super fast time to market, and unmatched surges in employee productivity.
  3. 3. THE MOST COMMON OF THESE CYBERSECURITY ISSUES THAT THREATEN CLOUD COMPUTING APPLICATIONS. Loss of Intellectual Property Violations of Compliance and Regulatory Norms Compromised Credentials and Authentication Breaches Threats to APIs Hijacking of Accounts Abuse of Cloud Services
  4. 4. LOSS OF INTELLECTUAL PROPERTY More than 20% of the data kept on the cloud by enterprises contain sensitive information, including but not limited to intellectual property.  Now, most enterprises use multi-tenancy cloud services, wherein their data is kept on servers that are also used to deliver similar services to other organizations.
  5. 5. VIOLATIONSOF COMPLIANCEAND REGULATORY NORMS Enterprises need to ensure that their cloud storage and application service providers take care of these regulatory norms.  Also, for enterprises that promote the Bring Your Own Device and Bring Your Own Cloud concepts, ensuring compliance to these norms becomes a lot more challenging.
  6. 6. COMPROMISED CREDENTIALS AND AUTHENTICATION BREACHES • Enterprises struggle with identity management issues as they map permissions and privileges with user roles. • Another huge problem area is when enterprises don’t remove or change user access when he/she quits or changes role.
  7. 7. THREATS TO APIS Most cloud solution providers offer their APIs to enterprise IT teams to help them with cloud provisioning, orchestration, management, and monitoring.  This makes the security and availability of cloud solutions dependent on the API security. Weak API interfaces expose cloud applications to risks of accountability, confidentiality, integrity, and availability.
  8. 8. HIJACKING OF ACCOUNTS Cloud services are also vulnerable to these disruptive cyber attacks because cybercriminals have more means to monitor the activities of users on shared clouds. Prevention of account details loss is the first step to keeping cloud applications safe from phishing and other violations.
  9. 9. ABUSE OF CLOUD SERVICES Cloud services can be misused to commit nefarious cyber crimes, right from the usage of cloud resources to access encryption keys, to launching DDoS attacks on an enterprise’s servers. Exposure to legal liabilities in form of lawsuits from impacted parties. Severe loss of reputation
  10. 10. THANKS FOR WATCHING SUBSCRIBE NOW! www.slideshare.net/TyroneSystems THAT'S ALL, FOLKS!

×