When the cloud improves security

نویسنده

  • Fran Howarth
چکیده

Through combined, integrated web and email protection, organisations will be in a better position to protect personal and sensitive corporate information from online and internal threats When the cloud improves security …move protection to where the threats are Executive summary Malware threats are on the rise and the attacks are growing in sophistication and complexity. Individuals and specific organisations are increasingly being targeted, using exploits that rely on more than one attack vector, often combining a phishing email with web-borne mal-ware. Many attacks today play to human nature, using social engineering techniques to trick users into giving away information or download-ing content riddled with a malicious payload. This paper discusses how security threats are emerging and the importance of combining protection against email and web-borne attacks since today's threats increasingly use a combination of the two vectors. This makes them harder to detect and mitigate, leaving organisations that are relying on traditional security protections exposed. Since fighting malware infections is not a core competency of most organisations, especially small and medium ones, the answer for many will be to subscribe to the services of an expert services provider with its own array of resources based in the cloud. • The majority of organisations have deployed protection for their email communications, but many of these are based on outdated technology that is not up to the job of protecting against the complex threats seen today. • Malware delivered over the web is an even more serious problem, but not enough organisations are taking the threats seriously. • New technologies on the market are available to mitigate those threats, combining protection for email communications and web-based applications and content. • New technology delivery mechanisms offered as a service take much of the pain out of the fight to keep threats at bay and are suited for even the smallest of organisations. The bottom line With attacks increasingly targeted at specific individuals or organisations, even the smallest organisation cannot afford to be complacent. However, many lack the resources to adequately protect themselves. The answer is to outsource email and web protection to a service provider with data centres based in the cloud—taking protection to where the threats are coming from to prevent bad traffic from ever reaching the organisation and helping to ensure that sensitive data cannot inadvertently be leaked. When the cloud improves security …move protection to where the threats are Today's …

برای دانلود متن کامل این مقاله و بیش از 32 میلیون مقاله دیگر ابتدا ثبت نام کنید

ثبت نام

اگر عضو سایت هستید لطفا وارد حساب کاربری خود شوید

منابع مشابه

A Literature Review on Cloud Computing Security Issues

The use of Cloud Computing has increasedrapidly in many organization .Cloud Computing provides many benefits in terms of low cost and accessibility of data. In addition Cloud Computing was predicted to transform the computing world from using local applications and storage into centralized services provided by organization.[10] Ensuring the security of Cloud Computing is major factor in the Clo...

متن کامل

A Literature Review on Cloud Computing Security Issues

The use of Cloud Computing has increasedrapidly in many organization .Cloud Computing provides many benefits in terms of low cost and accessibility of data. In addition Cloud Computing was predicted to transform the computing world from using local applications and storage into centralized services provided by organization.[10] Ensuring the security of Cloud Computing is major factor in the Clo...

متن کامل

A risk model for cloud processes

Traditionally, risk assessment consists of evaluating the probability of "feared events", corresponding to known threats and attacks, as well as these events' severity, corresponding to their impact on one or more stakeholders. Assessing risks of cloud-based processes is particularly difficult due to lack of historical data on attacks, which has prevented frequency-based identification...

متن کامل

Attribute-based Access Control for Cloud-based Electronic Health Record (EHR) Systems

Electronic health record (EHR) system facilitates integrating patients' medical information and improves service productivity. However, user access to patient data in a privacy-preserving manner is still challenging problem. Many studies concerned with security and privacy in EHR systems. Rezaeibagha and Mu [1] have proposed a hybrid architecture for privacy-preserving accessing patient records...

متن کامل

Privacy and Security of Big Data in THE Cloud

Big data has been arising a growing interest in both scien- tific and industrial fields for its potential value. However, before employing big data technology into massive appli- cations, a basic but also principle topic should be investigated: security and privacy. One of the biggest concerns of big data is privacy. However, the study on big data privacy is still at a very early stage. Many or...

متن کامل

A survey on impact of cloud computing security challenges on NFV infrastructure and risks mitigation solutions

Increased broadband data rate for end users and the cost of resource provisioning to an agreed SLA in telecom service providers, are forcing operators in order to adhere to employment Virtual Network Functions (VNF) in an NFV solution. The newly 5G mobile telecom technology is also based on NFV and Software Define Network (SDN) which inherit opportunities and threats of such constructs. Thus a ...

متن کامل

ذخیره در منابع من


  با ذخیره ی این منبع در منابع من، دسترسی به آن را برای استفاده های بعدی آسان تر کنید

برای دانلود متن کامل این مقاله و بیش از 32 میلیون مقاله دیگر ابتدا ثبت نام کنید

ثبت نام

اگر عضو سایت هستید لطفا وارد حساب کاربری خود شوید

عنوان ژورنال:

دوره   شماره 

صفحات  -

تاریخ انتشار 2010