Close Menu
Technotification
    Facebook X (Twitter) Instagram
    Facebook X (Twitter) Instagram
    Technotification
    • Home
    • News
    • How To
    • Explained
    • Facts
    • Lists
    • Programming
    • Security
    • Gaming
    Technotification
    Home › Explained › Cloud Computing and Security Threats you need to Know about

    Cloud Computing and Security Threats you need to Know about

    By Ratnesh ShindeMarch 7, 2021
    Facebook Twitter Reddit LinkedIn
    cloudcomputing.jpg

    As modern as cloud computing is, it’s also vulnerable to old attacks. A solution that quickly comes to mind is the advantage of using a cloud. Specialized cloud services provide customers with unrestricted capacity or unlimited bandwidth and resources and a level of security mechanisms and experience that can be impossible to enforce at the local level.

    However, there is no place where the old cliché, a chain that is only as strong as its weakest component, relates more than in cloud computing. Here’s a situation that might seem stupid, but it’s completely plausible and actually one of the weakest ties of any defense system—social engineering. A small government department keeps confidential legal records in its computer space. Both data must be stored in a physical location. Also, the largest cloud has its endpoint where the data is still alive. In this situation, the records are stored in a computer room on the floor of a building that the Department shared with several other departments.

    In an attempt to prove that nothing is safe, a college student placed her bag over her shoulder and walked into the building displaying her student id, and said she had an appointment with the education agency. She was allowed to use the elevator. She went up to the law office floor and informed the receptionist that she was a student intern and was invited to go to the staff part of the department where she set up her bag and pulled out a file folder. Then she piggybacked on someone’s entry to an inner, more accessible place, and the file folder flourished. She put a stern smile on her face and walked to the door to the server space, waiting for a guy to come along.

    She said she wanted to go back to the server space, and “Bob (person name),” who had opened the door for her, had evidently gone for coffee and left her locked up. She turned her head aside and vowed that she wouldn’t be looking for her when this guy tapped the code for her. And he did it. This is social psychology which is unlikely to succeed now. The need for protection has become more inherent in the world of the 21st century. But this is an extreme example of how individuals can undermine the most stable device. Bringing social innovation to the field of cloud computing, the strongest infrastructure in the world will be undermined if there is a flaw in any of the environments where cloud users are. If an outsider can get into the system of the consumer, that person has the potential to disrupt the system or compromise or steal information.

    Share. Facebook Twitter LinkedIn Tumblr Reddit Telegram WhatsApp
    Ratnesh Shinde

    Related Posts

    Difference Between C, C++, C#, and Objective-C Programming

    February 16, 2025

    Developing High-Performing Tech Teams: Key Strategies

    August 28, 2024

    The Psychology of a Phishing Email: How Scammers Play with Your Mind

    July 16, 2024

    9 Essential Elements of a Strong Cyber Security Management System

    July 3, 2024

    Common Cyber Attacks and How to Prevent Them

    July 3, 2024

    How Cyber Security Paid Training Prepares You for Real-World Threats

    June 13, 2024
    Lists You May Like

    10 Sites to Watch Free Korean Drama [2025 Edition]

    January 2, 2025

    10 Best RARBG Alternative Sites in April 2025 [Working Links]

    April 1, 2025

    The Pirate Bay Proxy List in 2025 [Updated List]

    January 2, 2025

    10 Best Torrent Search Engine Sites (2025 Edition)

    February 12, 2025

    10 Best GTA V Roleplay Servers in 2025 (Updated List)

    January 6, 2025

    5 Best Torrent Sites for Software in 2025

    January 2, 2025

    1337x Alternatives, Proxies, and Mirror Sites in 2025

    January 2, 2025

    10 Best Torrent Sites for eBooks in 2025 [Working]

    January 2, 2025

    10 Best Anime Torrent Sites in 2025 [Working Sites]

    January 6, 2025

    Top Free Photo Editing Software For PC in 2025

    January 2, 2025
    Pages
    • About
    • Contact
    • Privacy
    • Careers
    Privacy

    Information such as the type of browser being used, its operating system, and your IP address is gathered in order to enhance your online experience.

    © 2013 - 2025 Technotification | All rights reserved.

    Type above and press Enter to search. Press Esc to cancel.