cloud computing security concerns

Upload: s

Post on 06-Mar-2016

5 views

Category:

Documents


0 download

DESCRIPTION

Scholarly essay regarding issues of cloud computing securitization in the 21st century

TRANSCRIPT

Cloud computing-based security boxes provide the necessary securitization and encryption needed to ensure that a private social network stays bolstered against outsiders. Cloud computing is the wave of the future for computer users the world over. Essentially, within a cloud computing network, numerous computers are connected and interfacing through a centric communicative network (i.e. the internet, for instance) where users can each run a co-communicative program on their computers concomitantly. Security boxes offer the needed surety to engender the privacy and encryption needed to keep uninvited guests out of the interdisciplinary functioning of the network. Securing a private social network, via a security box, is tantamount to securing the computers, networks, users and information flow involved within the cloud. Security boxes aim to protect and bolster the infrastructure and formalized coordinates of cloud ingress and egress points. There are multiple levels of securitization to ensure that the potency of a cloud networks security system is as robust as it can be. There are multiple facets of securitization that can be implemented in order to strengthen the borders and private usability of a discreet social network.Firstly, deterrent controls are instated parameters used to preempt and prevent overt nefarious attacks on any external tier and mainframe component of a cloud network. While these control mechanisms do not completely offer impermeability of a network, they do function as a warning to hackers attempting to find weak and vulnerable spots in a cloud system. Likewise, corrective controls are utilized in case a penetrative attack is successful in corrupting the most external controls of a cloud system. Corrective controls use preconfigured methodologies and damage control parameters to foil the after-effects of an attack if its initial viral thrust is successful.Additionally, preventative controls are parameters and fortifications that continually assess, upgrade and revamp any detectable vulnerabilities of the cloud system. These vulnerabilities are safeguarded and troubleshot in order to provide back-up solutions for if they are penetrated by insidious attacks. Essentially, preventative controls are administered to control the primary and collateral damage if an attack were to occur. Furthermore, preventative controls, just like white blood cells in a human body, work to rebuild the fidelity of a previously breached system. In addition, detective controls are utilized in order, in real-time, find and troubleshoot attacks occurring within more internalized and deeper segments of a cloud system. Detective controls are comprised of a signaling system that alerts the preventative and corrective control systems to come to the aid of a cloud system when it is permeated in ways that are deeper than superficially. Security boxes also entail aspects that bolster other security features of a cloud network. For example, identity supervision systems are instilled in order to control and monitor who has access to proprietary data and computational functions of the cloud system. SSO technologies are utilized are used by cloud computing providers to merge cohesive identity supervisions systems with the infrastructure of the private social network. Also, security boxes stipulate that the physical hardware components utilized by private social network members will be comprehensively secured and encrypted against hackers. Likewise, access to social network members data is restricted yet also stringently documented in order to make sure that prying eyes are not able to find weak points within the systemic structure of the network. Security boxes also stipulate that private social network members will have inexhaustible, exclusive and 24/7 accessibility to their proprietary data flow and ancillary applicatory contents. Furthermore, the security of cohesive applications is further bolstered by the security box service additively synthesizing hermeneutic testing protocols for application codes. Thus, securitization of applications is a mode of protocol that is started even within the product production process.Furthermore, within the framework of private social networks, proprietary and fiduciary information, such as credit card data and social security numbers, are encrypted and masked so that only authorized users have access to such sensitive information. Also, in regard to issues of legality, security box stipulates terms of service and other regulatory clauses in order to disclose all aspects of litigation-based relevance. Security box also uses various tiers and measures of complicity in order to obtain consent and interdisciplinary authorizations between members and administrators of a private social network. Securitization of private social networks is integral in terms of ascertaining that members can exchange flows of data and information without fear of being interposed by outsiders who are not welcome. Securitization of cloud-based networks is also difficult to quantify and qualify as cloud-based network providers are mostly still beta-testing aspects of their wares. Thus, customer service between providers and users can sometimes be spotty, especially if hacks or attacks against a network happen outside of business hours. In this case, proprietary members would have to wait until business hours to obtain a solution from the provider or go it alone and attempt to comb the internet for information on how to render the problem moot. Cloud computing service providers also still have a bit of trouble making sure that data breaches do not occur. It has been ascertained that a sophisticated algorithm could use timing information tactics to mirror and mimetically execute cryptogram information obtained from other users key strokes. Thus, this shows how a very small point of ingress/egress into a cloud system could constitute a wide and gaping hole of opportunity for a middling to expert-level hacker. It has also been found that some of the measures utilized to mitigate data breaches can also aid in exacerbating the problem at hand. Since the technology used in cloud computing networks can be quite serpentine, convoluted and multi-tiered such reconfigured calibrations of systemic functions can create new vulnerabilities. Hence, there must be expanded measures put in place in order to guard against the constantly shifting propensity and probability of corruption within any one of the numerous tiers of a cloud-based network.In summation, security boxes provide extensive and mutli-tiered defenses against the myriad of data breaches and hacking potentialities that can plague a nascent cloud-based private social network. Since cloud-based computing is still a relatively new and inchoate function, cloud computing providers must consistently analyze and reevaluate their tactics and modalities of quality care in order to provide the greatest modalities of protection to their clientele. Furthermore, the essential basis of a private social network is discretion, privacy and sensitivity in regard to information, data and pedigree information. Due to these parameters, security boxes are constantly being revamped and tweaked in order to provide greater protection in order to decrease the propensity for vulnerabilities and systemic failure.