Four new challenges to information security in the

2022-08-18
  • Detail

In the era of cloud computing, information security faces four new challenges

the National Institute of standards and Technology (NIST) defines cloud computing as: a pay per use model, which provides available, convenient, on-demand network access, and enters the configurable computing resource sharing pool (resources include network, server, storage, application software, and services). These resources can be provided quickly, It requires little management or interaction with service providers. However, with the development of cloud computing era, a new challenge has been launched in the face of information security, which will have a huge impact on China's plastic export industry

challenge 1:

traditional information security technology cannot meet cloud computing information security 10 Air supply outlet: there are two air supply outlets with a diameter of 50mm on the left side of the box (which can also be used to measure voltage, etc.). Cloud computing information security is the product of the deep integration of cloud computing and information security. Traditional information security technologies and products are also used to prevent security threats in cloud computing. For example, reliability, verification and authorization, data loss, and information lifecycle management. However, with the gradual popularization of cloud services, the traditional information security technology can no longer support and meet the rapid development of cloud computing. Professional cloud computing information security technology needs to be developed urgently

Challenge 2:

malware, confidentiality and access authentication threaten the information security of mobile cloud computing. With the rapid popularization of mobile Internet, various viruses against mobile terminals are emerging in endlessly. The virus has expanded from simple system destruction and malicious fee deduction to privacy theft, financial number theft and eavesdropping monitoring, which further increases the threat to users

challenge 3:

huge security risks faced by cloud computing information security due to user data leakage or loss. When user data is transmitted and stored in the cloud computing environment, users themselves have no actual control over the security risks of their data in the cloud. Therefore, data security depends entirely on the service provider. If the service provider has oversight over data security, it is likely to lead to data leakage or loss

challenge 4:

cloud computing faces the security risk of user identity authentication. In the process of providing cloud services, cloud computing service providers need to introduce strict identity authentication mechanism. If the identity authentication management system of the operator has security vulnerabilities or defects in the management mechanism, it may cause the user's account to be counterfeited, especially the data of enterprise users to be illegally stolen. In the cloud computing environment, there is a new demand for the security access and access control of cloud users, especially after IAAs' service model provides safe, environmental friendly and energy-saving building materials for the society. Now, service providers need to provide self-service management interfaces for each user, and potential security vulnerabilities will lead to all kinds of unauthorized illegal access, And the weak user authentication mechanism also buried a huge hidden danger of cloud computing information security

Copyright © 2011 JIN SHI