Not All Threats Are External Cloud Computing

Firstly, such a belief assumes that most threats are external. Experience teaches the opposite. Authentication-related challenges such as credential management, strong authentication (typically defined as multifactor authentication), delegated authentication, and managing trust across all types of cloud services are issues wherever the data resides, and it is likely (or at least possible) that cloud vendors have superior systems in place, and more experience in access restriction, than in the typical enterprise environment.

Secondly, larger service providers often provide superior protection against such forms of attack as distributed denial of service (DDoS), man in the middle (MitM), IP spoofing, port scanning, and packet sniffing by other tenants.


Face Book Twitter Google Plus Instagram Youtube Linkedin Myspace Pinterest Soundcloud Wikipedia

All rights reserved © 2018 Wisdom IT Services India Pvt. Ltd DMCA.com Protection Status

Cloud Computing Topics