The paper “ Internet-Based Security Risks and Attacks” is a thoughtful example of coursework on information technology. Cloud Computing is a cost-effective, flexible, as well as a recognized delivery platform that offers consumer or business IT services through the Internet. However, Cloud Computing is plagued with security issues, mainly because crucial services are regularly outsourced to a third party making it difficult to maintain data privacy and security, demonstrate compliance, as well as support service and data availability. In essence, scores of technologies are leveraged by cloud computing; it as well inherits their security problems.
This report describes the possible security risks in Cloud computing is related to the CIA (Confidentiality, Integrity, and Availability) triad. Besides that, the report investigates three actual security attacks related to Cloud computing that have occurred. 1.0 IntroductionCloud Computing significance is growing and has received more attention in the industrial as well as scientific communities. Cloud Computing is considered a distribution architecture and computational paradigm in its key objective of providing quick, secure, useful net computing service and data storage, with every computing resource viewed as service and using the Internet to deliver them.
Cloud Computing as observed by Hashizume et al. (2013), integrates numerous computing technologies and concepts like virtualization, Web 2.0, Service Oriented Architecture (SOA) in addition to other technologies. Importantly, Cloud Computing relies on the Internet to offer common applications of the business online by means of web browsers in order to satisfy the users’ computing needs. However, risks attributed to confidentiality, integrity, and availability as it will be evidenced in the report hinders cloud computing from achieving its full potential. 2.0 DefinitionCloud computing has been defined as the delivery of on-demand computing resources over the Internet (Chang, 2015).
Therefore, Cloud computing is broad for everything involved in hosted services delivery over the Internet. 2.1 Technologies That Led To the Development of Cloud ComputingThe serious computing images during the 1950s and 1960s according to Smith (2014) are essentially the revelation of the structure of cloud computing. That is to say, companies in the 1950s were utilizing lots of machines so as to offer more power than that offered by a single unit, in so doing, enabling more users to have access to the same assets.
The Source as well as CompuServe Information Services both went online in 1979, proving that internet services could be hosted by commercial service providers. But it was until 1993 when the internet was made far more graphical by the Mosaic browser, which was easier to use. Afterward, Netscape was launched and in 1995, both eBay, as well as Amazon, surfaced. In 2000, the first bubble burst and companies were forced to rethink their business models. While searching for novel means of monetizing the Internet, scores of companies realized that realize that they could deliver functioning resources and solutions through the provision of a service model.
This trend was initiated over a simple website by Salesforce. com, whereby the company pioneered the enterprise-class applications delivering the concept. Subsequently, Amazon joined the trend in 2002 with Amazon Web Services that offered users the capability to access computation solutions, storage, as well as other applications over the internet. This was further improved by the introduction of Elastic Compute Cloud (EC2) in 2006, and this new technology allowed developers to rent space to run and store their own applications.
By 2009, other companies such as Google and Microsoft were onboard; thus, facilitating easier delivery of service and applications to consumers. 2.2 Advantages and Disadvantages of Cloud Computing
Alani, M. M. (2014). Securing the Cloud: Threats, Attacks, and Mitigation Techniques. Journal of Advanced Computer Science and Technology, 3(2), 202-213.
Barron, C., Yu, H., & Zhan, J. (2013). Cloud Computing Security Case Studies and Research. Proceedings of the World Congress on Engineering, II, pp. 1-5. London.
Chang, V. (2015). Delivery and Adoption of Cloud Computing Services in Contemporary Organizations. Hershey, PA: IGI Global.
Gallagher, S. (2014, February 11). Biggest DDoS ever aimed at Cloudflare’s content delivery network. Retrieved from Ars Technica: http://arstechnica.com/security/2014/02/biggest-ddos-ever-aimed-at-cloudflares-content-delivery-network/
Goel, A., & Goel, S. (2012). Security Issues in Cloud Computing. International Journal of Application or Innovation in Engineering & Management (IJAIEM), 1(4), 121-124.
Hashizume, K., Rosado, D. G., Fernández-Medina, E., & Ferna, E. B. (2013). An analysis of security issues for cloud computing. Journal of Internet Services and Applications, 4(5), 1-13.
Moumtzoglou, A. (2014). Cloud Computing Applications for Quality Health Care Delivery. Delhi: IGI Global.
Sevak, B. (2012). Security against Side-Channel Attack in Cloud Computing. International Journal of Engineering and Advanced Technology (IJEAT), 2(2), 183-186.
Smith, M. (2014, June 4). The History and Development of Cloud Computing. Retrieved from AeroFS: https://www.aerofs.com/blog/the-history-and-development-of-cloud-computing.