Embracing Cloud Computing

Cloud Computing is the practice of using a network of remote servers hosted on the Internet to store, manage, and process data, rather than a local server or a personal computer.  At Ngamia we embrace cloud computing because of efficiency in service provisions, cost implications, and aspect of technological vibrancy when it comes to systems platform selection, expansion and security.Cloud computing supports cloud security which refers to a broad set of policies, technologies, applications, and controls utilized to protect virtualized Internet Protocol (IP), data, applications, services, and the associated infrastructure of the framework – Information Security (InfoSec) which includes computers and IP Network Communications.Like cyber security, cloud security is very broad and it comes with various challenges of attacks like cyber crimes which are very hard to prevent.  However, a well-designed security strategy helps reduce the risk of cyber-attacks.Many aspects of cloud security be it public, private, or hybrid frameworks are the same as for any on-premise IT architecture.In normal working environments where there is an intensity of internet use, Pareto principle applies 80/20, of which the 80% of the internet traffic or workload may not demand the highest level of encryption and security, however, the 20% of the traffic which is outbound would need very tight security implementations.  This is like locking your home to keep personal belongings relatively secure, and still have the option of locking your valuables in a safe which comes with the operating systems functionalities and other third-party tools.As ardent users of cloud computing, here are some of the Security Risks we must observe: –
  1. Data exposure and leakage
  2. An unauthorized access especially to the internal data
  3. An authorized internal use with too much access rights
  4. A malicious attack i.e. DDoS or malware that might compromise cloud infrastructure
The main objective of a Cloud Security strategy is to reduce threats posed by these kinds of risks as much as possible by protecting data, managing user authentication, access controls, and having a disaster recovery plan.  
Share

Category: ,

Leave a comment

Your email address will not be published. Required fields are marked *