Cloud Computing Security: Abuse and Nefarious Use of Cloud Computing

Cloud computing is an emerging and promising computing model that provides on-demand computing services which eliminates the need of bearing operational costs associated with deploying servers and software applications. As with any technology, cloud computing presents its adopters with security and privacy concerns that arise from exposing sensitive business information to unauthorized access. This paper will explore and investigate the scope and magnitude of one of the top cloud computing security threats “Abuse and nefarious use of cloud computing” and present some of the attacks specific to this top threat as it represents a major barrier for decision makers to adopting cloud computing model.

Subscribe to the Cloud Insider Newsletter

This is your go-to resource for the latest news and tips on the following topics and more, XaaS, AWS, Microsoft Azure, DevOps, virtualization, the hybrid cloud, and cloud security. Delivered Mondays and Wednesdays

Subscribe to the Cloud Insider Newsletter

This is your go-to resource for the latest news and tips on the following topics and more, XaaS, AWS, Microsoft Azure, DevOps, virtualization, the hybrid cloud, and cloud security. Delivered Mondays and Wednesdays

Resource Details

Provided by:
IJCER
Topic:
Cloud
Format:
PDF