ALL >> Computer-Programming >> View Article
The 9 Biggest Online Security Threats In 2014
The increasing use of cloud in the enterprise is changing the threat landscape for many companies. The Cloud Security Alliance, an industry association founded in 2008, recently published its latest ranking of the top online security threats. Over the past couple years as companies put more data into the cloud the nature of threats has changed. The latest Cloud Security
landscape is profiled in its “Notorious Nine” list of the top security threats faced by enterprises this year.
Compared to 2010, several threats have moved up in the rankings. Data breaches now rank as the top threat to companies as they store data in cloud services they don’t have direct control over. With the average company using 626 cloud services, there is a wide range in the security controls, ranging from ones built for the enterprise like Box to consumer grade services without the same security controls.
Data loss also moved from 5th to 2nd this year as more companies grapple with the destruction of data in the cloud. Denial of service attacks were previously not ranked and have ...
... made the top 9 list this year. Other risks such as insecure APIs have declined in their relative severity compared to other threats.
1. Data Breaches
When companies store data in the cloud they put their trust in companies they don’t directly control, or in many cases even evaluate for security. The recent Target data breach of credit cards shows that attackers continue to focus on where large amounts of sensitive data is stored. When company employees store data in the cloud, if there’s a breach all the data from every customer of that Cloud Security
service could be affected. Evernote, Dropbox, and Scribd are some of the cloud services that have recently experienced significant security breaches.
2. Data Loss
IT departments developed a number of processes to protect data from loss including using backups of data and RAID storage systems. But is your cloud provider backing up data stored in the cloud? Data in the cloud could be lost in several ways including users who forget their login credentials, data that is not backed up by the cloud provider who experiences data loss, compromise by malicious third party, and losing encryption keys protecting that data making it indecipherable. In April 2011 Amazon AWS experienced data loss during a “remirroring storm” attack. Wired write Mat Honan had his personal photos and email accounts erased by a hacker.
3. Account or Service Hijacking
Enterprises are seeing increases hijacking of accounts and even sessions when users login. Man in the middle attacks allow a third party to view the data being sent to and from the cloud by an employee. Cloud services that encrypt data in transit and use certificates help reduce the risk of these types of attacks.
4. Insecure APIs
While declining in relative severity, insecure APIs still represent a threat to corporate data. As more and more cloud apps utilize public APIs to exchange data with other apps and devices, the security of those APIs is paramount. After OAuth became a standard used by Twitter and Google the prevalence of this problem has declined over time relative to other security issues.
5. Denial of Service
Millions of automated requests by computers controlled by malicious code can now be detected and filtered out before it brings down a service. But attackers are finding new ways to launch attacks on an even larger scale that are distributed and more difficult to detect and isolate from normal traffic to a service. This is especially problematic for providers running on IaaS such as Amazon AWS or Microsoft Azure as they get billed from the increased resources consumed during an attack.
6. Malicious insiders
When you hand over your data to a third party, you need to worry about who has access to your data at the provider. Each cloud provider has different policies, and there is a wide range of internal security controls. The best way to protect your data, say experts, is to encrypt data before it leaves your company with encryption keys you own and control, so even the cloud provider itself cannot decrypt and view your data stored on the cloud service.
7. Abuse of Cloud Services
The same large scale elastic computing services that allow cloud providers and enterprises to gain quick access to computing resources without making large capital investments also benefit attackers needing computing power. For example, using cloud infrastructure allows an attacker to quickly crack passwords, or serve malware at scale, or lunch DDoS attacks. The tools that you use to be more productive can also be used by nefarious parties to cause damage and launch attacks.
8. Insufficient Due Diligence
One of the biggest problems with Shadow IT
is that employees do very little due diligence on a cloud provider before they store company data in the service. Companies have hundreds of cloud services in use with their data spread among them, but only a small fraction have been properly vetted by the IT department. Many users may be completely unaware of some of the legal obligations hidden in terms and conditions of each service, clicking “accept” without reading them.
9. Shared Technology
Another disadvantage of sharing computing resources with other users of a service is that it can open you to certain types of attacks and security breaches. For instance, a vulnerability affecting the shared infrastructure being used by tenants of a cloud service can affect all of them. Each vulnerability is magnified across many different consumers, instead of isolating them to one user.
Author :
Skyhigh Networks, the Cloud Security Services company, enables companies to embrace Cloud Security Services with appropriate levels of security, compliance, and governance while lowering overall risk and cost. With customers in financial services, healthcare, high technology, media, manufacturing, and legal verticals, the company was a finalist for the RSA Conference 2013 Most Innovative Company award and was recently named a "Cool Vendor" by Gartner, Inc. Headquartered in Cupertino, Calif., Skyhigh Networks is led by an experienced team and is venture-backed by Greylock Partners and Sequoia Capital. For more information, visit us at http://www.skyhighnetworks.com/ or follow us on Twitter@skyhighnetworks.
Add Comment
Computer Programming Articles
1. Which Are The Best Java Coding Classes In Bhopal?Author: Shankar Singh
2. Warehouse Management In Zambia: Essential Features To Look For
Author: Doris Rose
3. Ecommerce Web Design And Development In Melbourne With The Merchant Buddy
Author: themerchantbuddy
4. Why Website Maintenance Is Crucial For Business Success
Author: Yogendra Shinde
5. Boost Your Business With Smart Invoice Pos Software In Zambia
Author: Cecilia Robert
6. How Stablecoin Development Ensures Stability And Security?
Author: Michael noah
7. Công Cụ Tính Chiều Cao Chuẩn Từ Minbin Tool: Đo Lường Và Cải Thiện Chiều Cao Hiệu Quả
Author: KenJi123
8. How To Make A Courier App For Courier Delivery And Tracking Service
Author: Deorwine Infotech
9. Reputation Management In The Digital Age: Protecting And Enhancing Your Law Firm’s Image
Author: jamewilliams
10. What Features Should I Look For In Wordpress Ecommerce Plugins?
Author: Rocket Press
11. Staying Updated With The Latest Gaming News
Author: Next Tech Plus
12. Game Development: Evolving Technologies And New Horizons
Author: Rick John
13. Why Svelte Is The Most In-demand Framework For Web Development?
Author: Why Svelte Is The Most In-Demand Framework For Web
14. Maximizing Ebay Sales With Maropost/neto And Pursuit Info Solutions
Author: rachelvander
15. The Importance Of Software Testing: Ensuring Quality In Development
Author: John Mathew