You are on page 1of 2

CC ASSIGNMENT M.

Lalitha
16251A0525

1) How to overcome security issues in cloud computing?


A) 7 tips to prevent cloud security threats within their organizations.

1. Educate your employees.


For most organizations, there is an easy explanation for the security threats:
uneducated employees. By teaching your employees proper defense practices, you can
minimize risk and prevent cloud security threats:
 Involve the entire company. When employees are actively involved in protecting
company assets, they’re more likely to take ownership of their obligations
regarding security measures.
 Involve the entire workforce in security training and brief them on best
practices moving forward.

2. Secure a data backup plan.

 As the cloud continues to mature, the possibility of permanent data loss is high.
Make sure that whatever happens, you have a secure backup of that data.

 IT managers should distribute data and applications across multiple zones for
added protection, as well as adhere to best practices in daily data backup,
offsite storage and disaster recovery.

3. Who has access to the data?

 the location of your stored data is important — but nowhere near as important
as who has access to it.

 Be proactive and put security measures in place to make sure that your data is
protected.

 Rather than utilizing one too many passwords, implement single sign on (SSO)
authentication capabilities.

4. Encryption is key.

 Cloud encryption is critical for protection. It allows for data and text to be
transformed using encryption algorithms and is then placed on a storage cloud.

 Do not store encryption keys in the software where you store your data. IT
teams need to keep physical ownership of encryption keys as well as vet the
strength of the encryption techniques being used.
CC ASSIGNMENT M.Lalitha
16251A0525

5. Take passwords seriously.

 Since files are zipped and encrypted with passwords, it’s important to choose
one wisely. Most passwords — 90%, to be exact — can be cracked within
seconds.

 Come up with distinct, original passwords to deter hackers.

6. Test, test, test.

 When putting measures in place to protect your cloud, think like a criminal. One
of the best ways to do this is penetration testing: an IT security practice
designed to identify and address vulnerabilities as well as minimize cloud
security threats

7. Establish thorough cloud governance policies.

 Certifying a cloud application is only the beginning. Make sure you have the
right cloud application governance process in place to ensure compliance with
internal and external data privacy mandates. 

 Train your information workers and enforce usage policies, conduct periodic
health checks and risk assessments, and stay alert to the ever-changing security
landscape.

You might also like