What Are The Various Cloud Service Models
What Are The Various Cloud Service Models
-----------------------------------------------------------------------------------------
Characteristics of IaaS
Characteristics of PaaS
Characteristics of SaaS
-----------------------------------------------------------------------------------------
The below table shows the difference between IaaS, PaaS, and SaaS -
----------------------------------------------------------------------------------
The most widely used cloud computing applications are given below -
7. What are the Security Risks of Cloud Computing
Data Loss
Data loss is the most common cloud security risks of cloud computing. It
is also known as data leakage. Data loss is the process in which data is
being deleted, corrupted, and unreadable by a user, software, or
application. In a cloud computing environment, data loss occurs when our
sensitive data is somebody else's hands, one or more data elements can
not be utilized by the data owner, hard disk is not working properly, and
software is not updated.
Data Breach
Vendor lock-in
Spectre & Meltdown allows programs to view and steal data which is
currently processed on computer. It can run on personal computers,
mobile devices, and in the cloud. It can store the password, your personal
information such as images, emails, and business documents in the
memory of other running programs.
Denial of service (DoS) attacks occur when the system receives too much
traffic to buffer the server. Mostly, DoS attackers target web servers of
large organizations such as banking sectors, media companies, and
government organizations. To recover the lost data, DoS attackers charge
a great deal of time and money to handle the data.
Account hijacking