What is 'Cloud Security'

Cloud security is the protection of data stored online from theft, leakage and deletion. Methods of providing cloud security include firewalls, penetration testing, obfuscation, tokenization, virtual private networks (VPN), and avoiding public internet connections. Major threats to cloud security include data breaches, data loss, account hijacking, service traffic hijacking, insecure application program interfaces (APIs), poor choice of cloud storage providers, and shared technology that can compromise cloud security. Distributed denial of service (DDoS) attacks are another threat to cloud security. These attacks shut down a service by overwhelming it with data so that users cannot access their accounts, such as bank accounts or email accounts.

BREAKING DOWN 'Cloud Security'

Cloud security is essential for the many users who are concerned about the safety of the data they store in the cloud. They believe their data is safer on their own local servers where they feel they have more control over the data. But data stored in the cloud may actually be more secure because cloud service providers have superior security measures and their employees are security experts. On-premise data can be more vulnerable to security breaches, depending on the type of attack. Social engineering and malware can make any data storage system vulnerable, but on-site data may be more vulnerable since its guardians are less experienced in detecting security threats.

Cloud security is a key concern for cloud storage providers. They not only must satisfy their customers; they also must follow certain regulatory requirements for storing sensitive data such as credit card numbers and health information. Third party audits of a cloud provider’s security systems and procedures help ensure that users’ data is safe.

Maintaining the security of data in the cloud extends beyond securing the cloud itself. Cloud users must protect access to the cloud that can be gained from data stored on mobile devices or carelessness with login credentials. Another cloud security issue is that data stored on a cloud hosted in another country may be subject to different regulations and privacy measures.

When choosing a cloud provider, it is important to choose a company that tries to protect against malicious insiders through background checks and security clearances. Most people think outside hackers are the biggest threat to cloud security, but employees present just as large of a risk. These employees are not necessarily malicious insiders; they are often employees who unknowingly make mistakes such as using a personal smartphone to access sensitive company data without the security of the company’s own network.

RELATED TERMS
  1. Cloud Mining

    Cloud mining offers a mechanism to mine a cryptocurrency such ...
  2. Ichimoku Cloud

    The Ichimoku cloud is a chart used in technical analysis that ...
  3. Dark Cloud Cover

    The Dark Cloud Cover is a bearish reversal candlestick pattern ...
  4. Data Mining

    Data mining is a a process used by companies to turn raw data ...
  5. Denial Of Service Attack (DoS)

    A Denial Of Service Attack (DoS) is an intentional cyberattack ...
  6. Kijun Line

    The Kijun Line is the midpoint between the highest high and lowest ...
Related Articles
  1. Tech

    Hacker Protection: When to Get a Personal Cloud

    With data breaches increasing, it's more important than ever to find the safest way to store your valuable files.
  2. Investing

    Amazon Joins VMware in Cloud Partnership (AMZN, VMW)

    AWS' dominance in the cloud space will strengthen with a VMware hybrid cloud partnership, gaining market share and enticing traditional enterprise clients.
  3. Investing

    Amazon Leads Cloud Infrastructure Market: Canalys

    Amazon's market share is more than the next three players combined, but new players and price cuts may affect the market.
  4. Investing

    Google's Growing Cloud Ambitions

    Cloud is expected to be "one of the largest areas of investment and headcount growth in 2017"
  5. Investing

    Microsoft’s Secret Weapon: Cloud Division (MSFT)

    As the global tech pioneer's hybrid cloud offerings lead to another quarter of double digit growth, a wave of new competitors stand to challenge Azure.
  6. Investing

    AT&T Joins Amazon in Cloud Partnership (T, AMZN)

    The U.S. telecommunications conglomerate will link its private network service with AWS shortly after securing another cloud deal yesterday with IBM.
  7. Investing

    Google, Cisco Ink Cloud Deal to Take on AWS, MSFT

    The tech giants will jointly develop products for use in the cloud and in on-premise data centers.
  8. Investing

    Cisco To Terminate $1B Public Cloud Unit

    Cisco abandons effort to beat Amazon's AWS cloud service.
  9. Investing

    Microsoft in Cloud Deal With US Intel Community

    Microsoft lands a contract with intelligence agencies that could help it win a big Pentagon deal.
  10. Investing

    Microsoft Could Surpass Amazon in Cloud Computing This Year

    Microsoft could surpass Amazon in the exploding cloud computing market, according to Pacific Crest Securities.
RELATED FAQS
  1. Common examples of marketable securities

    Learn about marketable securities and the most common types of debt and equity securities, including common stock, bonds ... Read Answer >>
  2. What's the difference between primary and secondary capital markets?

    In the primary market, investors buy securities directly from the company issuing them, while in the secondary market, investors ... Read Answer >>
  3. How can I calculate the expected return of my portfolio?

    Understand the components of the equation used to calculate the expected return of an investor's portfolio. Learn why the ... Read Answer >>
Hot Definitions
  1. Yield Curve

    A yield curve is a line that plots the interest rates, at a set point in time, of bonds having equal credit quality, but ...
  2. Portfolio

    A portfolio is a grouping of financial assets such as stocks, bonds and cash equivalents, also their mutual, exchange-traded ...
  3. Gross Profit

    Gross profit is the profit a company makes after deducting the costs of making and selling its products, or the costs of ...
  4. Diversification

    Diversification is the strategy of investing in a variety of securities in order to lower the risk involved with putting ...
  5. Intrinsic Value

    Intrinsic value is the perceived or calculated value of a company, including tangible and intangible factors, and may differ ...
  6. Current Assets

    Current assets is a balance sheet item that represents the value of all assets that can reasonably expected to be converted ...
Trading Center