What is 'Cloud Security'

Cloud security is the protection of data stored online from theft, leakage and deletion. Methods of providing cloud security include firewalls, penetration testing, obfuscation, tokenization, virtual private networks (VPN), and avoiding public internet connections. Major threats to cloud security include data breaches, data loss, account hijacking, service traffic hijacking, insecure application program interfaces (APIs), poor choice of cloud storage providers, and shared technology that can compromise cloud security. Distributed denial of service (DDoS) attacks are another threat to cloud security. These attacks shut down a service by overwhelming it with data so that users cannot access their accounts, such as bank accounts or email accounts.

BREAKING DOWN 'Cloud Security'

Cloud security is essential for the many users who are concerned about the safety of the data they store in the cloud. They believe their data is safer on their own local servers where they feel they have more control over the data. But data stored in the cloud may actually be more secure because cloud service providers have superior security measures and their employees are security experts. On-premise data can be more vulnerable to security breaches, depending on the type of attack. Social engineering and malware can make any data storage system vulnerable, but on-site data may be more vulnerable since its guardians are less experienced in detecting security threats.

Cloud security is a key concern for cloud storage providers. They not only must satisfy their customers; they also must follow certain regulatory requirements for storing sensitive data such as credit card numbers and health information. Third party audits of a cloud provider’s security systems and procedures help ensure that users’ data is safe.

Maintaining the security of data in the cloud extends beyond securing the cloud itself. Cloud users must protect access to the cloud that can be gained from data stored on mobile devices or carelessness with login credentials. Another cloud security issue is that data stored on a cloud hosted in another country may be subject to different regulations and privacy measures.

When choosing a cloud provider, it is important to choose a company that tries to protect against malicious insiders through background checks and security clearances. Most people think outside hackers are the biggest threat to cloud security, but employees present just as large of a risk. These employees are not necessarily malicious insiders; they are often employees who unknowingly make mistakes such as using a personal smartphone to access sensitive company data without the security of the company’s own network.

RELATED TERMS
  1. Cloud Computing

    Cloud computing is a model for delivering information technology ...
  2. Cloud Mining

    Cloud mining offers a mechanism to mine a cryptocurrency such ...
  3. Data Loss

    Data loss occurs when valuable and/or sensitive information on ...
  4. Cloud on Title

    A cloud on title is any document or encumbrance that might invalidate ...
  5. Data Breach

    A data breach is an unauthorized access and retrieval of sensitive ...
  6. Data Mining

    Data mining is a process used by companies to turn raw data into ...
Related Articles
  1. Investing

    Microsoft Preview: Watch for Cloud Results (MSFT)

    Microsoft has forecast a decline in cloud revenue for the latest quarter when it reports earnings after market's close
  2. Investing

    VMware Cries Uncle, Joins Amazon Cloud (VMW, AMZN)

    The technology infrastructure giant will run its Cloud Foundation on Amazon Web Services public cloud servers.
  3. Investing

    Amazon Leads Cloud Infrastructure Market: Canalys

    Amazon's market share is more than the next three players combined, but new players and price cuts may affect the market.
  4. Investing

    Amazon, Microsoft Still Rule Cloud; Oracle, Alibaba May Catch Up

    There are new players in the cloud computing industry.
  5. Investing

    US Complains About China Cloud Restrictions

    U.S. lawmakers sent a letter to the Chinese ambassador complaining about restrictions on foreign cloud computing players.
  6. Investing

    Apple Confirms It Uses Google's Cloud for iCloud

    Google's cloud wins business from market leaders Amazon and Microsoft.
  7. Investing

    Microsoft’s Secret Weapon: Cloud Division (MSFT)

    As the global tech pioneer's hybrid cloud offerings lead to another quarter of double digit growth, a wave of new competitors stand to challenge Azure.
  8. Investing

    Amazon Among First With Cloud Service AI

    Amazon is among the first cloud service providers to launch a AI-focused feature on AWS.
  9. Investing

    What Oracle’s Aggressive Cloud Initiative Means (ORCL)

    Oracle threatens Amazon's cloud dominance, while joining a wave of old guard tech companies restructuring to find their niche in the booming cloud space.
  10. Investing

    Microsoft Could Surpass Amazon in Cloud Computing This Year

    Microsoft could surpass Amazon in the exploding cloud computing market, according to Pacific Crest Securities.
RELATED FAQS
  1. What's the difference between primary and secondary capital markets?

    In the primary market, investors buy securities directly from the company issuing them, while in the secondary market, investors ... Read Answer >>
  2. How can I calculate the expected return of my portfolio?

    To calculate the expected return of a portfolio, an investor needs to add up the weighted averages of each of the investor's ... Read Answer >>
  3. When is managerial accounting appropriate?

    Understand the difference between managerial accounting and financial accounting, and learn common scenarios in which managerial ... Read Answer >>
  4. How do Internet companies profit if they give away their services for free?

    Learn how companies in the Internet sector make a profit when service, content and user applications are offered at no cost ... Read Answer >>
Trading Center