Five Security Problems Facing Cloud Computing

The status of network security in the entire informatization is known to every informatization worker, whether it is the confidentiality and security of files on desktop systems and personal computers, or the communication security of network equipment, as well as the security of mail servers and the overall information system of the enterprise.

In the course of network security development, stand-alone anti-virus and anti-virus used to be the most important form in the last decade of the last century. In this century, firewalls, anti-intrusion and three-dimensional defense attacks have become new security solutions.

However, with the development of the times and the complexity of the Internet, these common technical means cannot fully meet the challenges. Security issues under the new situation face the following challenges.

System security of virtual machines brought about by virtualization

Virtualization is no stranger to most information workers today. The reason is very simple. Originally, the utilization rate of server hosts is not very high. If you encounter a heterogeneous environment, it is very economical and convenient to use a virtual machine to solve it. method, so it has been loved by most fans.

However, there are also problems. If so many virtual machines are opened for no reason, if one system is infected with a virus, will other systems be implicated, whether the isolation work can be done well, and even whether the background storage and data information will be affected. If the virtual machine system crashes, will it affect other virtual machines? This is a very real problem.

How Cloud Computing Ensures the Security of Its Key Business Data

Cloud computing is also the hottest topic at the moment. If you put your business in the cloud data center, how users in the system can easily share it saves a lot of things. It looks beautiful, but what about security issues, what if the data is leaked?

This is a question on every CIO's mind. This issue is not only a security issue, but also an informatization planning issue, and one must be familiar with all aspects of cloud computing. Which layer should I use for virtualization and how to do it. These issues present both opportunities and challenges for security vendors.

Identity authentication security, personal information security and transaction security brought about by the rise of e-commerce

E-commerce has become an important development direction of the Internet. At present, the annual transaction volume generated by the national network has accounted for 9% of the total annual transaction volume. Many valuable and large items also have a tendency to be traded on the Internet.

Therefore, the security of e-commerce transactions has become a very urgent issue, but in this regard, the security protection of users is very weak, personal transaction passwords are stolen, and information leakage problems of websites or bank databases emerge one after another, becoming new security hotspots.

Security Issues Brought by the Impact of Mobile Users on Traditional Networks

With the popularity of smart phones and the development of mobile Internet, the security of mobile terminals is challenging the traditional network attack and defense system. As you know, the traditional security protection in the past was to guard the ports of my server, and use firewalls, anti-virus walls and traffic monitoring to form a Maginot line of defense, so that mail servers, database servers, and various attacks from outside will be rejected. outside. However, when the mobile Internet is integrated into the conventional network, it is estimated that the previous plane has become three-dimensional. Many email viruses or attack programs are introduced from mobile phones or PDAs, which poses a huge challenge to conventional protection systems.

Information security brought by data center and cloud storage

The data center built ten years ago not only has aging equipment, but also the overall structure can no longer adapt to development. How to store the massive data generated every day, it is unrealistic to expand one's own hardware without limit. Then, you can only try cloud storage, but when the data is moved to the cloud, security issues immediately arise again. Is the traditional data center coming to an end, and how to build a new energy-efficient data center is a headache.

おすすめ

転載: blog.csdn.net/XiaoYiLiangZai/article/details/124450191