Comments
yourfanat wrote: I am using another tool for Oracle developers - dbForge Studio for Oracle. This IDE has lots of usefull features, among them: oracle designer, code competion and formatter, query builder, debugger, profiler, erxport/import, reports and many others. The latest version supports Oracle 12C. More information here.
Cloud Computing
Conference & Expo
November 2-4, 2009 NYC
Register Today and SAVE !..
SYS-CON.TV
Today's Top SOA Links


Understanding Cloud Vulnerabilities
The cloud is not always the target

It isn’t so much that cloud computing solutions are more vulnerable than traditional solutions; rather, cloud vulnerabilities take a much different form (and can occur on a much wider scale) than traditional security vulnerabilities.

Up to this point, most of the major issues with cloud providers have had more to do with outages rather than data breaches. That doesn’t mean there are no risks in the cloud, but that the form of cloud attacks may be different than traditional attacks.

The cloud is not always the target

Keep in mind that, in terms of the very public cloud security breaches such as we saw in 2011 with Sony, the cloud itself isn’t necessarily the target. In some cases, it’s actually part of a hacker’s toolset.

Hackers in that instance used stolen credit card numbers to rent Amazon cloud servers to use as an attack on Sony. The same resources that the cloud offers to legitimate organizations can also be purchased by cyber-criminals.

What makes the cloud so vulnerable

Part of the reason that cloud computing solutions are as robust as they are from the security perspective is that cloud providers are highly motivated to create secure environments. Networks aren’t isolated anymore. Once the Internet took hold, company networks became connected with public infrastructure, and cloud providers were there to make it happen.

The biggest weaknesses of the cloud, however, are basic issues that are often easily resolved. Weak authentication protocols, an open management port, or the need to manage cloud resources remotely are all reasons why the cloud can become vulnerable. Hackers are recognizing all of these open ports, and starting to use them.

How these vulnerabilities affect your organization

While most surveyed companies say they believe cloud providers can provide a truly secure environment, nearly two thirds of those companies said that they wouldn’t put corporate finance information in the cloud. Most keep credit cards out of the cloud. The same is true of HR info and other confidential resources.

Ultimately, cloud security is improving as time goes on. When your organization is looking at a cloud solution, ask the tough questions about security. If possible, get the provider to build security measures into the SLA, too.

Read the original blog entry...

About Unitiv Blog
Unitiv, Inc., is a professional provider of enterprise IT solutions. Unitiv delivers its services from its headquarters in Alpharetta, Georgia, USA, and its regional office in Iselin, New Jersey, USA. Unitiv provides a strategic approach to its service delivery, focusing on three core components: People, Products, and Processes. The People to advise and support customers. The Products to design and build solutions. The Processes to govern and manage post-implementation operations.

Subscribe to the World's Most Powerful Newsletters
Subscribe to Our Rss Feeds & Get Your SYS-CON News Live!
Click to Add our RSS Feeds to the Service of Your Choice:
Google Reader or Homepage Add to My Yahoo! Subscribe with Bloglines Subscribe in NewsGator Online
myFeedster Add to My AOL Subscribe in Rojo Add 'Hugg' to Newsburst from CNET News.com Kinja Digest View Additional SYS-CON Feeds
Publish Your Article! Please send it to editorial(at)sys-con.com!

Advertise on this site! Contact advertising(at)sys-con.com! 201 802-3021

SYS-CON Featured Whitepapers
ADS BY GOOGLE