DATABASE FUNDAMENTALS
CLOUD COMPUTING AND DATABASES
Question
[CLICK ON ANY CHOICE TO KNOW THE RIGHT ANSWER]
|
|
It is vulnerable to hacking
|
|
The storage can be easily expanded
|
|
Portability
|
|
All of the above
|
Detailed explanation-1: -Inadequate cloud security measures lead to data leakage over cloud networks which can result in intellectual property theft, contract breaches, and malware attacks. Hackers can also control how companies provide services to their customers or end-users.
Detailed explanation-2: -2) Vendor lock-in Vendor lock-in is the biggest disadvantage of cloud computing.
Detailed explanation-3: -Cloud services rely heavily on APIs to communicate with applications. It might seem like a neat little tool, but these APIs are the most prone to cyberattacks. Hackers can launch DoS attacks and inject codes to break into the cloud server and access the organization’s personal data.
Detailed explanation-4: -Having unsecure identity and access management (IAM) is a common vulnerability in cloud systems. In a nutshell, it occurs when a user or service of your infrastructure has access to resources they should not be able to access and/or do not need.