EMERGING TRENDS IN SOFTWARE ENGINEERING
CLOUD COMPUTING
Question
[CLICK ON ANY CHOICE TO KNOW THE RIGHT ANSWER]
|
|
It is vulnerable to hacking
|
|
The storage can be easily expanded
|
|
Portability
|
|
All of the above
|
Detailed explanation-1: -Inadequate cloud security measures lead to data leakage over cloud networks which can result in intellectual property theft, contract breaches, and malware attacks. Hackers can also control how companies provide services to their customers or end-users.
Detailed explanation-2: -What makes cloud storage so safe? First, servers are usually located in warehouses that most workers don’t have access to. Secondly, the files stored on cloud servers are encrypted. This means that they are scrambled, which makes it far harder for cybercriminals to access.
Detailed explanation-3: -Data breaches and malware attacks occur when hackers access and steal the organization’s data. Because cloud services are provided over the internet, they have more entry points for bad actors and are more vulnerable to cyberattacks.
Detailed explanation-4: -Loss of Control: The enterprise’s loss of control in enhancing the network’s security is the most significant disadvantage of cloud computing security. The responsibility of securing the network is shared between the cloud service provider (CSP) and the enterprise.