- 29 Şub 2020
- 538
- 575
Hello Friends, In this topic, I will talk about Cloud Technology and How We Can Provide Security.
What is cloud?
What is cloud?
Cloud, also known as cloud, is a term that anyone interested in the industry has heard the least. In fact, Cloud is mostly preferred because it is used by companies and large companies, because it is inexpensive and physically takes up little space. The purpose of the cloud is that company IT managers or company owners can easily access their data from anywhere in the world. Companies using cloud technology are increasing exponentially day by day. However, there are companies that use the old physical server system. Just like everything has varieties, Cloud has varieties.
Cloud Types
SaaS
Issues such as the maintenance, management, and troubleshooting of all leased systems of the used or leased company are resolved by the company, especially companies that do not have a IT department, and their cost is higher than other packages.
PaaS
It enables users to run and manage tools such as software, servers, tools developed by the users and which are in beta stage, without any infrastructure server etc. It is among the most preferred packages.
IaaS
It is perhaps the most used package by companies. In this package, there is a pay-as-you-go logic. Firms pay for the service they use or rent. In this type of systems, credit is found, and as a service is received, it is deducted from the credit system.
can be diversified in this way
Areas where Cloud Technology is Most Used:
Servers
Databases
Special Software
Machine Codes (such as Artificial Intelligence)
Types of Cloud Computing
Public Cloud
Community Cloud
In general, this package is preferred for server operations for governments, organizations or users, it is generally free, but if the package is upgraded, the paid version comes into play.
Hybrid Cloud
It is generally used if continuous and active data is to be shared between two types of servers.
Pirvate Cloud
Securing Cloud Services
1-) Access
Especially in pirvate servers, this criterion should be very careful. If the wrong person is authorized, events such as data theft, confusion, hacking can occur.
2-) 2FA (Double Step Verification)
The IT Manager must put 2fa on the accessed cloud system, so that even if the attackers hack the account, it does not pose a serious problem since they cannot log in and losses are minimized.
3-) Vulnerability Check
The Company's Cyber Security Specialist or Penetration Testing Specialist must definitely perform a weekly penetration test, otherwise, there may be an opening in the system, data theft or a ransom demand.
4-) Social Engineering Trainings
In particular, authorized users should be trained to protect against social engineering, otherwise, no matter how adequate the other articles are, you are likely to suffer a loss.
5-) Security Solutions
Large-scale companies should especially attach great importance to this issue. By installing systems such as firewall ips, attacks can be prevented to a large extent, for example, even if there is an open in the system, even if the firewall sees an unauthorized access, it will prevent the attack and inform the iT Manager.
have a nice day
Son düzenleme: