Cybersecurity

Cloud Computing vs. Data Security

Cloud computing has in recent years become both an essential service used in many industries and a ubiquitous part of the daily life of consumers. By offering remote access to computing services that can be rented out on a flexible, efficient, as-needed basis, it gives companies access to greater computer power and storage capabilities than they might be able to maintain on their own legacy servers and do more advanced analytics with their data.

According to a report from the National Institute of Standards and Technology (NIST), “The cloud computing model offers the promise of massive cost savings combined with increased IT agility.”

Cloud computing has become a particularly critical feature of modern life since the start of the COVID-19 pandemic, as many employees moved to remote workplaces and had to use cloud services in order to collaborate with their colleagues.

The opportunities that cloud computing offers, however, also come with challenges in the realm of data security. Cloud servers can contain highly sensitive personal data that could be lost in leaks or stolen by hackers, such as medical data from hospitals, financial information from banks, or data on young children in schools. It is not always clear, when using third-party cloud services, which party is in charge of maintaining security protocols, complying with privacy laws and data regulations, and monitoring for leaks or vulnerabilities. It’s therefore crucial to understand how data security intersects with the cloud.

What Is Cloud Computing?

Cloud computing is a service that allows users to access computing power and resources, such as data storage, servers, and computation, without needing to be in the same physical space as the computing equipment. The aforementioned NIST report defines cloud computing as “a model for enabling convenient, on-demand access to a shared pool of configurable resources (e.g., networks, servers, storage, applications, and services) that can be rapidly provisioned and released with minimal management effort or service provider interaction.”

Source

Veille-cyber

Share
Published by
Veille-cyber

Recent Posts

Sécurité des mots de passe : bonnes pratiques pour éviter les failles

Sécurité des mots de passe : bonnes pratiques pour éviter les failles La sécurité des…

4 jours ago

Ransomware : comment prévenir et réagir face à une attaque

Ransomware : comment prévenir et réagir face à une attaque Le ransomware est l’une des…

5 jours ago

Cybersécurité et e-commerce : protéger vos clients et vos ventes

Cybersécurité et e-commerce : protéger vos clients et vos ventes En 2025, les sites e-commerce…

1 semaine ago

Les ransomwares : comprendre et se défendre contre cette menace

Les ransomwares : comprendre et se défendre contre cette menace En 2025, les ransomwares représentent…

1 semaine ago

RGPD et cybersécurité : comment rester conforme en 2025

RGPD et cybersécurité : comment rester conforme en 2025 Depuis sa mise en application en…

1 semaine ago

VPN : un outil indispensable pour protéger vos données

VPN : un outil indispensable pour protéger vos données Le VPN, ou « Virtual Private…

2 semaines ago

This website uses cookies.