Introduction Cloud control is a difficult task because the Internet and the Web are very large places. In my essay I will cover the reasons for the need to police the cloud and how it is policed, so I will start with: Understanding cloud computing. Hacking: why is it done? - how is it done? - who are the hackers? Security and how it is implemented in Software as a Service Platform as a Service and Infrastructure as a service Understanding cloud computing What is cloud computing, well, it is the ability to use a virtual machine on servers somewhere in the world to carry out the work, store data, and use the virtual machine to compute over the Internet. Cloud computing is the ability to use programs and data on a remote server somewhere in the world connected to the Internet to get work done. In cloud computing there are 3 types of cloud computing SaaS, PaaS and IaaS. The information is stored on servers, you host your IaaS (infrastructure as a service) service on one server or multiple servers. This is expensive for the average person to do, so companies were created to do it for you like Amazon Elastic Computing and you pay for the number of servers you use in a month and you pay for storage. Programs run in virtual machines (virtual computers) on servers so that users can use these services over the Internet at any time. Types of cloud computing and how they work. In cloud computing there are 3 types of cloud computing. Infrastructure as a Service (IaaS) IaaS is the physical type of cloud computing, it's all the hardware that handles offsite processing, these servers aren't just a bunch of hard drives. They are computers, equipped with CPU, RAM, hard drives, power supply, etc. These machines carry out the work which is then transferred...... middle of paper......from this look at Policing the cloud, it is obvious that the world is a constantly evolving place and that it is necessary to adopt many steps when using cloud computing, as there are always vulnerabilities in the system, so you need to be careful. Although it is a dangerous place in the cloud, there are many ways to protect yourself from these dangers and it is worth noting that you need security at every stage of your infrastructure to be completely safe, any small gap could lead to unwanted access to your system. system. Every possible aspect of cloud computing must be examined when designing the software to guard it, all entry and exit points must be carefully guarded to protect the contents of the server. Having covered this topic, it's great to see people like IBM creating initiatives to stop hacking and malware attacks from causing problems, creating a self-policing cloud where users can be safe.
tags