answersLogoWhite

0

why security is important in cloud computing?

Updated: 11/23/2022
User Avatar

Geoffrey Herzog

Lvl 10
1y ago

Best Answer

Put all eggs in one basket, Even how hard the basket !

User Avatar

Jerald Orn

Lvl 10
1y ago
This answer is:
User Avatar

Add your answer:

Earn +20 pts
Q: Why security is important in cloud computing?
Write your answer...
Submit
Still have questions?
magnify glass
imp
Related questions

How much security is there in cloud computing?

Private cloud computing systems from IBM and VMware can cost a million dollars. ... computing standards and compliance, SaaS and cloud computing security ... IBM's cloud offering has evolved, helping customers advance their business ..


What are the greatest challenges to cloud computing?

Cloud Security is a problem


What exactly is cloud computing security?

Cloud computing security is a sub-industry of cloud computing that deals with ways to keep information secure in a cloud format. Due to the nature of cloud computing, it is much easier to access information from a remote location, and thus suitable countermeasures must always be introduced.


Is cloud computing is secured?

You can use Spyware Cease to remove virus and protect your PC the above mentioned is about PC security, cloud computing security threats is mainly about: Cloud Security, Data Protection, Identity Management, Physical Security, Application Security, Data Recovery.


Where can I find information on cloud computing security?

Cloudsecurity.org is a site specifically for helping people understand security issues related to cloud computing. Wikipedia also has a page about cloud security issues located at http://en.wikipedia.org/wiki/Cloud_computing_security .


Who is responsible for cloud computing?

When implementing cloud projects, security is one of the most important issues. It requires companies to identify and understand the risks inherent to digitization, public networks, and outsourcing of infrastructure components. Companies still fear that their data is insecure with cloud systems. IT professionals want to apply the same level of security to their cloud deployments as they do to internal resources. Many business leaders view this as the provider’s responsibility, but true cloud security requires a collaborative effort.For more info visit at :estnoc.ee


How secure would cloud computing be for a small business?

Cloud computing is an excellent way to increase the efficiency of a small business. Check with the Cloud Security Alliance (CSA) for their recommendations.


Figuring Out What Cloud Computing Security Risks Are?

Are you trying to find out just what the cloud computing security risks might be? The risks of using cloud computing technology might not be large at all with some networks, but you should still understand what these are before you get involved with any type of these networking businesses.


Where can I go to troubleshoot cloud computing security?

Some good resources for security questions would be cloudsecurity.org and cloudsecurityalliance.org. Both of these websites offer assistance in making sure your cloud computing environment is setup properly in respect to security.


What are the cloud computing risks?

The potential risk of cloud computing is that the cloud may not be available and thus you may not be able to access your documents. Another possible risk is that of security. Many cloud computing strategies offer off line document access as well.


How to find security cloud computing?

The security is included for the cloud computing program that is now available to the public. This program does adapt and format to a Mac as far as I know. This sounds like a question for the customer service reps.


Debunking Cloud Computing Security Issues?

Cloud computing security often comes under fire from critics of the cloud who urge a slower adoption rate of cloud technologies. One of the most serious problems with cloud computing security resides in the offices of cloud hosting providers. Technicians, administrators and support personnel have complete access to all the data owned by the hosting firms' clients. This can result in serious data compromise from which businesses could never recover.