The Advantages of Cloud Computing

Basically, there are two types of environments for computing: On premises This is the traditional type of computing. You own the systems, as well as manage them. Every application and data you make use of is kept in your very own premises, either individually on PCs, or inside a LAN. In cloud This is the type of computing where data and applications are kept remotely. Internet is used as the medium of storage. Your files are kept in third party servers, and you gain access to them by logging into the same. There are a number of companies that provide cloud services. Examples are Amazon, Google and Oracle Cloud. Two other big names are Microsoft Azure and Rackspace. Fundamentally, cloud services are not something fresh or new. In fact, if you have been using Gmail or a similar service, you have basically been using cloud service. What is new, however, is the kind of different services which are being provided these days using cloud. Now, you get far more than just email services. You get, for instance, human resources, marketing, and accounting services that are based on cloud. The cloud advantages Cloud ensures a number of advantages over traditional on premises. For one, you can log into your network and access your apps and files from practically anywhere on earth using just about any PC. Other than that, you get the service for a low cost. Also, you do not require much technical knowledge to use cloud. Other than that, compared to traditional computing, cloud generally gives better performance. Plus, you can easily increase the quantity of stored data without substantially increasing cost. Owing to the above advantages, cloud computing has been growing rapidly. In fact, estimates suggest that it is growing four times as fast as on premises computing. Data also points to the possibility that the total spending on various cloud services will be about one-sixth of entire IT spending. However, the question that is in everyone’s mind is that is cloud truly safe? If it is, how safe is it compared to traditional computing? The straightforward answer is that cloud is not really any more unsafe than traditional computing. Only the risks are a bit different! Threats cloud poses Threats associated with cloud computing are mainly of four types: Malware This is a kind of software that is malicious. Worms, Trojans, viruses, and spyware fall into this category. Malware can be installed either in a home computer or in a cloud server. In case a malware provides control of the network to a particular group, it is known as botnet. Web attack In this kind of attack, a web-based app is chosen as the target. It happens to be the most common type of internet attack. Brute attack Under this category, the attacker tries to crack a secret key by putting all sorts of different letter and number combinations. Think of it like trying to open an unknown password by guessing. Recon This type of attack takes place by picking valuable, as well as vulnerable, victims with the help of reconnaissance activity.
© 1998, Spicewood Inc.
Spicewood Computer Shop
www.spicewoodtx.us

The Advantages of Cloud

Computing

Basically, there are two types of environments for computing: On premises This is the traditional type of computing. You own the systems, as well as manage them. Every application and data you make use of is kept in your very own premises, either individually on PCs, or inside a LAN. In cloud This is the type of computing where data and applications are kept remotely. Internet is used as the medium of storage. Your files are kept in third party servers, and you gain access to them by logging into the same. There are a number of companies that provide cloud services. Examples are Amazon, Google and Oracle Cloud. Two other big names are Microsoft Azure and Rackspace. Fundamentally, cloud services are not something fresh or new. In fact, if you have been using Gmail or a similar service, you have basically been using cloud service. What is new, however, is the kind of different services which are being provided these days using cloud. Now, you get far more than just email services. You get, for instance, human resources, marketing, and accounting services that are based on cloud. The cloud advantages Cloud ensures a number of advantages over traditional on premises. For one, you can log into your network and access your apps and files from practically anywhere on earth using just about any PC. Other than that, you get the service for a low cost. Also, you do not require much technical knowledge to use cloud. Other than that, compared to traditional computing, cloud generally gives better performance. Plus, you can easily increase the quantity of stored data without substantially increasing cost. Owing to the above advantages, cloud computing has been growing rapidly. In fact, estimates suggest that it is growing four times as fast as on premises computing. Data also points to the possibility that the total spending on various cloud services will be about one-sixth of entire IT spending. However, the question that is in everyone’s mind is that is cloud truly safe? If it is, how safe is it compared to traditional computing? The straightforward answer is that cloud is not really any more unsafe than traditional computing. Only the risks are a bit different! Threats cloud poses Threats associated with cloud computing are mainly of four types: Malware This is a kind of software that is malicious. Worms, Trojans, viruses, and spyware fall into this category. Malware can be installed either in a home computer or in a cloud server. In case a malware provides control of the network to a particular group, it is known as botnet. Web attack In this kind of attack, a web-based app is chosen as the target. It happens to be the most common type of internet attack. Brute attack Under this category, the attacker tries to crack a secret key by putting all sorts of different letter and number combinations. Think of it like trying to open an unknown password by guessing. Recon This type of attack takes place by picking valuable, as well as vulnerable, victims with the help of reconnaissance activity.
© 1998, Spicewood Inc.
Logotype
Spicewood Computer Shop