**4.1 Data breaches/data loss**

*Cloud Computing Security - Concepts and Practice*

Cloud Security Simplified:

• Access Control

• System Protection

• Personal Security

• Information Integrity

• Network Protection

• Identity Management

**4. Vulnerabilities and threats**

1.Data Breaches/Data Loss

3.Hijacking Account

6.Insider Threats

9.Shared Vulnerabilities

12. Limited cloud usage visibility

migrate to cloud for opting the services are as follows:

2.Denial of Service Attacks/Malware Injection

4.Inadequate Change Control and Misconfiguration

5.Insecure Interfaces and Poor APIs implementation

8.Weak control plane/Insufficient Due Diligence

11. Lack of cloud security strategy/Regulatory violations

10. Nefarious use or Abuse of Cloud Services

7.Insufficient Credentials and Identity/Compromised accounts

Cloud computing being a modern technology offers numerous advantages. In order to harness all these benefits, one has to scrupulously investigate as many cloud security measures as possible. These concerns may vary from vulnerability to malicious code penetration to hijacked accounts to full-scale data breaches. Based on literature searches and analysis efforts, some of the major cloud-unique vulnerabilities and threats were identified which one must consider before making decision to

• Cloud Security Management

**6**

Cloud computing and services being relatively new and enable accessing remote data via the Internet is the most vulnerable source for misconfiguration or exploitation. This very intrinsic property of cloud becomes unique set of characteristics which make it more vulnerable to all form of data breaches. Data breaches or losses can be any form of cyber security attack in which confidential or sensitive information is stolen, viewed or used by an unauthorized stranger or it may the result out of accidental deletion by service provider or a natural catastrophe, like fire outbreak or earthquake. This may results to the loss of intellectual property (IP) to rivals, impacts the competitive edges, financial losses out of regulatory implications, affecting brand value and goodwill of organization and thus overall market value may be at stake as it foster mistrust from customers and business partners. Though Encryption techniques can protect data but at the cost of system performance. Thus robust and well-tested Data breach avoidance, data loss preventions, data backup and recovery data management strategy must be adopted before making up mind to migrate to cloud.
