Today, the security threat matrix of cloud ecosystems is evolving. Why is that? With more users, more data and new technologies can transmit information over a wide range of distances. In fact, the latest Cisco Cloud Index Report shows how much evolution has occurred in cloud computing and data center platforms:
Traffic in very large data centers will reach five times in 2020. By 2020, ultra-high-speed data center traffic will account for 53% of all data center traffic.
By 2020, 92% of the workload will be handled by the cloud data center.
By 2020, 74% of the cloud computing workload will be SaaS (Software as a Service).
By 2020, enterprise workloads will account for 72% of total data center workload.
Finally, new trends in the Internet of Things and big data will affect how people lead digital life and take advantage of the most critical applications. Considering this driven by the Internet of Things, by 2020, the total amount of data created by any device (not necessarily storage) will reach 600ZB by 2020, and the data it creates will be two orders of magnitude higher than the stored data. .
All of these hackers or bad people have created new goals. While modern technology enhances the way people do their day-to-day business, these technologies create new risks when deployed into modern IT environments. When cutting-edge IT technology is deployed in an old, aging data center infrastructure, it faces a deteriorating situation. What happens when modern threats and vulnerabilities attack today's "physical" data center environments?
Today, the number of attacks is not only increasing, but also becoming more complex and therefore more dangerous. The influx of advanced attacks has become a serious problem for any data center provider seeking modern IT technology. According to Arbor Networks, DDoS is still a common type of attack because free tools and cheap online services are available for free, allowing anyone with a complaint and Internet connection to launch an attack. This has led to an increase in the frequency, scale, and complexity of attacks in recent years.
Research records indicate that:
In the past 18 months, there were an average of 124,000 attacks per week.
In 2015, the peak attack scale increased by 73% to 579Gbps.
In the first half of 2016, 274 attacks over 100 Gbps were detected, and 223 times in 2015.
In the first half of 2016, more than 200 Gbps attacks were detected 46 times, and in 2015, 16 times.
The United States, France and the United Kingdom are the primary targets for more than 10 Gbps attacks.
On October 21, 2016, many people experienced the largest DDoS attacks ever recorded. This attack was implemented, at least in part, by using a botnet created by software called "Future" that hijacked IoT devices with unsafe security (such as CCTV cameras and DVRs) for 17 data centers. According to Thousand Eyes' analysis, among the global network monitoring services, only three data centers in Warsaw, Beijing and Shanghai were not affected.
Nick Kephart, senior director of product marketing at Thousand Eyes, wrote in a blog post: "At the climax of the attack, 75% of our globally valid locations found that Dyn's servers were not answered. In addition, many of these were affected. The critical nature of the service has led to collateral damage to the disruption and performance impact of Dyn-related websites."
So how big is this attack? Dyn estimates that the attack involved "100,000 malicious endpoints," and companies investigating the attack said there were reports that the attack strength was 1.2 Tbps.
Cloud computing is good, but it is also dangerous
When understanding these types of attacks, it is important to note that malicious threats and risks to the cloud environment not only revolve around the application layer, but new threat vectors can affect the entire data center and cloud infrastructure.
Administrators must remember some key points when dealing with today's cloud computing environments. These cloud security considerations will help organizations bridge the gap between new threats and how to protect:
Prevent development and exploitation - By drawing data into the cloud and entering the cloud, organizations must protect information from leaks and theft. The challenge of a "legacy" cloud environment is the lack of visibility into all layers in the data center and cloud stack. Therefore, intellectual property and data theft is a serious problem. Government, financial services, energy, healthcare and education IT environments must break through the original ways of protecting user information and intellectual property as such valuable assets.
Stop the cloud break. New applications, workload layers and even IoT attacks such as DDoS are causing severe damage in today's cloud. However, the real breakthrough in DDoS prevention will come from the physical and logical correlation of the data center layer, the ownership of the device/user, and the planned attack/utilization. While you may see hardware stacks and certain workloads, you must consider the ability to subdivide control application paths and routes. Hackers have learned to exploit security vulnerabilities in cloud and data center environments. Organizations need to look at security from a truly holistic perspective.
Education and support for digital users. The user is now the digital part of cloud computing. The way to get used to non-traditional consumption of digital resources is now the norm. So organizations need to find ways to protect how these users access data, all of which will keep their productivity. New security solutions around endpoint protection (EPP) and endpoint detection and response (EDR) are bringing user security to new areas. Now, people are talking about artificial intelligence in security, even machine learning. In addition, cloud computing for cloud security allows organizations to protect data transmission between internal and hybrid cloud ecosystems.
Looking ahead, organizations really need to be very cautious in terms of cloud computing and security. First, the utilization of cloud computing has really not slowed down. The future will revolve around "cloud services" rather than the entire cloud computing itself. More importantly, the micro threats to these services will be more relevant.
However, although some cloud computing processes may be turbulent, they are still completely worthwhile. To implement a secure cloud ecosystem, follow these rules:
Rule 1: Easily achieve a lifecycle for cloud ecosystems through planning, execution and validation.
Rule 2: Cloud computing is easy to test, so be sure to evaluate yourself and apply and apply the right type of model.
Rule 3: Nothing is static. When it comes to cloud computing, it is ready to evolve.
Finally, don't be afraid to work with cloud computing partners, which can lead the organization in the right direction. After 2017, the security around cloud computing technology will become more important. Organizations need to find the right tools to protect their workloads, achieve a higher level of visibility, and ensure their business is always consistent.
Single Phase Online UPS,Tower UPS,Rack Mount UPS,Online Dual Conversion
Shenzhen Unitronic Power System Co., Ltd , https://www.unitronicpower.com