Computer communication evolution starts with sharing data, extended to networking, extended to internet, and next the need for cloud computing. Cloud computing arises from the IT technicians desire to add another layer of separation in processing information.
Computer communication evolution starts with sharing data, extended to networking, extended to internet, and next the need for cloud computing. Cloud computing arises from the IT technicians desire to add another layer of separation in processing information. At the moment, a general understanding of cloud computing refers to the following concepts: grid computing, software as a service storage in the cloud and virtualization. These refers to the client using a provider service remotely, also known as in the cloud. Even if there is an existent debate on whether these concepts should be separated and dealt with individually, the general consensus is that all these terms could be summarized by the cloud computing umbrella. Given its recent development and scarcity of academic published work, many discussions on the topic of cloud security have surfaced from engineers in companies that provide the aforementioned services. in Sarkari Naukri.
Today, the 14th largest software company by market capitalization operates almost entirely in the loud , the top five software companies by sales revenue all have major cloud offering and market as a whole is predicted to grow to $160B by 2011. Yet despite the trumpeted business and technical advantage of cloud computing, many potential cloud user have yet to join the cloud and those major corporation that are cloud user are for the most part putting only their less sensitive data in the cloud. Luck of the major worry.
Fear of the Cloud
What are the security concerns that are preventing companies from taking advantage of the cloud? Numerous studies, for example IDC 2008 cloud service user survey of IT executives, cite security as the number one challenge for cloud user.
The cloud security Alliance’s initial report contains a different sort of taxonomy based on 15 different security domains and the processes that need to the followed in an overall cloud deployment. We categorize the security concerns as:- 1) Traditional security, 2) Third Party Data Control
Above the all security is the major concern. Security concern involve computer and network intrusions or attack that will be made possible or at least easier by moving to the cloud. Cloud provide respond to these concern arguing that there security measures and processes are more mature and tested than that of the average company.
There is also a potential lack of control and transparency when a third party holds the data. Part of the hype of cloud computing is that the cloud can be implementation independent, but in really regulatory compliance requires transparency into the cloud.
These issues give boost to the career in cyber security and ethical hacking.
Cyber security and ethical hacking
With the increased level of cyber crime and even internet espionage and terrorism from other countries, the demand for cyber security experts is only going to increase. This high paying field is the demanding and requires the security expert to constantly keep up with growing computer threats, attack and changing technology. The great majority companies network and must have cyber security personnel now protect themselves.
Cyber security professionals protect data and system in network that are connected to the internet. Cyber criminals or hackers strike in various way by virus attacks, which may erase your entire system or someone can steal confidential information from your system or even break into your system and modify your files without your knowledge. A computer hackers finds out the loopholes in a system and breaks into it the information security professional, or an ethical hackers has a similar job. He needs to think lick a hacker and find the loopholes in the system before a hacker can get to them.
An information security Professional may have to work on one of the following job profiles.
The job of a cyber security professional include the following.
1. Ethical hacking into a company’s network of find out what security loopholes need to be fixed.
2. Creating security policy of an organization
3. 24×7 remote management of security products like firewall
4. Security auditing, that is, compiling a report on a company’s security system to see if it matches standards.
5. Cyber forensics that is clinical investigation of computer crimes/frauds
6. Penetration testing
7. Secure coding to prevent from (PHP, Java script) loopholes, how to handle sql and xml injection attack and many more programming threats.
Where are the Jobs
Most of the cyber security jobs within government jobs fall in the category of computer specialist, information technology officer, information technology specialist, assistant chief security officer, penetration tester etc.
Within business, the cyber position available are cyber security analyst, research scientist, engineer, senior information security specialist . Most of these jobs are available with government contractors, science research laboratories, security consulting firms and IT and security vendor companies.
The common theme of most of these positions is to defend the nation through the development and utilization of cutting-edge system, procedures, and technologies to prevent future terrorist attacks.