Download PDFOpen PDF in browserCloud Security Concerns and SolutionsEasyChair Preprint 75466 pages•Date: March 12, 2022AbstractMany systems only require a simple user-generated password to gain access, while others are more robust. Think about the needs of your application, what data breach laws might apply to you, and try to mitigate your risk through good security practices. SNMP, encryption, firewall, antivirus, and strong passwords are required to effectively monitor and protect any cloud platform from attacks. Human security neglect is arguably the biggest con-tributor to cloud and network encroachment. According to the Online Trust Alliance, 90% of data breaches could have been prevented if companies had better internal controls. The Online Trust Alliance otalliance.org provides more information on data breach protection. Insufficient password selection, stolen laptops, sharing the same password on different websites, and turning computers on and unlocking them to facilitate access for physical use are some of the top threats Keyphrases: Encryption, Google Authenticator, Layers of Security, Operating System, Security Concern, USB token, data center, factor authentication, password authentication, problems, time password
|