Embark on a journey of knowledge! Take the quiz and earn valuable credits.
Take A QuizChallenge yourself and boost your learning! Start the quiz now to earn credits.
Take A QuizUnlock your potential! Begin the quiz, answer questions, and accumulate credits along the way.
Take A QuizKindly log in to use this feature. We’ll take you to the login page automatically.
LoginCareer Talk Work & Career 3 years ago
User submissions are the sole responsibility of contributors, with TuteeHUB disclaiming liability for accuracy, copyrights, or consequences of use; content is for informational purposes only and not professional advice.
No matter what stage you're at in your education or career, TuteeHUB will help you reach the next level that you're aiming for. Simply,Choose a subject/topic and get started in self-paced practice sessions to improve your knowledge and scores.
Kindly log in to use this feature. We’ll take you to the login page automatically.
LoginReady to take your education and career to the next level? Register today and join our growing community of learners and professionals.
Your experience on this site will be improved by allowing cookies. Read Cookie Policy
Your experience on this site will be improved by allowing cookies. Read Cookie Policy
manpreet
Best Answer
3 years ago
Yes, there are some security concerns with cloud computing - 1. Data Breaches - Cloud computing and services is a newer technology, yet data breaches in all forms have existed for years. Cloud comes with unique features making it vulnerable to security breaches. 2. Hijacking Accounts - Attackers now have the ability to use one's login information to remotely access sensitive data stored on the cloud; additionally. However, the most notable new threat known as the Man In Cloud Attack involves the theft of user tokens which cloud platforms use to verify individual devices without requiring logins during each update and sync. 3. Malware injections are scripts or code embedded into cloud services that act as valid instances and run as SaaS to cloud servers. This means that malicious code can be injected into cloud services and viewed as part of the software or service that is running on the cloud servers themselves.