What is the biggest disadvantage of cloud computing?
What is the biggest disadvantage of cloud computing?
data loss or theft.
data leakage.
account or service hijacking.
insecure interfaces and APIs.
denial of service attacks.
technology vulnerabilities, especially on shared environments.
Disadvantages of Business cloud computing:
1. Downtime
Downtime is considered one of the biggest potential drawbacks to using Cloud Computing. Cloud providers can sometimes face technical glitches that can occur for various reasons such as power loss, poor internet connectivity, data centers out of order for maintenance, etc. This can lead to a temporary interruption of the cloud service.
2. Security and Confidentiality
Although cloud service providers implement the best security standards and certifications in the industry, storing important data and files at third-party service providers still poses risks. Any discussion involving data should focus on security and confidentiality, especially when it comes to managing sensitive data. We must not forget what happened in Code Space and the hacking of its AWS EC2 console, which led to the deletion of data and the eventual termination of the business. Their reliance on a remote cloud infrastructure meant taking the risk of outsourcing everything.
3. Internet Connectivity
The Internet is the only way to access cloud computing. When there is no internet connection for you or the internet path to the cloud provider is in trouble, automatic access to your cloud computing machine will be disconnected. Now, this is where the biggest hurdle occurs in developing countries and remote regions that do not have good internet access. And the weakness of the public cloud is that everyone has access to the same server and server and it will increase the risk of attack and failure.
No longer in control. When moving services to the cloud, you are handing over your data and information.
#1. Risk of data confidentiality. There is always a risk that user data can be accessed by other people. ...
#2. Depends on internet connection. ...
#3. The level of security. ...
#4. Compliance. ...
#5. Vulnerable in the event of an attack. ...
#6. Data Mobility. ...
#7. Technical problem. ...
#8. Low Connection.
|
Bookmarks