Cloud Computing has revolutionized IT infrastructure with scalability, availability, and flexibility. Cloud Infrastructure is provisioned with automation and orchestration. This has brought a new set of Cyber Security Attacks to enterprise IT infrastructure that uses cloud computing resources. The following are the cyber security attacks: Data Exfiltration – The attacker gets the access of un-authorized…
Category: Cloud
Serverless Computing
Serverless Computing is a Cloud Service Model where the consumers can build and run applications without the need of provisioning and managing the underlying hardware and software resources like CPU, Memory, Storage, Operating System, Database and Networking. Serverless Computing are more suitable for developers who focusses more on application development rather managing and operating the…
Edge Computing
Edge Computing is decentralized computing architecture that is present in the edge network which has the data sources. The massive growth of IoT which produces lot of data has brought the need of Edge computing which is very close to the IoT Devices. Edge Computing and Fog Computing brings computing near to the end devices…
Fog Computing
Fog Computing also known Fog Networking or Fogging is a distributed computing architecture which provides computing processing and data storage. The Fog Computing sits between the edge devices and the cloud. It acts an intermediate later between cloud and end devices. The Fog Computing was created to address the enormous growth of IoT. The count…
Cloud Computing
Cloud Computing is a model of on-demand access of computing resources from a shared pool of resources like processing, memory, network, storage, applications and other computing services that can be rapidly provisioned and released. Essential Characteristics of Cloud Computing On-demand self-service – Provisioning of computing service can be done automatically without human intervention. Broad network…