CloudBric: The Future of Cloud Computing and Cyber Security.

Carliyke
DataDrivenInvestor
Published in
5 min readOct 29, 2018

--

Cyber Security

Cyber Security involves the security of inter-connected systems which includes the physical hardware components such as servers/databases and their software counterparts, as well as data and information against cyber attacks.

Cybersecurity is the practice of protecting systems, networks, and programs from digital attacks.

According to Cisco Systems, a renowned Networking Hardware Company.

The Future of Cloud Computing

The idea of a shared computing service such as storage , networking and processing power has being in existence almost as long as the Internet itself but the term “Cloud Computing” was officially coined sometime in the wake of the 19th century. Cloud computing is a system of inter-connected servers that can be accessed remotely via the Internet for the purpose of storing/retrieving, managing and processing of data . As these resources are sensitive, hence it’s communication has to be established upon a trusted network protocol since it is can be subject to the glaring eyes of modern day cyber Cons. The major types of Cloud computing there is includes;

Private Cloud Computing

This involves the practice of establishing and subsequent maintenance of the the services and resources involved with cloud computing by the company that requires the service. It deals with a one-to-one relationship whereby only a single organization exclusively operates upon cloud server. In some cases the organization may employ the services of seasoned Cloud Computing Experts such as Microsoft Azure to handle their server as an independent cloud network.

Public Cloud Computing

Such cloud services are mainly operated by Cloud Service Providers in the likes of Google Cloud, Apple Cloud, Amazon, to mention a few. These third party Agencies provide all the need to knows involved with data distribution procedures, storage facilities utilized and security mechanisms. All the subscriber has to do is sign up online in order to access the services as the name implies “public”, it is accessible to the general public.

Hybrid Cloud Computing

Being the most efficient, a hybrid cloud computing is established such that it can provide a wide range of services as it allows for the distribution of data and services from both the private and public clouds. It incorporates the two primary models of cloud computing such that the information are not solely reliant on a single networking protocol guaranteeing an increased deployment capabilities, data back up and recovery mechanism and security as it involves different vendors.

451 Research Institute (IAAS — Infrastructure As A Service, SAAS — Software As A Service, PAAS — Platform As A Service).

The basic Cloud Computing Services are ;

  • Infrastructure as a service (IaaS)

This involves the leasing of IT infrastructures as servers and virtual machines (VMs), storage, networks, operating systems by the cloud service vendors to it’s client. The client is granted access on a pay as you go basis.

  • Platform as a service (PaaS)

This form of cloud computing service is rendered by offering a real-time software development environment for developing, testing, delivering and managing software applications. As the name implies the client is granted an access to a platform where they can bypass the setting up of the infrastructures if these software development resources.

  • Software as a service (SaaS)

Here Cloud Service Providers hosts on-demand software applications that they manage on the Internet were Subscribers are permitted to access solely on a subscription basis.

  • Serverless Computing

There also exist an unconventional but highly scalable cloud computing service that overlaps with PaaS known as the Server-less Computing. Bulk of the activity here is focused mainly on developing app functionality rather than spending real-time managing the servers and infrastructure required to do so. As this particular form of cloud computing is event driven such that it is only initiated when a given function is triggered.

Cloud computing is fast becoming the optimal option that most app developers tend to turn to since the physical location of the service as well as maintenance and other meta-data about such as the server powering that service and also the hardware resources upon which it is underlaid all becomes of minimal importance to anyone who utilizes those services as sharing any online resource. However, there exist a grave setback that the cloud computing industries often gets to grip with over the years, in that it introduces a stream of vulnerabilities to companies that are subscribed to it.

The Need to know

Although many Cloud Service Providers claims to have a variety of protocols in place, set aside to bolster technologies the overall security performance of the entire system in order to protect your online resources (data and in-house server is any) from potential malware threats. According to a research conducted by IDC, more than a third of the overall IT expenditure worldwide has being found to be alloted primarily to the establishment of cloud computing infrastructures as technology advances and as computing workloads more cloud-based in recent times, giving rise to a huge traffic generation between and amongst the various resources (interconnected Servers/PCs). The importance of how secured these data

Why Do We Need To be Secured?

Having highlighted the several loop holes through which our data can be pilfered over time. Taking the time to emphasize on the pros and cons of cloud computing, it is necessary to note that cyber attacks can take form in many different shapes and sizes, ranging from attack on a personal centralized network or a shared one. For the not so tech savvy amongst us who do not work in I.T companies but makes use of digital and computing device on a day to day basis, one thing to be considered is the fact that these hackers often utilize the sloppiness humans to break into any system even though this unauthorized access is initiated remotely. Hence we all need to acquire basic security technical know-how at some point in time as we all make use of the ever growing Internet.

The Cloudbric Universal Security Solutions

The Ideology of Cloudbric Universal Security Solutions was first nurtured as a pet project by Penta Security Systems, Inc, based in South Korea as the foremost enterprise web security and data encryption firm in the APAC (Asian-Pacific). Having it’s alpha version release as a cloud based Security As A Service (SaaS) and by means of it’s reputation as the ‘Best SME Security Solution’ and ‘Hot Company in Web Application Firewall’ by SC Magazine Awards Europe and Cyber Defense Magazine, respectively the project decided to enlarge it’s horizon deep into the the I.T sphere by means of providing an ecosystem that merges together A-list technological advancements as cybersecurity, artificial intelligence and blockchain technology.

As an all-round security solution suite Cloudbric Universal Security Platform thought about the need to develop a platform that encompasses all the necessary security protocols needed to be established before one can fully initiate a trusted communication network.

Cloudbric Website:

https://www.cloudbric.io

Telegram Channel:

https://t.me/cloudbric

Reddit:

https://reddit.com/r/cloudbric

WhitePaper:

https://ico.cloudbric.io/upload/file/Cloudbric_Whitepaper_EN.pdf

Author’s Bitcointalk:

https://www.bitcointalk.org/index.php?action=profile;u=2187995

For more details you can refer to this medium post;

https://medium.com/@cloudbric/

--

--

Words... tools used to draw beautiful images on the canvas of our minds... 🎨🖋️