SaaS → IaaS → PaaS → EaaS — "Services Involving Platforms, Even equipment"
Think of each layer building on the previous: SaaS = just use it. IaaS = rent the building. PaaS = rent the building + workshop. EaaS = connect everything in the building.
Economical · Storage · Flexibility · Mobility · IT focus — "Every Smart Firm Moves to IT-cloud"
Remember I·C·Q·D·L·A·S — "I Can Quite Directly List All Solutions" (Insight, Collaboration, Quality, Disaster, Loss, Auto-updates, Sustainability)
Downtime · Slow internet · Security & legal · Lack of support · Bankruptcy data loss — "Don't Store Secrets, Lawyers Bite"
- Downtime — service outages mean you can't access your data or tools
- Slow internet = slow work — cloud speed is only as fast as your connection
- Security & legal issues — data stored off-site raises jurisdiction and privacy concerns
- Lack of support — smaller clients may not receive adequate help in some situations
- Bankruptcy = data loss — if the provider goes bankrupt, your data could disappear
- May be caused by targeted attacks, human error, app vulnerabilities, or poor security practices
- Can expose: health info, financial data, personally identifiable info (PII), trade secrets, IP
- Data may be accessed by a hacker, the cloud provider itself, or a third party
- Users may never know who accessed their data or how it was misused
A breach isn't always from an outside attack — insiders and the cloud provider itself could be the threat. Once your data is breached, you lose control of it permanently.
Data breach = H.A.T. — Hacker, Accident (human error), Third-party. Any of these three can cause one.
- Attackers use stolen login info to remotely access sensitive cloud data
- They can eavesdrop, falsify data, manipulate transactions, and redirect users to fake sites
- With credentials, attackers gain access to critical cloud areas
- Compromises the CIA triad: Confidentiality, Integrity, and Availability
Hijacking attacks all three pillars: Confidentiality (data is exposed), Integrity (data is altered), Availability (service is disrupted). CIA = what we're trying to protect.
- The cloud's massive storage makes it easy to host and spread malware and illegal software
- Malware injections are scripts embedded into cloud services that disguise themselves as valid instances
- They run as SaaS components — appearing legitimate to cloud servers
- Once executed, attackers can eavesdrop, steal data, and corrupt information
The injected code looks like a normal part of the service. The cloud server itself doesn't know it's running malicious code — making it very hard to detect.
- Cloud security is a shared responsibility — both provider and client must do their part
- Major providers (Google, Microsoft, Dropbox) secure their infrastructure, but fine-grain control is yours
- Client responsibilities include: strong passwords, access restrictions, multi-factor authentication
- Weak client-side protection can undermine even the best provider security
Think of cloud security like a safe in a secure building. The building (provider) has guards and locks — but you're responsible for the combination to your own safe. If you leave it open, the guards can't help you.
- Can occur through malicious attack, natural disaster, or accidental deletion by the provider
- Fire, earthquake, lightning, or power failure at data centers can cause permanent loss
- Amazon permanently destroyed customer data in 2011
- Google lost data when its power grid was struck by lightning four times
- Solution: carefully review your provider's backup procedures for physical storage and disaster recovery
Compliance · Spiteful activity · Policies ignoring customers · Intellectual property · Discrimination — "Cloud Services Pose Interesting Dilemmas"
Legal problems in cloud = WHERE is data stored + WHO can access it + WHICH laws apply. These three questions drive all cloud legal issues.
- Cloud resources cost money — those who can't afford them are left out
- Small companies can't access the same tools and resources as large corporations
- This creates an uneven playing field — big businesses can outcompete small ones simply due to budget
- Small accounts may receive less attention and support from cloud providers than large paying clients