View Single Post

  #2  
Old 01-06-2012, 03:30 PM
whcdavid's Avatar
whcdavid whcdavid is offline
Administrator
 
Join Date: Mar 2004
Posts: 901
Default

Sntrex is correct. You need to provide detail information about it. Intrusion detection happens anywhere in the world. If the application is not secure hackers might attack it. If you are looking intrusion detection information on cloud computing,


According to the 2009 Data Breach Investigations Report conducted by Verizon Business Risk Team, 64% of data breaches resulted from hacking and intrusions. Dedicated resources are expected to be more secure than shared resources. The attack surface in fully or partially shared cloud environments would be expected to be greater and cause increased risk. Enterprises need confidence and auditable proof that cloud resources are neither being tampered with nor compromised, particularly when residing on shared physical infrastructure. Operating system and application files and activities need to be monitored.


I would recommend you do do a search on cloud security as well.

Also, we have lots of article regarding cloud computing.

http://www.datacentertalk.com/catego...oud-computing/
__________________
WebHostingChat ( Web Hosting Forum)
DatacenterSearch (Find your Datacenter)
YOU FAIL ONLY WHEN YOU FAIL TO TRY
Reply With Quote