cloud computing security
DESCRIPTION
A cloud, in very simple terms, is a place where information technology (IT) resources such as computer hardware, operating systems, networks, storage, databases, and even entire software applications are available instantly, on-demandTRANSCRIPT
Cloud security
Presented by,
– Teja Babu Sura
Cloud security
What is Cloud Computing???...A cloud, in very simple terms, is a place
where information technology (IT) resources such as computer hardware, operating systems, networks, storage, databases, and even entire software
applications are available instantly, on-demand
How cloud works ???...Cloud Computing Architecture(Delivery Models):-
• Cloud Software as a Service (SaaS)
• Cloud Platform as a Service (PaaS)
• Cloud Infrastructure as a Service (IaaS)
Types of cloud(deployment models) :-
Cloud Computing Security Issues ‘13
Data Breaches
Data Loss
Account Hijacking
Insecure APIs
Denial of Service
Back doors
Data Breaches:-A Data Breach is a security incident in
which sensitive, protected or
confidential data is copied,
transmitted, viewed, stolen or
used by an individual
unauthorized to do so.
Data loss:-Data loss is an
error condition in information
systems in which information is destroyed by
failures or neglect in storage,
transmission, or processing
Account hijacking:-Account hijacking is a form of identity theft. Identity theft is
when someone uses your personal identifying information
(e.g., name, address, social security number, financial
institution account number, username or password) to commit
fraudInsecure API:-
Cloud Computing providers expose a set of software interfaces or APIs that customers use to manage and interact with cloud services. cloud services allow third-party access by exposing application programming interfaces
Denial Of Service:-Denial of Service, is a type of attack
where multiple compromised systems -- which are usually infected with a Trojan -- are used to target a single system causing a Denial of
Service (DOS) attack. Back Doors:-
A backdoor in a computer system (or cryptosystem or algorithm) is a method of bypassing normal authentication, securing illegal remote access to a computer, obtaining access to plaintext, and so on, while attempting to remain undetected.
What questions you should ask your cloud provider?
Information’s of where data is storedSecurity and private laws Is cloud operation available for
physical inspectionExit charges or penalties while
migratingDocumentation of disaster recoveryOrganization’s privacy policy
Thank you