cloud computing security

10
Cloud security Presented by, – Teja Babu Sura

Upload: teja-babu

Post on 21-Dec-2014

58 views

Category:

Technology


0 download

DESCRIPTION

A cloud, in very simple terms, is a place where information technology (IT) resources such as computer hardware, operating systems, networks, storage, databases, and even entire software applications are available instantly, on-demand

TRANSCRIPT

Page 1: Cloud computing security

Cloud security

Presented by,

– Teja Babu Sura

Page 2: Cloud computing security

Cloud security

What is Cloud Computing???...A cloud, in very simple terms, is a place

where information technology (IT) resources such as computer hardware, operating systems, networks, storage, databases, and even entire software

applications are available instantly, on-demand

Page 3: Cloud computing security

How cloud works ???...Cloud Computing Architecture(Delivery Models):-

• Cloud Software as a Service (SaaS)

• Cloud Platform as a Service (PaaS)

• Cloud Infrastructure as a Service (IaaS)

Page 4: Cloud computing security

Types of cloud(deployment models) :-

Page 5: Cloud computing security

Cloud Computing Security Issues ‘13

Data Breaches

Data Loss

Account Hijacking

Insecure APIs

Denial of Service

Back doors

Page 6: Cloud computing security

Data Breaches:-A Data Breach is a security incident in

which sensitive, protected or

confidential data is copied,

transmitted, viewed, stolen or

used by an individual

unauthorized to do so.

Data loss:-Data loss is an

error condition in information

systems in which information is destroyed by

failures or neglect in storage,

transmission, or processing

Page 7: Cloud computing security

Account hijacking:-Account hijacking is a form of identity theft. Identity theft is

when someone uses your personal identifying information

(e.g., name, address, social security number, financial

institution account number, username or password) to commit

fraudInsecure API:-

Cloud Computing providers expose a set of software interfaces or APIs that customers use to manage and interact with cloud services. cloud services allow third-party access by exposing application programming interfaces

Page 8: Cloud computing security

Denial Of Service:-Denial of Service, is a type of attack

where multiple compromised systems -- which are usually infected with a Trojan -- are used to target a single system causing a Denial of

Service (DOS) attack. Back Doors:-

A backdoor in a computer system (or cryptosystem or algorithm) is a method of bypassing normal authentication, securing illegal remote access to a computer, obtaining access to plaintext, and so on, while attempting to remain undetected.

Page 9: Cloud computing security

What questions you should ask your cloud provider?

Information’s of where data is storedSecurity and private laws Is cloud operation available for

physical inspectionExit charges or penalties while

migratingDocumentation of disaster recoveryOrganization’s privacy policy

Page 10: Cloud computing security

Thank you