security in cloud
DESCRIPTION
It tells few aspects of security in cloud and changes in security of Cloud Computing Concept.TRANSCRIPT
![Page 1: Security in cloud](https://reader033.vdocuments.us/reader033/viewer/2022052621/5585582dd8b42a47518b4fc8/html5/thumbnails/1.jpg)
Security In Cloud
Vikash Ranjan JhaComputer Science
& Engineering0701224225
![Page 2: Security in cloud](https://reader033.vdocuments.us/reader033/viewer/2022052621/5585582dd8b42a47518b4fc8/html5/thumbnails/2.jpg)
Cloud
Internet
?
![Page 3: Security in cloud](https://reader033.vdocuments.us/reader033/viewer/2022052621/5585582dd8b42a47518b4fc8/html5/thumbnails/3.jpg)
Cloud Computing
? SAASIAAS
PAAS
Security As A
Service
![Page 4: Security in cloud](https://reader033.vdocuments.us/reader033/viewer/2022052621/5585582dd8b42a47518b4fc8/html5/thumbnails/4.jpg)
Where You Can Find Cloud Computing
![Page 5: Security in cloud](https://reader033.vdocuments.us/reader033/viewer/2022052621/5585582dd8b42a47518b4fc8/html5/thumbnails/5.jpg)
Conficker allow to install software remotely
Security Threats
Phishing
BotsMalware
Spam Waledec Valentine worm
![Page 6: Security in cloud](https://reader033.vdocuments.us/reader033/viewer/2022052621/5585582dd8b42a47518b4fc8/html5/thumbnails/6.jpg)
Security Threats
![Page 7: Security in cloud](https://reader033.vdocuments.us/reader033/viewer/2022052621/5585582dd8b42a47518b4fc8/html5/thumbnails/7.jpg)
SQL INJECTION
$sql = select * from test where user=“vikash” and pass=“ranjan”
' or '1'='1' or '1'='1';/*'
Hackers May use
$query = sprintf("SELECT * FROM Users where UserName='%s' and Password='%s'", mysql_real_escape_string($Username), mysql_real_escape_string($Password)); mysql_query($query);
Prevention
![Page 8: Security in cloud](https://reader033.vdocuments.us/reader033/viewer/2022052621/5585582dd8b42a47518b4fc8/html5/thumbnails/8.jpg)
Security Should Be Maintained At
1. Client
2. Hosting
3. Domain
![Page 9: Security in cloud](https://reader033.vdocuments.us/reader033/viewer/2022052621/5585582dd8b42a47518b4fc8/html5/thumbnails/9.jpg)
Classical Approach Of Internet
![Page 10: Security in cloud](https://reader033.vdocuments.us/reader033/viewer/2022052621/5585582dd8b42a47518b4fc8/html5/thumbnails/10.jpg)
Information Get Encrypted In Cloud Computing
![Page 11: Security in cloud](https://reader033.vdocuments.us/reader033/viewer/2022052621/5585582dd8b42a47518b4fc8/html5/thumbnails/11.jpg)
File Encryption
![Page 12: Security in cloud](https://reader033.vdocuments.us/reader033/viewer/2022052621/5585582dd8b42a47518b4fc8/html5/thumbnails/12.jpg)
2 Factor Authentication
1.
2.
Finger Prints, Face Marks
![Page 13: Security in cloud](https://reader033.vdocuments.us/reader033/viewer/2022052621/5585582dd8b42a47518b4fc8/html5/thumbnails/13.jpg)
Conclusion
Security in Cloud Computing Concept Of Internet is more than classical concept of Internet , but even then there is a need to take more attention towards Style of coding, and Server administrator should be always ensure that connected ports are secured not a single should be left open.
![Page 14: Security in cloud](https://reader033.vdocuments.us/reader033/viewer/2022052621/5585582dd8b42a47518b4fc8/html5/thumbnails/14.jpg)
![Page 15: Security in cloud](https://reader033.vdocuments.us/reader033/viewer/2022052621/5585582dd8b42a47518b4fc8/html5/thumbnails/15.jpg)