Issues Of Cloud Computing Security Presentation by Presented By Ravi Namboori Visit us @ http://ravinamboori.net
What is Cloud computing? Cloud computing is nothing but accessing and using applications and files over the Internet rather than on your own computing devices. How To Secure Cloud Services: ďƒź
Before an organization shifts some of its resources to the cloud
ďƒź
Certain measures it should take to ensure that its data will be secure
How To Secure Cloud Services ďƒ˜
If opting for software-as-a-service (SaaS), the firm has to collect as much information as possible about that service provider's infrastructure and security provisions.
ďƒ˜
Infrastructure-as-a-service (IaaS) service providers should be asked about the tools they provide for the protection of data in virtual space.
Advantages of Cloud Computing Businesses of all kinds are appreciating the advantages that cloud computing offers. Few are:
Scalability to expand
decrease the size of operations
speed with which you can effect changes
cost savings
Disadvantages Are:
Water hole attacks
Water hole attacks are those that stealthily make way through the hackers' toolkits to compromise the privacy of the users' web applications of a company through their web browsers. In the initial phase
hackers carry out the investigation and examination of the websites
Next move would be to slip an exploit into these sites
The exploit abuses the vulnerabilities of the systems, when the employees visit these sites
Few Risks & Conclusion: From the governmental organizations, The governmental agencies come directly to the cloud, where it is transparent. Then, they move to the cloud service provider and detach the organization's link. Conclusion:
Cloud must be encrypted and you only must have access to the encryption keys.
So that even the governmental agencies will not be able to enter your cloud.
In order to prevent water hole attacks, it is recommended protecting the vulnerability by updating and patching all software frequently to restrict potential access points.
Conclusions
The way your cloud's architecture is designed is crucial.
Advisable to opt for cloud security solutions that adhere to regulations, such as PCI DSS, EU data protection laws, HIPAA, etc.
Your organization has to bear the responsibility for breaches.
While the cloud vendor secures the basic infrastructure, it is up to you to protect the security of all data you have hosted on the cloud.
If you use split-key encryption technologies, your organization should ensure that only your users have control over the data, which includes all your apps.
Thanks!!! Presentation by Ravi Namboori Visit us @ http://ravinamboori.net