Cloud Computing Security Risks RaviNamboori

Page 1

Issues Of Cloud Computing Security Presentation by Presented By Ravi Namboori Visit us @ http://ravinamboori.net


What is Cloud computing? Cloud computing is nothing but accessing and using applications and files over the Internet rather than on your own computing devices. How To Secure Cloud Services: ďƒź

Before an organization shifts some of its resources to the cloud

ďƒź

Certain measures it should take to ensure that its data will be secure


How To Secure Cloud Services ďƒ˜

If opting for software-as-a-service (SaaS), the firm has to collect as much information as possible about that service provider's infrastructure and security provisions.

ďƒ˜

Infrastructure-as-a-service (IaaS) service providers should be asked about the tools they provide for the protection of data in virtual space.


Advantages of Cloud Computing Businesses of all kinds are appreciating the advantages that cloud computing offers. Few are: 

Scalability to expand

decrease the size of operations

speed with which you can effect changes

cost savings


Disadvantages Are: 

Water hole attacks

Water hole attacks are those that stealthily make way through the hackers' toolkits to compromise the privacy of the users' web applications of a company through their web browsers. In the initial phase 

hackers carry out the investigation and examination of the websites

Next move would be to slip an exploit into these sites

The exploit abuses the vulnerabilities of the systems, when the employees visit these sites


Few Risks & Conclusion: From the governmental organizations, The governmental agencies come directly to the cloud, where it is transparent. Then, they move to the cloud service provider and detach the organization's link. Conclusion: 

Cloud must be encrypted and you only must have access to the encryption keys.

So that even the governmental agencies will not be able to enter your cloud.

In order to prevent water hole attacks, it is recommended protecting the vulnerability by updating and patching all software frequently to restrict potential access points.


Conclusions 

The way your cloud's architecture is designed is crucial.

Advisable to opt for cloud security solutions that adhere to regulations, such as PCI DSS, EU data protection laws, HIPAA, etc.

Your organization has to bear the responsibility for breaches.

While the cloud vendor secures the basic infrastructure, it is up to you to protect the security of all data you have hosted on the cloud.

If you use split-key encryption technologies, your organization should ensure that only your users have control over the data, which includes all your apps.


Thanks!!! Presentation by Ravi Namboori Visit us @ http://ravinamboori.net


Turn static files into dynamic content formats.

Create a flipbook
Issuu converts static files into: digital portfolios, online yearbooks, online catalogs, digital photo albums and more. Sign up and create your flipbook.