SlideShare une entreprise Scribd logo
1  sur  23
Prepared by,
Ms.SRIPRIYA,
Assistant professor,
Bon secours college for women,
Thanjavur-6
 1.cloud service providers/Saas & Paas
provider
 2.Cloud Infrastructure provider/ IaaS
provider
 1.Infrastructure
 2.Storage
 3.Platform
 4.Application
 5.Services
 6.Client
 1.Secure data transfer
 2. Secure programs interfaces
 3. Secure retained data
 4.user access to control
 5.data separation
 It’s a significant part of business planning.
 Risk management believe to reduce the risk
 R.M method for recognizing, considering risk.
 Some of risk administrations are ISO,NIT
 A disaster at a cloud provider can affect every one of
its customers.
 And hackers and malware are not the only ones who
may target a cloud service provider.
 Cloud computing risks are also presented by insider
threats.
 Cloud computing provide all types of possibilities to
reduce the risk in IT .
 Over 2-3 years IT organization evolving better
concentrated on
“Auditing, inspecting, reconsidering & modernizing”
 Hybrid clouds start to verify their enterprise worth.
 Risk can effect in market Authority:
 Robust development,
 premium supply charges &
 investor confidence.
 Risk management is not only buying protection for the
company, it should consider insurable & uninsurable
risk.
 Its also define cost effective during the risk
management.
 #1. Unauthorized access to customer and
business data
Criminals do not like to work. They may
target small business networks because they
are easier to breach, and they often go after
larger companies because of the allure of
larger payouts.
 #2. Insecure interfaces & APIs
 Provider should double check that security to
their service forms
 Logging security
 #3.Vicious insider
 Large risk in cc environment.
 Gain unauthorized access to organozations
 #4. Issues related technology sharing
 It is based on IaaS
 Remember: you have many ways to protect
your data when it is in control
 #5. data loss or leakage
 Data may be deleted or loss without produce
backup
 #6. Hijacking
 Deception & exploitation of program
vulnerabilities
 #7. Unknown risk profile
 This is less engaged with h/w & s/w
maintenance.
 Malicious insiders & abusive use of login access by an
unauthorized persons.
 Identity theft
 External security Risk
 Malware infections and data breaches
 Data Protection Risk-
 Data loss risk-deletion of record, loss of
encryption key,correption of data.
 It is a open environment security risk.
 Its have high accessibility and associated with Risk too.
 Cc provide higher service quality , security,
availability & reliability.
Current state
 Data storage & computation are offer in the single
data center(service provider)
 A single point of malfunction will not be presumed
for any data loss compare with house computing.
 How data protected?
 How code protected?
 Cc provide security,availablity & reliablity.
 Security advantages:
 Data centralization
 Incident Response
 Forensic image verification time-MD5 hash function
 Logging-benchmark logs solveing the logging problems
 Investigation-illegal cloud environment
 Data segregation –data normally distributed
 Long term viability-double check the data
accessibility
 Compromised server- backup of data
 Regularity compliance-update not in regular
 Recovery – natural and man made disasters.
 If the data is confidential ,the data can handle by the
authorized person only.
 Cc is the platform of digital matching form.
 Human-human data flow.
Cloud ,digital persona & data security:
Salesforce.com-12 year of experience-service-infrastructure
scalability to accessibility.
After get authentication only can control the cloud .
Protect data from unauthorized control
 Content level security endows Organizations to
organize data .
 Contents are the organizational level, rather than the
institutional level.
 Cloud service providers use a combination of methods
to protect your data. ... Cloud providers take steps to
protect data that's in transit.
 Data Security methods include virtual private
networks, encryption, or masking. Virtual private
networks (VPNs) allow remote employees to connect
to corporate networks.
 Data integrity strengthen by PRIVACY,SECURITY, &
RELIABLITY
 And the integrity getting damaged by
HACKERS,PROGRAM MISTAKE, comp. virus
Data availability -
Data backup plan -
Disaster Recovery plan-
 Only authorized persons only can access the resource within the system.
 Setp1- Authenticate individual
 Step2-get info. About individual
 Step3-permit
 Auditing:
 Advantage is to reduce the cost of IT services.
 Reduce the capital cost.
 Unlimited scalablity
 Pay- as-usage
 Cc establish DB in virtual environment by reveling
internal & external attacks.
 Double check the data inherently protected.
software testing:
Reducing testing cost
S/W testing tools to cc Applications

Contenu connexe

Tendances

Cloud Computing
Cloud ComputingCloud Computing
Cloud Computing
nitinw25
 

Tendances (20)

Cloud Security: A New Perspective
Cloud Security: A New PerspectiveCloud Security: A New Perspective
Cloud Security: A New Perspective
 
Performance issues in Cloud Computing
Performance issues in Cloud ComputingPerformance issues in Cloud Computing
Performance issues in Cloud Computing
 
Cloud security
Cloud securityCloud security
Cloud security
 
Cloud Computing
Cloud ComputingCloud Computing
Cloud Computing
 
CLOUD NATIVE SECURITY
CLOUD NATIVE SECURITYCLOUD NATIVE SECURITY
CLOUD NATIVE SECURITY
 
Cloud computing risk assesment presentation
Cloud computing risk assesment presentationCloud computing risk assesment presentation
Cloud computing risk assesment presentation
 
Data storage security in cloud computing
Data storage security in cloud computingData storage security in cloud computing
Data storage security in cloud computing
 
Cloud Computing Architecture
Cloud Computing ArchitectureCloud Computing Architecture
Cloud Computing Architecture
 
Cloud Service Models
Cloud Service ModelsCloud Service Models
Cloud Service Models
 
Cloud Computing
Cloud ComputingCloud Computing
Cloud Computing
 
Cloud Security
Cloud SecurityCloud Security
Cloud Security
 
Cloud computing
Cloud computingCloud computing
Cloud computing
 
Cloud computing seminar
Cloud computing seminarCloud computing seminar
Cloud computing seminar
 
cloud computing
cloud computingcloud computing
cloud computing
 
Security in cloud computing
Security in cloud computingSecurity in cloud computing
Security in cloud computing
 
Basics of Cloud Computing
Basics of Cloud ComputingBasics of Cloud Computing
Basics of Cloud Computing
 
Cloud computing security issues and challenges
Cloud computing security issues and challengesCloud computing security issues and challenges
Cloud computing security issues and challenges
 
Introduction to AWS Cloud Computing
Introduction to AWS Cloud ComputingIntroduction to AWS Cloud Computing
Introduction to AWS Cloud Computing
 
Top 10 cloud service providers
Top 10 cloud service providersTop 10 cloud service providers
Top 10 cloud service providers
 
AWS Security Checklist
AWS Security ChecklistAWS Security Checklist
AWS Security Checklist
 

Similaire à Cloud computing risks

Information System Security
Information System Security Information System Security
Information System Security
Syed Asif Sherazi
 
10.1.1.436.3364.pdf
10.1.1.436.3364.pdf10.1.1.436.3364.pdf
10.1.1.436.3364.pdf
mistryritesh
 
Top Cyber Security Interview Questions and Answers 2022.pdf
Top Cyber Security Interview Questions and Answers 2022.pdfTop Cyber Security Interview Questions and Answers 2022.pdf
Top Cyber Security Interview Questions and Answers 2022.pdf
Careerera
 

Similaire à Cloud computing risks (20)

Information System Security
Information System Security Information System Security
Information System Security
 
Cloud Application Security Best Practices To follow.pdf
Cloud Application Security Best Practices To follow.pdfCloud Application Security Best Practices To follow.pdf
Cloud Application Security Best Practices To follow.pdf
 
Practical Security for the Cloud
Practical Security for the CloudPractical Security for the Cloud
Practical Security for the Cloud
 
Cloud Application Security Best Practices To follow.pdf
Cloud Application Security Best Practices To follow.pdfCloud Application Security Best Practices To follow.pdf
Cloud Application Security Best Practices To follow.pdf
 
Bridging the Data Security Gap
Bridging the Data Security GapBridging the Data Security Gap
Bridging the Data Security Gap
 
MIST Effective Masquerade Attack Detection in the Cloud
MIST Effective Masquerade Attack Detection in the CloudMIST Effective Masquerade Attack Detection in the Cloud
MIST Effective Masquerade Attack Detection in the Cloud
 
A017130104
A017130104A017130104
A017130104
 
Identified Vulnerabilitis And Threats In Cloud Computing
Identified Vulnerabilitis And Threats In Cloud ComputingIdentified Vulnerabilitis And Threats In Cloud Computing
Identified Vulnerabilitis And Threats In Cloud Computing
 
9 Things You Need to Know Before Moving to the Cloud
9 Things You Need to Know Before Moving to the Cloud9 Things You Need to Know Before Moving to the Cloud
9 Things You Need to Know Before Moving to the Cloud
 
The 14 Most Common Security Risks For SaaS Applications And How To Fix Them.pdf
The 14 Most Common Security Risks For SaaS Applications And How To Fix Them.pdfThe 14 Most Common Security Risks For SaaS Applications And How To Fix Them.pdf
The 14 Most Common Security Risks For SaaS Applications And How To Fix Them.pdf
 
IRJET- A Survey on Cloud Data Security Methods and Future Directions
IRJET- A Survey on Cloud Data Security Methods and Future DirectionsIRJET- A Survey on Cloud Data Security Methods and Future Directions
IRJET- A Survey on Cloud Data Security Methods and Future Directions
 
User_Access_IIA-LA_3-9-2016
User_Access_IIA-LA_3-9-2016User_Access_IIA-LA_3-9-2016
User_Access_IIA-LA_3-9-2016
 
10.1.1.436.3364.pdf
10.1.1.436.3364.pdf10.1.1.436.3364.pdf
10.1.1.436.3364.pdf
 
The Top Cloud Security Issues
The Top Cloud Security IssuesThe Top Cloud Security Issues
The Top Cloud Security Issues
 
The Three Major Goals of Cybersecurity for Business Organizations-precise tes...
The Three Major Goals of Cybersecurity for Business Organizations-precise tes...The Three Major Goals of Cybersecurity for Business Organizations-precise tes...
The Three Major Goals of Cybersecurity for Business Organizations-precise tes...
 
Cloud_security.pptx
Cloud_security.pptxCloud_security.pptx
Cloud_security.pptx
 
Law firms keep sensitive client data secure with CloudMask
Law firms keep sensitive client data secure with CloudMaskLaw firms keep sensitive client data secure with CloudMask
Law firms keep sensitive client data secure with CloudMask
 
CC ss.pptx
CC ss.pptxCC ss.pptx
CC ss.pptx
 
What Is Digital Asset Security. What Are the Risks Associated With It.docx.pdf
What Is Digital Asset Security. What Are the Risks Associated With It.docx.pdfWhat Is Digital Asset Security. What Are the Risks Associated With It.docx.pdf
What Is Digital Asset Security. What Are the Risks Associated With It.docx.pdf
 
Top Cyber Security Interview Questions and Answers 2022.pdf
Top Cyber Security Interview Questions and Answers 2022.pdfTop Cyber Security Interview Questions and Answers 2022.pdf
Top Cyber Security Interview Questions and Answers 2022.pdf
 

Dernier

Jual Obat Aborsi Hongkong ( Asli No.1 ) 085657271886 Obat Penggugur Kandungan...
Jual Obat Aborsi Hongkong ( Asli No.1 ) 085657271886 Obat Penggugur Kandungan...Jual Obat Aborsi Hongkong ( Asli No.1 ) 085657271886 Obat Penggugur Kandungan...
Jual Obat Aborsi Hongkong ( Asli No.1 ) 085657271886 Obat Penggugur Kandungan...
ZurliaSoop
 
The basics of sentences session 3pptx.pptx
The basics of sentences session 3pptx.pptxThe basics of sentences session 3pptx.pptx
The basics of sentences session 3pptx.pptx
heathfieldcps1
 

Dernier (20)

Single or Multiple melodic lines structure
Single or Multiple melodic lines structureSingle or Multiple melodic lines structure
Single or Multiple melodic lines structure
 
On National Teacher Day, meet the 2024-25 Kenan Fellows
On National Teacher Day, meet the 2024-25 Kenan FellowsOn National Teacher Day, meet the 2024-25 Kenan Fellows
On National Teacher Day, meet the 2024-25 Kenan Fellows
 
Interdisciplinary_Insights_Data_Collection_Methods.pptx
Interdisciplinary_Insights_Data_Collection_Methods.pptxInterdisciplinary_Insights_Data_Collection_Methods.pptx
Interdisciplinary_Insights_Data_Collection_Methods.pptx
 
Food safety_Challenges food safety laboratories_.pdf
Food safety_Challenges food safety laboratories_.pdfFood safety_Challenges food safety laboratories_.pdf
Food safety_Challenges food safety laboratories_.pdf
 
UGC NET Paper 1 Mathematical Reasoning & Aptitude.pdf
UGC NET Paper 1 Mathematical Reasoning & Aptitude.pdfUGC NET Paper 1 Mathematical Reasoning & Aptitude.pdf
UGC NET Paper 1 Mathematical Reasoning & Aptitude.pdf
 
Beyond_Borders_Understanding_Anime_and_Manga_Fandom_A_Comprehensive_Audience_...
Beyond_Borders_Understanding_Anime_and_Manga_Fandom_A_Comprehensive_Audience_...Beyond_Borders_Understanding_Anime_and_Manga_Fandom_A_Comprehensive_Audience_...
Beyond_Borders_Understanding_Anime_and_Manga_Fandom_A_Comprehensive_Audience_...
 
How to setup Pycharm environment for Odoo 17.pptx
How to setup Pycharm environment for Odoo 17.pptxHow to setup Pycharm environment for Odoo 17.pptx
How to setup Pycharm environment for Odoo 17.pptx
 
Micro-Scholarship, What it is, How can it help me.pdf
Micro-Scholarship, What it is, How can it help me.pdfMicro-Scholarship, What it is, How can it help me.pdf
Micro-Scholarship, What it is, How can it help me.pdf
 
How to Give a Domain for a Field in Odoo 17
How to Give a Domain for a Field in Odoo 17How to Give a Domain for a Field in Odoo 17
How to Give a Domain for a Field in Odoo 17
 
ICT Role in 21st Century Education & its Challenges.pptx
ICT Role in 21st Century Education & its Challenges.pptxICT Role in 21st Century Education & its Challenges.pptx
ICT Role in 21st Century Education & its Challenges.pptx
 
Graduate Outcomes Presentation Slides - English
Graduate Outcomes Presentation Slides - EnglishGraduate Outcomes Presentation Slides - English
Graduate Outcomes Presentation Slides - English
 
Jual Obat Aborsi Hongkong ( Asli No.1 ) 085657271886 Obat Penggugur Kandungan...
Jual Obat Aborsi Hongkong ( Asli No.1 ) 085657271886 Obat Penggugur Kandungan...Jual Obat Aborsi Hongkong ( Asli No.1 ) 085657271886 Obat Penggugur Kandungan...
Jual Obat Aborsi Hongkong ( Asli No.1 ) 085657271886 Obat Penggugur Kandungan...
 
ICT role in 21st century education and it's challenges.
ICT role in 21st century education and it's challenges.ICT role in 21st century education and it's challenges.
ICT role in 21st century education and it's challenges.
 
NO1 Top Black Magic Specialist In Lahore Black magic In Pakistan Kala Ilam Ex...
NO1 Top Black Magic Specialist In Lahore Black magic In Pakistan Kala Ilam Ex...NO1 Top Black Magic Specialist In Lahore Black magic In Pakistan Kala Ilam Ex...
NO1 Top Black Magic Specialist In Lahore Black magic In Pakistan Kala Ilam Ex...
 
Towards a code of practice for AI in AT.pptx
Towards a code of practice for AI in AT.pptxTowards a code of practice for AI in AT.pptx
Towards a code of practice for AI in AT.pptx
 
How to Manage Global Discount in Odoo 17 POS
How to Manage Global Discount in Odoo 17 POSHow to Manage Global Discount in Odoo 17 POS
How to Manage Global Discount in Odoo 17 POS
 
Application orientated numerical on hev.ppt
Application orientated numerical on hev.pptApplication orientated numerical on hev.ppt
Application orientated numerical on hev.ppt
 
REMIFENTANIL: An Ultra short acting opioid.pptx
REMIFENTANIL: An Ultra short acting opioid.pptxREMIFENTANIL: An Ultra short acting opioid.pptx
REMIFENTANIL: An Ultra short acting opioid.pptx
 
The basics of sentences session 3pptx.pptx
The basics of sentences session 3pptx.pptxThe basics of sentences session 3pptx.pptx
The basics of sentences session 3pptx.pptx
 
How to Add New Custom Addons Path in Odoo 17
How to Add New Custom Addons Path in Odoo 17How to Add New Custom Addons Path in Odoo 17
How to Add New Custom Addons Path in Odoo 17
 

Cloud computing risks

  • 1. Prepared by, Ms.SRIPRIYA, Assistant professor, Bon secours college for women, Thanjavur-6
  • 2.  1.cloud service providers/Saas & Paas provider  2.Cloud Infrastructure provider/ IaaS provider
  • 3.  1.Infrastructure  2.Storage  3.Platform  4.Application  5.Services  6.Client
  • 4.  1.Secure data transfer  2. Secure programs interfaces  3. Secure retained data  4.user access to control  5.data separation
  • 5.  It’s a significant part of business planning.  Risk management believe to reduce the risk  R.M method for recognizing, considering risk.  Some of risk administrations are ISO,NIT  A disaster at a cloud provider can affect every one of its customers.  And hackers and malware are not the only ones who may target a cloud service provider.  Cloud computing risks are also presented by insider threats.
  • 6.  Cloud computing provide all types of possibilities to reduce the risk in IT .  Over 2-3 years IT organization evolving better concentrated on “Auditing, inspecting, reconsidering & modernizing”  Hybrid clouds start to verify their enterprise worth.
  • 7.  Risk can effect in market Authority:  Robust development,  premium supply charges &  investor confidence.  Risk management is not only buying protection for the company, it should consider insurable & uninsurable risk.  Its also define cost effective during the risk management.
  • 8.
  • 9.  #1. Unauthorized access to customer and business data Criminals do not like to work. They may target small business networks because they are easier to breach, and they often go after larger companies because of the allure of larger payouts.
  • 10.  #2. Insecure interfaces & APIs  Provider should double check that security to their service forms  Logging security  #3.Vicious insider  Large risk in cc environment.  Gain unauthorized access to organozations
  • 11.  #4. Issues related technology sharing  It is based on IaaS  Remember: you have many ways to protect your data when it is in control  #5. data loss or leakage  Data may be deleted or loss without produce backup  #6. Hijacking  Deception & exploitation of program vulnerabilities
  • 12.  #7. Unknown risk profile  This is less engaged with h/w & s/w maintenance.
  • 13.  Malicious insiders & abusive use of login access by an unauthorized persons.  Identity theft  External security Risk  Malware infections and data breaches  Data Protection Risk-  Data loss risk-deletion of record, loss of encryption key,correption of data.
  • 14.
  • 15.  It is a open environment security risk.  Its have high accessibility and associated with Risk too.  Cc provide higher service quality , security, availability & reliability. Current state  Data storage & computation are offer in the single data center(service provider)  A single point of malfunction will not be presumed for any data loss compare with house computing.
  • 16.  How data protected?  How code protected?  Cc provide security,availablity & reliablity.  Security advantages:  Data centralization  Incident Response  Forensic image verification time-MD5 hash function  Logging-benchmark logs solveing the logging problems
  • 17.  Investigation-illegal cloud environment  Data segregation –data normally distributed  Long term viability-double check the data accessibility  Compromised server- backup of data  Regularity compliance-update not in regular  Recovery – natural and man made disasters.
  • 18.  If the data is confidential ,the data can handle by the authorized person only.  Cc is the platform of digital matching form.  Human-human data flow. Cloud ,digital persona & data security: Salesforce.com-12 year of experience-service-infrastructure scalability to accessibility. After get authentication only can control the cloud . Protect data from unauthorized control
  • 19.  Content level security endows Organizations to organize data .  Contents are the organizational level, rather than the institutional level.
  • 20.  Cloud service providers use a combination of methods to protect your data. ... Cloud providers take steps to protect data that's in transit.  Data Security methods include virtual private networks, encryption, or masking. Virtual private networks (VPNs) allow remote employees to connect to corporate networks.
  • 21.  Data integrity strengthen by PRIVACY,SECURITY, & RELIABLITY  And the integrity getting damaged by HACKERS,PROGRAM MISTAKE, comp. virus Data availability - Data backup plan - Disaster Recovery plan-
  • 22.  Only authorized persons only can access the resource within the system.  Setp1- Authenticate individual  Step2-get info. About individual  Step3-permit  Auditing:  Advantage is to reduce the cost of IT services.  Reduce the capital cost.  Unlimited scalablity  Pay- as-usage
  • 23.  Cc establish DB in virtual environment by reveling internal & external attacks.  Double check the data inherently protected. software testing: Reducing testing cost S/W testing tools to cc Applications