SlideShare une entreprise Scribd logo
1  sur  26
Security Issues in
Cloud Computing
Contents :
• What is Cloud Computing?
• Is it Really Secure?
• Cases in Cloud Computing
• Security Measures
What is Cloud Computing..
• A network of remote servers hosted on the internet to store, manage,
and process data, rather than a local server or a personal computer.
• It is divided it into two sections:
The front end and the back end. They connect to each other
through a network, usually the Internet.
The front end is the side the computer user, or client, sees.
The back end is the "cloud" section of the system.
• The front end includes the client's computer and the
application required to access the cloud computing system.
• On the back end of the system are the various computers,
servers and data storage systems that create the "cloud" of
computing services.
• It is a Web-based service which hosts all the programs the
user would need for a job.
• Potentially, everything from generic word processing software
to customized computer programs designed for a specific
company could work on a cloud computing system..
• It's called cloud computing.
Cloud Oriented ArchitectureCloud Oriented Architecture
Virtual
Data Center
IaaS/PaaS
Physical
Data Center
Mobile
Web Applications
ARPANET TCPIP WWW HTML
.COM
SOCIAL
NETWORKS
INTERNET OF
THINGS
100M100M 250M250M
500M500M
25B25B
50B50B
Internet ConnectedInternet Connected
DevicesDevices
12B12B
The Internet of Things is HereThe Internet of Things is Here
In 2012In 2012 2.4 Billion2.4 Billion peoplepeople
connected to the Internetconnected to the Internet
Why care about securityWhy care about security
at scale?at scale?
• Perimeter isPerimeter is
changing dramaticallychanging dramatically
• Attacks areAttacks are
• non-stopnon-stop
Virtual
Data Center
Physical
Data Center
Mobile
Web Applications
IaaS/PaaS
Is It Really Secure ?
• No matter how careful you are with your personal data, by
subscribing to the cloud you will be giving up some control to an
external source. It may also create more space for a third party to
access your information.
• There is a lot of personal information and potentially secure data
that people store on their computers, and this information is now
being transferred to the cloud.
• Cloud computing offers many benefits, but is vulnerable to
threats, and it is equally important to take personal precautions to
secure your data
• The cloud is enabling
cybercriminals to conduct highly
automated online banking theft
•Like most online consumer bank fraud,
the attacks started off with a phishing
e-mail and urging the recipient to click a
link to change the account password.
•Once the link is clicked, a Trojan was
downloaded onto the victim's computer,
in early versions of the attacks. In later
versions the malware is operating from a
server.
• The server is the brains that does all the transactions in the
bank account
• The criminals don't have to change anything on the end user
side. They can make modifications on the server side. They
still have malware on the user's machine.
How many attacks?How many attacks?
• Honestly too manyHonestly too many
to countto count
How do breaches happen?How do breaches happen?
•8888%% of all hacking attacksof all hacking attacks
• use remote access from the internetuse remote access from the internet
How do breaches happen?How do breaches happen?
(In 2013)(In 2013)
•utilized some formutilized some form
of hackingof hacking8181%%
6969%%
1010%%
77%%
55%%
resulted fromresulted from
privilege misuseprivilege misuse
IncorporatedIncorporated
malwaremalware
Involved physicalInvolved physical
attacksattacks
employed socialemployed social
tacticstactics
+31+31%%
-19-19%%
+20+20%%
-4-4%%
-12-12%%
Source: Verizon data breach report 2012
Web application securityWeb application security
is a challengeis a challenge
They areThey are
CustomCustom
Web applications are theWeb applications are the
underbelly of the internetunderbelly of the internet
They areThey are
Everywhere!Everywhere!
Continuous Security: Case StudyContinuous Security: Case Study
US Department of StateUS Department of State
400 worldwide embassies400 worldwide embassies
Grades based on formulaGrades based on formula
Scan every 3 daysScan every 3 days
85% hosts fixed in 6 days85% hosts fixed in 6 days
New Security ArchitectureNew Security Architecture
is neededis needed
•Legacy EnterpriseLegacy Enterprise
Point SolutionsPoint Solutions
Do Not ScaleDo Not Scale
Is it enough to scan and pentestIs it enough to scan and pentest
once a quarter?once a quarter?
Security NeedsSecurity Needs
to beto be ContinuousContinuous
• More thanMore than
• 8080%% of all breachesof all breaches
• are from known vulnerabilitiesare from known vulnerabilities
Continuous Cloud SecurityContinuous Cloud Security
You CAN protect yourselfYou CAN protect yourself
Security Measures
• Are their security standards appropriate?
• Is your data encrypted when being uploaded to or
downloaded from the cloud?
• Understand how access is shared with your cloud folder
• Pick a good password.
• Back up your data
COA platform deploymentCOA platform deployment
COA can be a private cloudCOA can be a private cloud
Are you ready to protectAre you ready to protect
against this onslaught?against this onslaught?
THANK YOU!!!

Contenu connexe

Tendances

What Is Cloud Computing? | Cloud Computing For Beginners | Cloud Computing Tr...
What Is Cloud Computing? | Cloud Computing For Beginners | Cloud Computing Tr...What Is Cloud Computing? | Cloud Computing For Beginners | Cloud Computing Tr...
What Is Cloud Computing? | Cloud Computing For Beginners | Cloud Computing Tr...
Simplilearn
 
Microsoft azure
Microsoft azureMicrosoft azure
Microsoft azure
Mohammad Ilyas Malik
 

Tendances (20)

Cyber Security and Cloud Computing
Cyber Security and Cloud ComputingCyber Security and Cloud Computing
Cyber Security and Cloud Computing
 
Cloud computing security
Cloud computing security Cloud computing security
Cloud computing security
 
Cloud Security - Security Aspects of Cloud Computing
Cloud Security - Security Aspects of Cloud ComputingCloud Security - Security Aspects of Cloud Computing
Cloud Security - Security Aspects of Cloud Computing
 
Cloud computing and data security
Cloud computing and data securityCloud computing and data security
Cloud computing and data security
 
Cloud computing
Cloud computingCloud computing
Cloud computing
 
Security in cloud computing
Security in cloud computingSecurity in cloud computing
Security in cloud computing
 
Cloud Security
Cloud SecurityCloud Security
Cloud Security
 
IaaS, SaaS, PasS : Cloud Computing
IaaS, SaaS, PasS : Cloud ComputingIaaS, SaaS, PasS : Cloud Computing
IaaS, SaaS, PasS : Cloud Computing
 
Cloud computing and Cloud security fundamentals
Cloud computing and Cloud security fundamentalsCloud computing and Cloud security fundamentals
Cloud computing and Cloud security fundamentals
 
Topics in network security
Topics in network securityTopics in network security
Topics in network security
 
Cloud deployment models
Cloud deployment modelsCloud deployment models
Cloud deployment models
 
cloud security ppt
cloud security ppt cloud security ppt
cloud security ppt
 
Cloud security
Cloud securityCloud security
Cloud security
 
Mobile cloud Computing
Mobile cloud ComputingMobile cloud Computing
Mobile cloud Computing
 
What Is Cloud Computing? | Cloud Computing For Beginners | Cloud Computing Tr...
What Is Cloud Computing? | Cloud Computing For Beginners | Cloud Computing Tr...What Is Cloud Computing? | Cloud Computing For Beginners | Cloud Computing Tr...
What Is Cloud Computing? | Cloud Computing For Beginners | Cloud Computing Tr...
 
Cloud service models
Cloud service modelsCloud service models
Cloud service models
 
cloud computing
cloud computingcloud computing
cloud computing
 
Cloud computing
Cloud computingCloud computing
Cloud computing
 
Cloud computing security issues and challenges
Cloud computing security issues and challengesCloud computing security issues and challenges
Cloud computing security issues and challenges
 
Microsoft azure
Microsoft azureMicrosoft azure
Microsoft azure
 

Similaire à Cloud security

2014CyberSecurityProject
2014CyberSecurityProject2014CyberSecurityProject
2014CyberSecurityProject
Kaley Hair
 
SAM05_Barber PW (7-9-15)
SAM05_Barber PW (7-9-15)SAM05_Barber PW (7-9-15)
SAM05_Barber PW (7-9-15)
Norm Barber
 
43080d37-44e9-4b2f-9cb5-ceb90f3fab98.pptx
43080d37-44e9-4b2f-9cb5-ceb90f3fab98.pptx43080d37-44e9-4b2f-9cb5-ceb90f3fab98.pptx
43080d37-44e9-4b2f-9cb5-ceb90f3fab98.pptx
PradeeshSAI
 

Similaire à Cloud security (20)

Cybersecurity Training
Cybersecurity TrainingCybersecurity Training
Cybersecurity Training
 
Toward Continuous Cybersecurity with Network Automation
Toward Continuous Cybersecurity with Network AutomationToward Continuous Cybersecurity with Network Automation
Toward Continuous Cybersecurity with Network Automation
 
Toward Continuous Cybersecurity With Network Automation
Toward Continuous Cybersecurity With Network AutomationToward Continuous Cybersecurity With Network Automation
Toward Continuous Cybersecurity With Network Automation
 
2014CyberSecurityProject
2014CyberSecurityProject2014CyberSecurityProject
2014CyberSecurityProject
 
Presentation 10 (1).pdf
Presentation 10 (1).pdfPresentation 10 (1).pdf
Presentation 10 (1).pdf
 
Solvay secure application layer v2015 seba
Solvay secure application layer v2015   sebaSolvay secure application layer v2015   seba
Solvay secure application layer v2015 seba
 
ICRTITCS-2012 Conference Publication
ICRTITCS-2012 Conference PublicationICRTITCS-2012 Conference Publication
ICRTITCS-2012 Conference Publication
 
Cloud Computing
Cloud ComputingCloud Computing
Cloud Computing
 
SAM05_Barber PW (7-9-15)
SAM05_Barber PW (7-9-15)SAM05_Barber PW (7-9-15)
SAM05_Barber PW (7-9-15)
 
TOPIC7.pptx
TOPIC7.pptxTOPIC7.pptx
TOPIC7.pptx
 
Cyber security awareness for end users
Cyber security awareness for end usersCyber security awareness for end users
Cyber security awareness for end users
 
Cyber security and Hacking
Cyber security and HackingCyber security and Hacking
Cyber security and Hacking
 
The Threat Is Real. Protect Yourself.
The Threat Is Real. Protect Yourself.The Threat Is Real. Protect Yourself.
The Threat Is Real. Protect Yourself.
 
43080d37-44e9-4b2f-9cb5-ceb90f3fab98.pptx
43080d37-44e9-4b2f-9cb5-ceb90f3fab98.pptx43080d37-44e9-4b2f-9cb5-ceb90f3fab98.pptx
43080d37-44e9-4b2f-9cb5-ceb90f3fab98.pptx
 
Eyes Wide Shut: Cybersecurity Smoke & Mirrors...
Eyes Wide Shut: Cybersecurity Smoke & Mirrors...Eyes Wide Shut: Cybersecurity Smoke & Mirrors...
Eyes Wide Shut: Cybersecurity Smoke & Mirrors...
 
Law Firm Cybersecurity: Practical Tips for Protecting Your Data
Law Firm Cybersecurity: Practical Tips for Protecting Your DataLaw Firm Cybersecurity: Practical Tips for Protecting Your Data
Law Firm Cybersecurity: Practical Tips for Protecting Your Data
 
Cybersecurity
Cybersecurity Cybersecurity
Cybersecurity
 
Cyber Security PPT.pptx
Cyber Security PPT.pptxCyber Security PPT.pptx
Cyber Security PPT.pptx
 
Cysec.pptx
Cysec.pptxCysec.pptx
Cysec.pptx
 
Cyber security for business
Cyber security for businessCyber security for business
Cyber security for business
 

Dernier

Artificial Intelligence: Facts and Myths
Artificial Intelligence: Facts and MythsArtificial Intelligence: Facts and Myths
Artificial Intelligence: Facts and Myths
Joaquim Jorge
 
+971581248768>> SAFE AND ORIGINAL ABORTION PILLS FOR SALE IN DUBAI AND ABUDHA...
+971581248768>> SAFE AND ORIGINAL ABORTION PILLS FOR SALE IN DUBAI AND ABUDHA...+971581248768>> SAFE AND ORIGINAL ABORTION PILLS FOR SALE IN DUBAI AND ABUDHA...
+971581248768>> SAFE AND ORIGINAL ABORTION PILLS FOR SALE IN DUBAI AND ABUDHA...
?#DUbAI#??##{{(☎️+971_581248768%)**%*]'#abortion pills for sale in dubai@
 
Histor y of HAM Radio presentation slide
Histor y of HAM Radio presentation slideHistor y of HAM Radio presentation slide
Histor y of HAM Radio presentation slide
vu2urc
 

Dernier (20)

TrustArc Webinar - Unlock the Power of AI-Driven Data Discovery
TrustArc Webinar - Unlock the Power of AI-Driven Data DiscoveryTrustArc Webinar - Unlock the Power of AI-Driven Data Discovery
TrustArc Webinar - Unlock the Power of AI-Driven Data Discovery
 
Apidays New York 2024 - Scaling API-first by Ian Reasor and Radu Cotescu, Adobe
Apidays New York 2024 - Scaling API-first by Ian Reasor and Radu Cotescu, AdobeApidays New York 2024 - Scaling API-first by Ian Reasor and Radu Cotescu, Adobe
Apidays New York 2024 - Scaling API-first by Ian Reasor and Radu Cotescu, Adobe
 
Artificial Intelligence: Facts and Myths
Artificial Intelligence: Facts and MythsArtificial Intelligence: Facts and Myths
Artificial Intelligence: Facts and Myths
 
From Event to Action: Accelerate Your Decision Making with Real-Time Automation
From Event to Action: Accelerate Your Decision Making with Real-Time AutomationFrom Event to Action: Accelerate Your Decision Making with Real-Time Automation
From Event to Action: Accelerate Your Decision Making with Real-Time Automation
 
GenAI Risks & Security Meetup 01052024.pdf
GenAI Risks & Security Meetup 01052024.pdfGenAI Risks & Security Meetup 01052024.pdf
GenAI Risks & Security Meetup 01052024.pdf
 
Apidays New York 2024 - The value of a flexible API Management solution for O...
Apidays New York 2024 - The value of a flexible API Management solution for O...Apidays New York 2024 - The value of a flexible API Management solution for O...
Apidays New York 2024 - The value of a flexible API Management solution for O...
 
+971581248768>> SAFE AND ORIGINAL ABORTION PILLS FOR SALE IN DUBAI AND ABUDHA...
+971581248768>> SAFE AND ORIGINAL ABORTION PILLS FOR SALE IN DUBAI AND ABUDHA...+971581248768>> SAFE AND ORIGINAL ABORTION PILLS FOR SALE IN DUBAI AND ABUDHA...
+971581248768>> SAFE AND ORIGINAL ABORTION PILLS FOR SALE IN DUBAI AND ABUDHA...
 
Histor y of HAM Radio presentation slide
Histor y of HAM Radio presentation slideHistor y of HAM Radio presentation slide
Histor y of HAM Radio presentation slide
 
Partners Life - Insurer Innovation Award 2024
Partners Life - Insurer Innovation Award 2024Partners Life - Insurer Innovation Award 2024
Partners Life - Insurer Innovation Award 2024
 
Advantages of Hiring UIUX Design Service Providers for Your Business
Advantages of Hiring UIUX Design Service Providers for Your BusinessAdvantages of Hiring UIUX Design Service Providers for Your Business
Advantages of Hiring UIUX Design Service Providers for Your Business
 
04-2024-HHUG-Sales-and-Marketing-Alignment.pptx
04-2024-HHUG-Sales-and-Marketing-Alignment.pptx04-2024-HHUG-Sales-and-Marketing-Alignment.pptx
04-2024-HHUG-Sales-and-Marketing-Alignment.pptx
 
GenCyber Cyber Security Day Presentation
GenCyber Cyber Security Day PresentationGenCyber Cyber Security Day Presentation
GenCyber Cyber Security Day Presentation
 
TrustArc Webinar - Stay Ahead of US State Data Privacy Law Developments
TrustArc Webinar - Stay Ahead of US State Data Privacy Law DevelopmentsTrustArc Webinar - Stay Ahead of US State Data Privacy Law Developments
TrustArc Webinar - Stay Ahead of US State Data Privacy Law Developments
 
2024: Domino Containers - The Next Step. News from the Domino Container commu...
2024: Domino Containers - The Next Step. News from the Domino Container commu...2024: Domino Containers - The Next Step. News from the Domino Container commu...
2024: Domino Containers - The Next Step. News from the Domino Container commu...
 
Scaling API-first – The story of a global engineering organization
Scaling API-first – The story of a global engineering organizationScaling API-first – The story of a global engineering organization
Scaling API-first – The story of a global engineering organization
 
ProductAnonymous-April2024-WinProductDiscovery-MelissaKlemke
ProductAnonymous-April2024-WinProductDiscovery-MelissaKlemkeProductAnonymous-April2024-WinProductDiscovery-MelissaKlemke
ProductAnonymous-April2024-WinProductDiscovery-MelissaKlemke
 
🐬 The future of MySQL is Postgres 🐘
🐬  The future of MySQL is Postgres   🐘🐬  The future of MySQL is Postgres   🐘
🐬 The future of MySQL is Postgres 🐘
 
Mastering MySQL Database Architecture: Deep Dive into MySQL Shell and MySQL R...
Mastering MySQL Database Architecture: Deep Dive into MySQL Shell and MySQL R...Mastering MySQL Database Architecture: Deep Dive into MySQL Shell and MySQL R...
Mastering MySQL Database Architecture: Deep Dive into MySQL Shell and MySQL R...
 
AWS Community Day CPH - Three problems of Terraform
AWS Community Day CPH - Three problems of TerraformAWS Community Day CPH - Three problems of Terraform
AWS Community Day CPH - Three problems of Terraform
 
Tata AIG General Insurance Company - Insurer Innovation Award 2024
Tata AIG General Insurance Company - Insurer Innovation Award 2024Tata AIG General Insurance Company - Insurer Innovation Award 2024
Tata AIG General Insurance Company - Insurer Innovation Award 2024
 

Cloud security

  • 2. Contents : • What is Cloud Computing? • Is it Really Secure? • Cases in Cloud Computing • Security Measures
  • 3. What is Cloud Computing.. • A network of remote servers hosted on the internet to store, manage, and process data, rather than a local server or a personal computer.
  • 4. • It is divided it into two sections: The front end and the back end. They connect to each other through a network, usually the Internet. The front end is the side the computer user, or client, sees. The back end is the "cloud" section of the system. • The front end includes the client's computer and the application required to access the cloud computing system. • On the back end of the system are the various computers, servers and data storage systems that create the "cloud" of computing services.
  • 5. • It is a Web-based service which hosts all the programs the user would need for a job. • Potentially, everything from generic word processing software to customized computer programs designed for a specific company could work on a cloud computing system.. • It's called cloud computing.
  • 6. Cloud Oriented ArchitectureCloud Oriented Architecture Virtual Data Center IaaS/PaaS Physical Data Center Mobile Web Applications
  • 7. ARPANET TCPIP WWW HTML .COM SOCIAL NETWORKS INTERNET OF THINGS 100M100M 250M250M 500M500M 25B25B 50B50B Internet ConnectedInternet Connected DevicesDevices 12B12B The Internet of Things is HereThe Internet of Things is Here In 2012In 2012 2.4 Billion2.4 Billion peoplepeople connected to the Internetconnected to the Internet
  • 8. Why care about securityWhy care about security at scale?at scale? • Perimeter isPerimeter is changing dramaticallychanging dramatically
  • 9. • Attacks areAttacks are • non-stopnon-stop Virtual Data Center Physical Data Center Mobile Web Applications IaaS/PaaS
  • 10. Is It Really Secure ? • No matter how careful you are with your personal data, by subscribing to the cloud you will be giving up some control to an external source. It may also create more space for a third party to access your information. • There is a lot of personal information and potentially secure data that people store on their computers, and this information is now being transferred to the cloud. • Cloud computing offers many benefits, but is vulnerable to threats, and it is equally important to take personal precautions to secure your data
  • 11. • The cloud is enabling cybercriminals to conduct highly automated online banking theft •Like most online consumer bank fraud, the attacks started off with a phishing e-mail and urging the recipient to click a link to change the account password. •Once the link is clicked, a Trojan was downloaded onto the victim's computer, in early versions of the attacks. In later versions the malware is operating from a server.
  • 12. • The server is the brains that does all the transactions in the bank account • The criminals don't have to change anything on the end user side. They can make modifications on the server side. They still have malware on the user's machine.
  • 13. How many attacks?How many attacks? • Honestly too manyHonestly too many to countto count
  • 14. How do breaches happen?How do breaches happen? •8888%% of all hacking attacksof all hacking attacks • use remote access from the internetuse remote access from the internet
  • 15. How do breaches happen?How do breaches happen? (In 2013)(In 2013) •utilized some formutilized some form of hackingof hacking8181%% 6969%% 1010%% 77%% 55%% resulted fromresulted from privilege misuseprivilege misuse IncorporatedIncorporated malwaremalware Involved physicalInvolved physical attacksattacks employed socialemployed social tacticstactics +31+31%% -19-19%% +20+20%% -4-4%% -12-12%% Source: Verizon data breach report 2012
  • 16. Web application securityWeb application security is a challengeis a challenge They areThey are CustomCustom
  • 17. Web applications are theWeb applications are the underbelly of the internetunderbelly of the internet They areThey are Everywhere!Everywhere!
  • 18. Continuous Security: Case StudyContinuous Security: Case Study US Department of StateUS Department of State 400 worldwide embassies400 worldwide embassies Grades based on formulaGrades based on formula Scan every 3 daysScan every 3 days 85% hosts fixed in 6 days85% hosts fixed in 6 days
  • 19.
  • 20. New Security ArchitectureNew Security Architecture is neededis needed •Legacy EnterpriseLegacy Enterprise Point SolutionsPoint Solutions Do Not ScaleDo Not Scale
  • 21. Is it enough to scan and pentestIs it enough to scan and pentest once a quarter?once a quarter? Security NeedsSecurity Needs to beto be ContinuousContinuous
  • 22. • More thanMore than • 8080%% of all breachesof all breaches • are from known vulnerabilitiesare from known vulnerabilities Continuous Cloud SecurityContinuous Cloud Security You CAN protect yourselfYou CAN protect yourself
  • 23. Security Measures • Are their security standards appropriate? • Is your data encrypted when being uploaded to or downloaded from the cloud? • Understand how access is shared with your cloud folder • Pick a good password. • Back up your data
  • 24. COA platform deploymentCOA platform deployment COA can be a private cloudCOA can be a private cloud
  • 25. Are you ready to protectAre you ready to protect against this onslaught?against this onslaught?

Notes de l'éditeur

  1. As you can see in the image there are many devices connected to the virtual server i.e cloud which has ability to run a program or application on those connected devices at the same time.
  2. Services like Web-based e-mail programs leverage existing Web browsers like Internet Explorer or Firefox a cloud computing system could include practically any computer program you can imagine, from data processing to video games. Usually, each application will have its own dedicated server.
  3. Google drive /google docs Microsoft skydrive Dropbox Box Apple I cloud Amazon cloud
  4. This distance between you and the physical location of your data creates a barrier
  5. The same flexibility and freedom companies get from having their software and services hosted in the cloud is enabling cybercriminals to conduct highly automated online banking theft – without doing much of the necessary information processing on their victims' own computers. Phising typically pretending to be from a victim's bank
  6. 1 > Do some research. Make sure that the company has a good reputation and  solid security policies. Remember, you are trusting this company to store your personal information. 2>Make sure that your browser or app requires an encrypted connection before you upload or download your data.  Look for the “https://” or the  padlock beside the URL in your browser. 3>Several cloud storage providers allow you to share access to your online folders with other people. Be sure you know in details how this works.  Can they read only or can they change the file?  Will you know who changed a file last?  If you share the file with a group, do you know who all is in the group?  Are you notified if the group changes?  Does the service allow you to make files public?  If you do are your personal details (name, account, email, etc.) attached to that file if a stranger looks at it? 4>Back up your data the same way you back up your computer’s hard drive, back up your Cloud data. There are some companies that offer a small amount of storage free of cost. Take advantage of this