RaviNamboori on Cloud Computing Security Risks PowerPoint PPT Presentation

presentation player overlay
About This Presentation
Transcript and Presenter's Notes

Title: RaviNamboori on Cloud Computing Security Risks


1
Issues Of Cloud Computing Security
  • Presentation by
  • Presented By
  • Ravi Namboori
  • Visit us _at_ http//ravinamboori.net

2
What is Cloud computing?
  • Cloud computing is nothing but accessing and
    using applications and files
  • over the Internet rather than on your own
    computing devices.
  • How To Secure Cloud Services
  • Before an organization shifts some of its
    resources to the cloud
  • Certain measures it should take to ensure that
    its data will be secure

3
How To Secure Cloud Services
  • If opting for software-as-a-service (SaaS), the
    firm has to collect as much information as
    possible about that service provider's
    infrastructure and security provisions.
  • Infrastructure-as-a-service (IaaS) service
    providers should be asked about the tools they
    provide for the protection of data in virtual
    space.

4
Advantages of Cloud Computing
  • Businesses of all kinds are appreciating the
    advantages that cloud computing offers.
  • Few are
  • Scalability to expand
  • decrease the size of operations
  • speed with which you can effect changes
  • cost savings

5
Disadvantages Are
  • Water hole attacks
  • Water hole attacks are those that stealthily make
    way through the hackers' toolkits to compromise
    the privacy of the users' web applications of a
    company through their web browsers.
  • In the initial phase
  • hackers carry out the investigation and
    examination of the websites
  • Next move would be to slip an exploit into these
    sites
  • The exploit abuses the vulnerabilities of the
    systems, when the employees visit these sites

6
Few Risks Conclusion
  • From the governmental organizations,
  • The governmental agencies come directly to the
    cloud, where it is transparent. Then, they move
    to the cloud service provider and detach the
    organization's link.
  • Conclusion
  • Cloud must be encrypted and you only must have
    access to the encryption keys.
  • So that even the governmental agencies will not
    be able to enter your cloud.
  • In order to prevent water hole attacks, it is
    recommended protecting the vulnerability by
    updating and patching all software frequently to
    restrict potential access points.

7
Conclusions
  • The way your cloud's architecture is designed is
    crucial.
  • Advisable to opt for cloud security solutions
    that adhere to regulations, such as PCI DSS, EU
    data protection laws, HIPAA, etc.
  • Your organization has to bear the responsibility
    for breaches.
  • While the cloud vendor secures the basic
    infrastructure, it is up to you to protect the
    security of all data you have hosted on the
    cloud.
  • If you use split-key encryption technologies,
    your organization should ensure that only your
    users have control over the data, which includes
    all your apps.

8
Thanks!!!
  • Presentation by
  • Ravi Namboori
  • Visit us _at_ http//ravinamboori.net
Write a Comment
User Comments (0)
About PowerShow.com