Your SlideShare is downloading. ×
0
public cloud security via ids
public cloud security via ids
public cloud security via ids
public cloud security via ids
public cloud security via ids
public cloud security via ids
public cloud security via ids
public cloud security via ids
public cloud security via ids
public cloud security via ids
public cloud security via ids
public cloud security via ids
Upcoming SlideShare
Loading in...5
×

Thanks for flagging this SlideShare!

Oops! An error has occurred.

×
Saving this for later? Get the SlideShare app to save on your phone or tablet. Read anywhere, anytime – even offline.
Text the download link to your phone
Standard text messaging rates apply

public cloud security via ids

209

Published on

0 Comments
0 Likes
Statistics
Notes
  • Be the first to comment

  • Be the first to like this

No Downloads
Views
Total Views
209
On Slideshare
0
From Embeds
0
Number of Embeds
0
Actions
Shares
0
Downloads
4
Comments
0
Likes
0
Embeds 0
No embeds

Report content
Flagged as inappropriate Flag as inappropriate
Flag as inappropriate

Select your reason for flagging this presentation as inappropriate.

Cancel
No notes for slide

Transcript

  • 1. DefinitionBenefits of using public cloud
  • 2.  Identity management Physical and personnel security Availability Application security
  • 3.  Highly fragmented market Lack of sufficient standards Data lock-in Security threats Service outedges
  • 4.  1. Select the Right Apps for the Public Cloud. 2. Evaluate and Add Security, If Necessary 3. Identify and Use the Right Third-Party Auditing Services 4. Add Authentication Layers 5. Consider How Additional Security Will Affect Integration 6.IDS
  • 5.  Definition An IDS is a software or hardware based system that monitors network traffic and monitors for suspicious activity and alerts the system or network administrator Types1. Host-Based Intrusion Detection system (HIDS)2. Network-Based Intrusion Detection system (NIDS)
  • 6.  Signature Alerts Logs FalseAlarms Sensor
  • 7.  Snort is an example of an IDS Snort is a very flexible network IDS that has a large set of preconfigured rules. It also allows you to write your own rule set Functions:1. It can serve as a packet sniffer2. It can work as a packet logger3. It can work as a NIDS 10
  • 8.  Run unattended for extended periods of time Stay active and secure Recognize unusual activity Operate without unduly affecting the system’s activity Configurable 11

×