SlideShare a Scribd company logo
1 of 66
Download to read offline
Security in Cloud Computing & Virtualization
LRP BASED ON
Speeches & Workshops
attended
Computer Society of
India
Institution of
Engineers
White Papers
& Friends
Institute of
Electronics &
Telecommunications
Engineers
If you can't explain it simply……
….you have not UNDERSTOOD it well enough
Basic
Introduction
Types &
Applications
SECURITY
Conclude
20 – 25 Min drive
CLOUD COMPUTING
• Offers Computing as a Service
• Provisions service in a timely on demand manner
VIRTUALISATION
• Provisions running multiple OS on a single Physical
System and share underlying hardware resources
Traditional Server
speed
performa
nce
Security in Virtualisation & Cloud Computing
slow
efficiency
Purana
zamana?
APPLN
OS STORAGE
HW PLATFORM
APPLN
OS STORAGE
HW PLATFORM
APPLN
OS STORAGE
HW PLATFORM
APPLN
OS STORAGE
HW PLATFORM
EMAIL
WINDOWS
EXCHANGE
WEB SERVER
WINDOWS IIS
APP SERVER
LINUX
GLASSFISH
DB SERVER
LINUX
MYSQL
APPLN
OS STORAGE
HW PLATFORM
APPLN
OS STORAGE
HW PLATFORM
APPLN
OS STORAGE
HW PLATFORM
APPLN
OS STORAGE
HW PLATFORM
EMAIL
WINDOWS
EXCHANGE
WEB SERVER
WINDOWS IIS
APP SERVER
LINUX
GLASSFISH
DB SERVER
LINUX
MYSQL
SYSTEM ADMINISTRATORS
• Servers taken as a whole unit that incl Hardware, the
OS,the Storage and the Applications
SERVERS
• Often referred to by their functions ie the Exchange
server, the SQL Server or the File Server etc.
OVERTAXED?
• If any of the servers is overtaxed,then the System
Administrator must add in a new server.
MULTIPLE SERVERS
• Unless there are multiple servers,if a service
experiences a HW failure, then the service is down.
CLUSTERING ?
• Clustering can be implemented to make them more
fault tolerant. However, even clusters have limits on
their scalability and not all applications work in a
clustered environment.
-Easy to Conceptualize
- Fairly easy to deploy
-Easy to backup
-Virtually any appln /
service can be run from
this type of setup
-Under utilized HW
-Vulnerable to HW
outrages
-Not Very scalable
-Difficult to replicate
-Redundancy issues
-Expensive
Virtual servers seek to encapsulate the
server software away from hardware
Servers end up as mere files stored on a
physical box
Can be serviced by one/more hosts & one
host may house one/more virtual servers
If built correctly,not affected by the loss of
host
Host may be removed and introduced at
will to accommodate maint
-Resource Pooling
- Highly reduntant
-High Avail
-Rapid and easy dply
-Reconfigurable
-Optimisation
-Harder to conceptualise
-Slightly costly
Offerings from many companies
Hardware Support
Fits well with the move to 64 bit
Virtualization is now a well established
technology
Platform Virtualization
Desktop Virtualization
Network Virtualization
Storage Virtualization
Resource Virtualization
No need to own the Hardware
Rent as needed
Option of Public Cloud
Can go for a Private Cloud
Types of Cloud Models
Private
Public
Security in Virtualisation & Cloud Computing
Hybrid
Based on the standard cloud computing model
Service provider makes resources, such as applications and
storage, available over the Internet
Services may be free or offered on a pay-per-usage model
Limited service providers like Microsoft, Google etc own all
Infrastructure at their Data Center and the access allowed
through Internet mode only
Cloud infrastructure operated solely for a single organization
Users "still have to buy, build, and manage them"
Designed to offer the same features and benefits of cloud
systems
Removes a number of objections to the cloud computing
model including control over enterprise and customer data,
worries about security
• Setup with a Credit Card
Various Providers let u create Virtual
Servers
• Choose the OS
• Choose the Software
• Instant start/Instant Close
U can create a Virtual Server
U Get the Bill
• Many systems have variable
demands
• Web sites at peak Hours
Cost Control
• No need to buy HW
Reduce Risk
• Business Expansion
• Business change
Scalability@Business Agility
• Scaling Back =Scaling Up
Elasticity
Stick to Business
Y should TOI worry about IT
Avoid getting into NW Problems &
issues
Deployment Models
IaaS
SaaS
Security in Virtualisation & Cloud Computing
PaaS
CaaS
MaaS
Communication as a Service
Infrastructure as a Service
Monitoring as a Service
Platform as a Service
Software as a Service
Crime Ware as a Service
IT as a Service
Many cloud deployments are build on
virtualised platforms
However it is not a requirement
Some SaaS dply are not virtualised
Virtualization is not a requirement of cloud computing, its ability to
efficiently share resources makes it an excellent foundation.
Hypervisor, also called Virtual Machine
Manager (VMM)
One of many hardware
virtualization techniques allowing
Multiple Operating Systems
Conceptually one level higher than a
Supervisory program
Manages the execution of the guest
operating systems
Used to describe the interface provided by
the specific cloud computing functionality
infrastructure as a service (IaaS)
100% SECURITY IS A MYTH COL S K KAPOOR
…..Off course our answer sheets also came out to be myth
Crime as a Service (CaaS) is just like Software as a
Service (SaaS)
……………but instead of offering legal and helpful services though the Internet,
criminal syndicates are offering illegal and detrimental services
…such as infecting large quantities of
computers, sending spam and even launching
direct denial of service (DDoS) attacks
Infrastructure As (Crime) Service or Iaa(C)S, in which the criminals offer malicious services
(or infrastructures) to attack specified targets, services may include complex “traditional”
infrastructures such as botnets
….but also “innovative” large scale fashioned services such as DDoS or also sharper
services such as password cracking. Try to surf the web and you will discover how easy it is
to purchase such a criminal kind of services.
Security in the Cloud – Dealing with AAS
HOLES
Software As a (Crime) Service or Saa(C)S, in which the criminals offer malicious
software (and the needed support) as a service.
An example? The latest Zeus Variant dubbed Citadel provides the purchaser
with help desk and even a dedicated Social Network
Loose Control Over Assets
Trust ur data to Cloud Service Provider?
Loose control over Physical Security
In a Public Cloud u share with others!!!!
No knowledge of what runs where?
Sticky Services!!!!@incompatibility
Control over Encryption/Decryption Keys
No Stds yet!!!@OCC is there working
Internally developed Code in cloud?
Loose control over Physical Security
Msn critical applications in public cloud?
Audit Logs accessible to service provider
PCI DSS
Constant up gradation!!!
Payment Card Industry Data Security Standard
Data Residency in SaaS
Banking data to reside within country!!
Citizen data not on shared servers
Easier for attackers!!!
Double edged- Cloud & Virtualization
Patch Maintenance
Bharosa & Trust
Privileged User Access
• Inquire about who has spl access to data
• Who are the administrators and how r they hired?
Regulatory Compliance
• Is vendor willing to undergo external audits
• Security classification?
Data Location
• Does the provider allow any control over loc of data
Data Segregation
• Encryption policy, schemes and design
Recovery
• What happens in case of disaster
• Restoration Policies and Business Continuity Plans
Investigative Support
• Vendor’s ability to investigate any inappropriate or illegal activity ?
Long term Viability
• What happens if company goes out of Business?
• Risk Management
Security Monitoring and IR
• Notification of Sec Vulnerabilities
• IR Teams?
Data in Transit
Data at Rest
Data in Processing
Data Lineage@mapping
Data Remanence
Few Cases.....u should know
AWS
Google
Docs
Security in Virtualisation & Cloud Computing
Cevin
Internet Assigned Numbers Authority & RIR
Stealing keys to access and manage hosts
Attacking unpatched,vulnerable services
Hijacking accounts with weak pwds
Weak Firewalls
Deploying Trojans
Langot’s@Microsoft, Windriver
CSI
IETE
Institution of Engineers,Kolkatta

More Related Content

What's hot

Chap 5 software as a service (saass)
Chap 5 software as a service (saass)Chap 5 software as a service (saass)
Chap 5 software as a service (saass)Raj Sarode
 
Sukumar Nayak-Agile-DevOps-Cloud Management
Sukumar Nayak-Agile-DevOps-Cloud ManagementSukumar Nayak-Agile-DevOps-Cloud Management
Sukumar Nayak-Agile-DevOps-Cloud ManagementSukumar Nayak
 
Cloud Computing An introduction
Cloud Computing An introductionCloud Computing An introduction
Cloud Computing An introductionSanjay Sharma
 
Cloud security design considerations
Cloud security design considerationsCloud security design considerations
Cloud security design considerationsMike Kavis
 
Cloud Computing and Its Service Models
Cloud Computing and Its Service Models Cloud Computing and Its Service Models
Cloud Computing and Its Service Models Tyrone Systems
 
Cloud Computing Fundamentals
Cloud Computing FundamentalsCloud Computing Fundamentals
Cloud Computing FundamentalsSonia Nagpal
 
Top challenges in cloud computing
Top challenges in cloud computingTop challenges in cloud computing
Top challenges in cloud computingTISEE
 
Cloud computing and service models
Cloud computing and service modelsCloud computing and service models
Cloud computing and service modelsPrateek Soni
 
What are cloud service models
What are cloud service modelsWhat are cloud service models
What are cloud service modelsLivin Jose
 
Introduction to Cloud Computing
Introduction to Cloud ComputingIntroduction to Cloud Computing
Introduction to Cloud ComputingSiva Arunachalam
 
SaaS Challenges & Security Concerns
SaaS Challenges & Security ConcernsSaaS Challenges & Security Concerns
SaaS Challenges & Security ConcernsKannan Subbiah
 
Cloud computing
Cloud computing Cloud computing
Cloud computing ananyaakk
 
Lecture 2 introduction to cloud computing
Lecture 2   introduction to cloud computingLecture 2   introduction to cloud computing
Lecture 2 introduction to cloud computingdralaa7
 
Market oriented Cloud Computing
Market oriented Cloud ComputingMarket oriented Cloud Computing
Market oriented Cloud ComputingJithin Parakka
 
AWS Cloud Use Cases - Ezhil Arasan Babaraj, CSS Corp
AWS Cloud Use Cases - Ezhil Arasan Babaraj, CSS CorpAWS Cloud Use Cases - Ezhil Arasan Babaraj, CSS Corp
AWS Cloud Use Cases - Ezhil Arasan Babaraj, CSS CorpAmazon Web Services
 
Virtualization security threats in cloud computing
Virtualization security threats in cloud computingVirtualization security threats in cloud computing
Virtualization security threats in cloud computingNitish Awasthi (anitish_225)
 

What's hot (20)

Chap 5 software as a service (saass)
Chap 5 software as a service (saass)Chap 5 software as a service (saass)
Chap 5 software as a service (saass)
 
Cloud Computing Security Issues
Cloud Computing Security Issues Cloud Computing Security Issues
Cloud Computing Security Issues
 
Sukumar Nayak-Agile-DevOps-Cloud Management
Sukumar Nayak-Agile-DevOps-Cloud ManagementSukumar Nayak-Agile-DevOps-Cloud Management
Sukumar Nayak-Agile-DevOps-Cloud Management
 
Cloud Computing An introduction
Cloud Computing An introductionCloud Computing An introduction
Cloud Computing An introduction
 
Cloud security design considerations
Cloud security design considerationsCloud security design considerations
Cloud security design considerations
 
Cloud Computing and Its Service Models
Cloud Computing and Its Service Models Cloud Computing and Its Service Models
Cloud Computing and Its Service Models
 
Cloud Computing Fundamentals
Cloud Computing FundamentalsCloud Computing Fundamentals
Cloud Computing Fundamentals
 
Top challenges in cloud computing
Top challenges in cloud computingTop challenges in cloud computing
Top challenges in cloud computing
 
Cloud computing by Bhavesh
Cloud computing by BhaveshCloud computing by Bhavesh
Cloud computing by Bhavesh
 
Cloud computing and service models
Cloud computing and service modelsCloud computing and service models
Cloud computing and service models
 
Cloud Computing
Cloud ComputingCloud Computing
Cloud Computing
 
What are cloud service models
What are cloud service modelsWhat are cloud service models
What are cloud service models
 
Introduction to Cloud Computing
Introduction to Cloud ComputingIntroduction to Cloud Computing
Introduction to Cloud Computing
 
SaaS Challenges & Security Concerns
SaaS Challenges & Security ConcernsSaaS Challenges & Security Concerns
SaaS Challenges & Security Concerns
 
Cloud computing
Cloud computing Cloud computing
Cloud computing
 
Cloud security ppt
Cloud security pptCloud security ppt
Cloud security ppt
 
Lecture 2 introduction to cloud computing
Lecture 2   introduction to cloud computingLecture 2   introduction to cloud computing
Lecture 2 introduction to cloud computing
 
Market oriented Cloud Computing
Market oriented Cloud ComputingMarket oriented Cloud Computing
Market oriented Cloud Computing
 
AWS Cloud Use Cases - Ezhil Arasan Babaraj, CSS Corp
AWS Cloud Use Cases - Ezhil Arasan Babaraj, CSS CorpAWS Cloud Use Cases - Ezhil Arasan Babaraj, CSS Corp
AWS Cloud Use Cases - Ezhil Arasan Babaraj, CSS Corp
 
Virtualization security threats in cloud computing
Virtualization security threats in cloud computingVirtualization security threats in cloud computing
Virtualization security threats in cloud computing
 

Viewers also liked

Cloud Provisioning: The SDKs Under the Hood
Cloud Provisioning: The SDKs Under the HoodCloud Provisioning: The SDKs Under the Hood
Cloud Provisioning: The SDKs Under the HoodEverett Toews
 
Resource provisioning optimization in cloud computing
Resource provisioning optimization in cloud computingResource provisioning optimization in cloud computing
Resource provisioning optimization in cloud computingMasoumeh_tajvidi
 
Psdot 1 optimization of resource provisioning cost in cloud computing
Psdot 1 optimization of resource provisioning cost in cloud computingPsdot 1 optimization of resource provisioning cost in cloud computing
Psdot 1 optimization of resource provisioning cost in cloud computingZTech Proje
 
Virtualization and Cloud Computing
Virtualization and Cloud ComputingVirtualization and Cloud Computing
Virtualization and Cloud ComputingJosh Folgado
 
Cloud computing
Cloud computingCloud computing
Cloud computingJeroen
 
Virtualization and cloud Computing
Virtualization and cloud ComputingVirtualization and cloud Computing
Virtualization and cloud ComputingRishikese MR
 
Slides cloud computing
Slides cloud computingSlides cloud computing
Slides cloud computingHaslina
 

Viewers also liked (8)

Cloud Provisioning: The SDKs Under the Hood
Cloud Provisioning: The SDKs Under the HoodCloud Provisioning: The SDKs Under the Hood
Cloud Provisioning: The SDKs Under the Hood
 
Resource provisioning optimization in cloud computing
Resource provisioning optimization in cloud computingResource provisioning optimization in cloud computing
Resource provisioning optimization in cloud computing
 
Psdot 1 optimization of resource provisioning cost in cloud computing
Psdot 1 optimization of resource provisioning cost in cloud computingPsdot 1 optimization of resource provisioning cost in cloud computing
Psdot 1 optimization of resource provisioning cost in cloud computing
 
Virtualization and Cloud Computing
Virtualization and Cloud ComputingVirtualization and Cloud Computing
Virtualization and Cloud Computing
 
Cloud computing
Cloud computingCloud computing
Cloud computing
 
Cloud Deployments Models
Cloud Deployments ModelsCloud Deployments Models
Cloud Deployments Models
 
Virtualization and cloud Computing
Virtualization and cloud ComputingVirtualization and cloud Computing
Virtualization and cloud Computing
 
Slides cloud computing
Slides cloud computingSlides cloud computing
Slides cloud computing
 

Similar to Cloud Computing and Virtualisation

Basic Overview Of Cloud Computing
Basic Overview Of Cloud ComputingBasic Overview Of Cloud Computing
Basic Overview Of Cloud ComputingGAURAV SINHA
 
cloudcomputing-171004085746.pdf
cloudcomputing-171004085746.pdfcloudcomputing-171004085746.pdf
cloudcomputing-171004085746.pdfPalviGupta12
 
Cloud computing
Cloud computingCloud computing
Cloud computingcompherals
 
cloudcomputingsimpleppt-141114085742-conversion-gate01.ppt
cloudcomputingsimpleppt-141114085742-conversion-gate01.pptcloudcomputingsimpleppt-141114085742-conversion-gate01.ppt
cloudcomputingsimpleppt-141114085742-conversion-gate01.pptHifzaZafar2
 
Presentation on cloud computing
Presentation on cloud computingPresentation on cloud computing
Presentation on cloud computingBIJIT GHOSH
 
Cloud computing services by cloudsyntrix
Cloud computing  services by cloudsyntrixCloud computing  services by cloudsyntrix
Cloud computing services by cloudsyntrixCloudSyntrix
 
Cloudcomputingsimpleppt 141114085742-conversion-gate01 (1)
Cloudcomputingsimpleppt 141114085742-conversion-gate01 (1)Cloudcomputingsimpleppt 141114085742-conversion-gate01 (1)
Cloudcomputingsimpleppt 141114085742-conversion-gate01 (1)MukeshKrActivelylook
 
Cloud computing simple ppt
Cloud computing simple pptCloud computing simple ppt
Cloud computing simple pptAgarwaljay
 
cloudcomputingsimpleppt-141114085742-conversion-gate01
cloudcomputingsimpleppt-141114085742-conversion-gate01cloudcomputingsimpleppt-141114085742-conversion-gate01
cloudcomputingsimpleppt-141114085742-conversion-gate01Mudassir Farman
 
presentation_introduction_to_cloud_computing_1565085358_46246.pptx
presentation_introduction_to_cloud_computing_1565085358_46246.pptxpresentation_introduction_to_cloud_computing_1565085358_46246.pptx
presentation_introduction_to_cloud_computing_1565085358_46246.pptxSimmyNayak
 
cloudcomputingsimpleppt-141114085742-conversion-gate01.pptx
cloudcomputingsimpleppt-141114085742-conversion-gate01.pptxcloudcomputingsimpleppt-141114085742-conversion-gate01.pptx
cloudcomputingsimpleppt-141114085742-conversion-gate01.pptxODINARARCH
 
A Complete Guide Cloud Computing
A Complete Guide Cloud ComputingA Complete Guide Cloud Computing
A Complete Guide Cloud ComputingSripati Mahapatra
 
Cloud Computing for college presenation project.
Cloud Computing for college presenation project.Cloud Computing for college presenation project.
Cloud Computing for college presenation project.Mahesh Tibrewal
 

Similar to Cloud Computing and Virtualisation (20)

Basic Overview Of Cloud Computing
Basic Overview Of Cloud ComputingBasic Overview Of Cloud Computing
Basic Overview Of Cloud Computing
 
Introduction Of Cloud Computing
Introduction Of Cloud Computing Introduction Of Cloud Computing
Introduction Of Cloud Computing
 
Cloud Computing
 Cloud Computing Cloud Computing
Cloud Computing
 
cloudcomputing-171004085746.pdf
cloudcomputing-171004085746.pdfcloudcomputing-171004085746.pdf
cloudcomputing-171004085746.pdf
 
Cloud computing
Cloud computingCloud computing
Cloud computing
 
cloudcomputingsimpleppt-141114085742-conversion-gate01.ppt
cloudcomputingsimpleppt-141114085742-conversion-gate01.pptcloudcomputingsimpleppt-141114085742-conversion-gate01.ppt
cloudcomputingsimpleppt-141114085742-conversion-gate01.ppt
 
Cloud Computing
Cloud ComputingCloud Computing
Cloud Computing
 
Presentation on cloud computing
Presentation on cloud computingPresentation on cloud computing
Presentation on cloud computing
 
Cloud computing services by cloudsyntrix
Cloud computing  services by cloudsyntrixCloud computing  services by cloudsyntrix
Cloud computing services by cloudsyntrix
 
Cloudcomputingsimpleppt 141114085742-conversion-gate01 (1)
Cloudcomputingsimpleppt 141114085742-conversion-gate01 (1)Cloudcomputingsimpleppt 141114085742-conversion-gate01 (1)
Cloudcomputingsimpleppt 141114085742-conversion-gate01 (1)
 
Cloud computing simple ppt
Cloud computing simple pptCloud computing simple ppt
Cloud computing simple ppt
 
cloudcomputingsimpleppt-141114085742-conversion-gate01
cloudcomputingsimpleppt-141114085742-conversion-gate01cloudcomputingsimpleppt-141114085742-conversion-gate01
cloudcomputingsimpleppt-141114085742-conversion-gate01
 
Cloud computing
Cloud computingCloud computing
Cloud computing
 
presentation_introduction_to_cloud_computing_1565085358_46246.pptx
presentation_introduction_to_cloud_computing_1565085358_46246.pptxpresentation_introduction_to_cloud_computing_1565085358_46246.pptx
presentation_introduction_to_cloud_computing_1565085358_46246.pptx
 
Introduction to cloud computing
Introduction to cloud computingIntroduction to cloud computing
Introduction to cloud computing
 
cloudcomputingsimpleppt-141114085742-conversion-gate01.pptx
cloudcomputingsimpleppt-141114085742-conversion-gate01.pptxcloudcomputingsimpleppt-141114085742-conversion-gate01.pptx
cloudcomputingsimpleppt-141114085742-conversion-gate01.pptx
 
cloud computing
cloud computingcloud computing
cloud computing
 
A Complete Guide Cloud Computing
A Complete Guide Cloud ComputingA Complete Guide Cloud Computing
A Complete Guide Cloud Computing
 
Cloud Computing for college presenation project.
Cloud Computing for college presenation project.Cloud Computing for college presenation project.
Cloud Computing for college presenation project.
 
UNIT - I.docx
UNIT - I.docxUNIT - I.docx
UNIT - I.docx
 

More from anupriti

TALLINN MANUAL & GLOBAL CYBER WARFARE POLICIES
TALLINN MANUAL & GLOBAL CYBER WARFARE POLICIESTALLINN MANUAL & GLOBAL CYBER WARFARE POLICIES
TALLINN MANUAL & GLOBAL CYBER WARFARE POLICIESanupriti
 
Cyber Security : An attempt to assimilate and technically understand it
Cyber Security : An attempt to assimilate and technically understand itCyber Security : An attempt to assimilate and technically understand it
Cyber Security : An attempt to assimilate and technically understand itanupriti
 
IETE mid-term symposium on digital forensics and information security : 23 M...
 IETE mid-term symposium on digital forensics and information security : 23 M... IETE mid-term symposium on digital forensics and information security : 23 M...
IETE mid-term symposium on digital forensics and information security : 23 M...anupriti
 
Coalition of IoT and Blockchain: Rewards and Challenges
Coalition of IoT and Blockchain: Rewards and ChallengesCoalition of IoT and Blockchain: Rewards and Challenges
Coalition of IoT and Blockchain: Rewards and Challengesanupriti
 
Proof of Work and connect with BYZANTINE Generals
Proof of Work and connect with BYZANTINE GeneralsProof of Work and connect with BYZANTINE Generals
Proof of Work and connect with BYZANTINE Generalsanupriti
 
BLOCKCHAIN ,BITCOIN & CRYPTOCURRENCIES WORLD : MECHANICS AND CYBER CRIME
BLOCKCHAIN ,BITCOIN & CRYPTOCURRENCIES WORLD : MECHANICS AND CYBER CRIMEBLOCKCHAIN ,BITCOIN & CRYPTOCURRENCIES WORLD : MECHANICS AND CYBER CRIME
BLOCKCHAIN ,BITCOIN & CRYPTOCURRENCIES WORLD : MECHANICS AND CYBER CRIMEanupriti
 
Symposium on Legal Regulation of Bitcoin, Blockchain & Cryptocurrencies
Symposium on Legal Regulation of Bitcoin, Blockchain & Cryptocurrencies Symposium on Legal Regulation of Bitcoin, Blockchain & Cryptocurrencies
Symposium on Legal Regulation of Bitcoin, Blockchain & Cryptocurrencies anupriti
 
BITCOIN FORENSICS : Bsides Delhi Conference
BITCOIN FORENSICS : Bsides Delhi ConferenceBITCOIN FORENSICS : Bsides Delhi Conference
BITCOIN FORENSICS : Bsides Delhi Conferenceanupriti
 
Hashgraph : An over view with example
Hashgraph : An over view with exampleHashgraph : An over view with example
Hashgraph : An over view with exampleanupriti
 
BITCOIN FORENSICS : HAKON-2017 CONFERENCE
BITCOIN FORENSICS : HAKON-2017 CONFERENCEBITCOIN FORENSICS : HAKON-2017 CONFERENCE
BITCOIN FORENSICS : HAKON-2017 CONFERENCEanupriti
 
Webinar on BITCOIN FORENSICS : BRIGHTTALK
Webinar on BITCOIN FORENSICS : BRIGHTTALKWebinar on BITCOIN FORENSICS : BRIGHTTALK
Webinar on BITCOIN FORENSICS : BRIGHTTALKanupriti
 
Bitcoin Forensics
Bitcoin ForensicsBitcoin Forensics
Bitcoin Forensicsanupriti
 
Blockchain and Bitcoin : A Technical Overview
Blockchain and Bitcoin : A Technical OverviewBlockchain and Bitcoin : A Technical Overview
Blockchain and Bitcoin : A Technical Overviewanupriti
 
Equation Group : Advanced Secretive Computer Espionage Group
Equation Group : Advanced Secretive Computer Espionage GroupEquation Group : Advanced Secretive Computer Espionage Group
Equation Group : Advanced Secretive Computer Espionage Groupanupriti
 
Quanity your Web Safety Score
Quanity your Web Safety ScoreQuanity your Web Safety Score
Quanity your Web Safety Scoreanupriti
 
Android Device Hardening
Android Device HardeningAndroid Device Hardening
Android Device Hardeninganupriti
 
Harden your LinkedIn Settings : A Necessity Now
Harden your LinkedIn Settings : A Necessity NowHarden your LinkedIn Settings : A Necessity Now
Harden your LinkedIn Settings : A Necessity Nowanupriti
 
APT 28 :Cyber Espionage and the Russian Government?
APT 28 :Cyber Espionage and the Russian Government?APT 28 :Cyber Espionage and the Russian Government?
APT 28 :Cyber Espionage and the Russian Government?anupriti
 
Wirelurker
WirelurkerWirelurker
Wirelurkeranupriti
 

More from anupriti (20)

TALLINN MANUAL & GLOBAL CYBER WARFARE POLICIES
TALLINN MANUAL & GLOBAL CYBER WARFARE POLICIESTALLINN MANUAL & GLOBAL CYBER WARFARE POLICIES
TALLINN MANUAL & GLOBAL CYBER WARFARE POLICIES
 
Cyber Security : An attempt to assimilate and technically understand it
Cyber Security : An attempt to assimilate and technically understand itCyber Security : An attempt to assimilate and technically understand it
Cyber Security : An attempt to assimilate and technically understand it
 
IETE mid-term symposium on digital forensics and information security : 23 M...
 IETE mid-term symposium on digital forensics and information security : 23 M... IETE mid-term symposium on digital forensics and information security : 23 M...
IETE mid-term symposium on digital forensics and information security : 23 M...
 
Coalition of IoT and Blockchain: Rewards and Challenges
Coalition of IoT and Blockchain: Rewards and ChallengesCoalition of IoT and Blockchain: Rewards and Challenges
Coalition of IoT and Blockchain: Rewards and Challenges
 
Proof of Work and connect with BYZANTINE Generals
Proof of Work and connect with BYZANTINE GeneralsProof of Work and connect with BYZANTINE Generals
Proof of Work and connect with BYZANTINE Generals
 
BLOCKCHAIN ,BITCOIN & CRYPTOCURRENCIES WORLD : MECHANICS AND CYBER CRIME
BLOCKCHAIN ,BITCOIN & CRYPTOCURRENCIES WORLD : MECHANICS AND CYBER CRIMEBLOCKCHAIN ,BITCOIN & CRYPTOCURRENCIES WORLD : MECHANICS AND CYBER CRIME
BLOCKCHAIN ,BITCOIN & CRYPTOCURRENCIES WORLD : MECHANICS AND CYBER CRIME
 
Symposium on Legal Regulation of Bitcoin, Blockchain & Cryptocurrencies
Symposium on Legal Regulation of Bitcoin, Blockchain & Cryptocurrencies Symposium on Legal Regulation of Bitcoin, Blockchain & Cryptocurrencies
Symposium on Legal Regulation of Bitcoin, Blockchain & Cryptocurrencies
 
BITCOIN FORENSICS : Bsides Delhi Conference
BITCOIN FORENSICS : Bsides Delhi ConferenceBITCOIN FORENSICS : Bsides Delhi Conference
BITCOIN FORENSICS : Bsides Delhi Conference
 
Hashgraph : An over view with example
Hashgraph : An over view with exampleHashgraph : An over view with example
Hashgraph : An over view with example
 
BITCOIN FORENSICS : HAKON-2017 CONFERENCE
BITCOIN FORENSICS : HAKON-2017 CONFERENCEBITCOIN FORENSICS : HAKON-2017 CONFERENCE
BITCOIN FORENSICS : HAKON-2017 CONFERENCE
 
Webinar on BITCOIN FORENSICS : BRIGHTTALK
Webinar on BITCOIN FORENSICS : BRIGHTTALKWebinar on BITCOIN FORENSICS : BRIGHTTALK
Webinar on BITCOIN FORENSICS : BRIGHTTALK
 
Bitcoin Forensics
Bitcoin ForensicsBitcoin Forensics
Bitcoin Forensics
 
Blockchain and Bitcoin : A Technical Overview
Blockchain and Bitcoin : A Technical OverviewBlockchain and Bitcoin : A Technical Overview
Blockchain and Bitcoin : A Technical Overview
 
Equation Group : Advanced Secretive Computer Espionage Group
Equation Group : Advanced Secretive Computer Espionage GroupEquation Group : Advanced Secretive Computer Espionage Group
Equation Group : Advanced Secretive Computer Espionage Group
 
Quanity your Web Safety Score
Quanity your Web Safety ScoreQuanity your Web Safety Score
Quanity your Web Safety Score
 
Android Device Hardening
Android Device HardeningAndroid Device Hardening
Android Device Hardening
 
Harden your LinkedIn Settings : A Necessity Now
Harden your LinkedIn Settings : A Necessity NowHarden your LinkedIn Settings : A Necessity Now
Harden your LinkedIn Settings : A Necessity Now
 
APT 28 :Cyber Espionage and the Russian Government?
APT 28 :Cyber Espionage and the Russian Government?APT 28 :Cyber Espionage and the Russian Government?
APT 28 :Cyber Espionage and the Russian Government?
 
Regin
ReginRegin
Regin
 
Wirelurker
WirelurkerWirelurker
Wirelurker
 

Recently uploaded

A Domino Admins Adventures (Engage 2024)
A Domino Admins Adventures (Engage 2024)A Domino Admins Adventures (Engage 2024)
A Domino Admins Adventures (Engage 2024)Gabriella Davis
 
Mastering MySQL Database Architecture: Deep Dive into MySQL Shell and MySQL R...
Mastering MySQL Database Architecture: Deep Dive into MySQL Shell and MySQL R...Mastering MySQL Database Architecture: Deep Dive into MySQL Shell and MySQL R...
Mastering MySQL Database Architecture: Deep Dive into MySQL Shell and MySQL R...Miguel Araújo
 
How to Troubleshoot Apps for the Modern Connected Worker
How to Troubleshoot Apps for the Modern Connected WorkerHow to Troubleshoot Apps for the Modern Connected Worker
How to Troubleshoot Apps for the Modern Connected WorkerThousandEyes
 
[2024]Digital Global Overview Report 2024 Meltwater.pdf
[2024]Digital Global Overview Report 2024 Meltwater.pdf[2024]Digital Global Overview Report 2024 Meltwater.pdf
[2024]Digital Global Overview Report 2024 Meltwater.pdfhans926745
 
Automating Google Workspace (GWS) & more with Apps Script
Automating Google Workspace (GWS) & more with Apps ScriptAutomating Google Workspace (GWS) & more with Apps Script
Automating Google Workspace (GWS) & more with Apps Scriptwesley chun
 
Workshop - Best of Both Worlds_ Combine KG and Vector search for enhanced R...
Workshop - Best of Both Worlds_ Combine  KG and Vector search for  enhanced R...Workshop - Best of Both Worlds_ Combine  KG and Vector search for  enhanced R...
Workshop - Best of Both Worlds_ Combine KG and Vector search for enhanced R...Neo4j
 
Raspberry Pi 5: Challenges and Solutions in Bringing up an OpenGL/Vulkan Driv...
Raspberry Pi 5: Challenges and Solutions in Bringing up an OpenGL/Vulkan Driv...Raspberry Pi 5: Challenges and Solutions in Bringing up an OpenGL/Vulkan Driv...
Raspberry Pi 5: Challenges and Solutions in Bringing up an OpenGL/Vulkan Driv...Igalia
 
EIS-Webinar-Prompt-Knowledge-Eng-2024-04-08.pptx
EIS-Webinar-Prompt-Knowledge-Eng-2024-04-08.pptxEIS-Webinar-Prompt-Knowledge-Eng-2024-04-08.pptx
EIS-Webinar-Prompt-Knowledge-Eng-2024-04-08.pptxEarley Information Science
 
Salesforce Community Group Quito, Salesforce 101
Salesforce Community Group Quito, Salesforce 101Salesforce Community Group Quito, Salesforce 101
Salesforce Community Group Quito, Salesforce 101Paola De la Torre
 
Breaking the Kubernetes Kill Chain: Host Path Mount
Breaking the Kubernetes Kill Chain: Host Path MountBreaking the Kubernetes Kill Chain: Host Path Mount
Breaking the Kubernetes Kill Chain: Host Path MountPuma Security, LLC
 
CNv6 Instructor Chapter 6 Quality of Service
CNv6 Instructor Chapter 6 Quality of ServiceCNv6 Instructor Chapter 6 Quality of Service
CNv6 Instructor Chapter 6 Quality of Servicegiselly40
 
Finology Group – Insurtech Innovation Award 2024
Finology Group – Insurtech Innovation Award 2024Finology Group – Insurtech Innovation Award 2024
Finology Group – Insurtech Innovation Award 2024The Digital Insurer
 
Histor y of HAM Radio presentation slide
Histor y of HAM Radio presentation slideHistor y of HAM Radio presentation slide
Histor y of HAM Radio presentation slidevu2urc
 
Axa Assurance Maroc - Insurer Innovation Award 2024
Axa Assurance Maroc - Insurer Innovation Award 2024Axa Assurance Maroc - Insurer Innovation Award 2024
Axa Assurance Maroc - Insurer Innovation Award 2024The Digital Insurer
 
The Codex of Business Writing Software for Real-World Solutions 2.pptx
The Codex of Business Writing Software for Real-World Solutions 2.pptxThe Codex of Business Writing Software for Real-World Solutions 2.pptx
The Codex of Business Writing Software for Real-World Solutions 2.pptxMalak Abu Hammad
 
Strategies for Unlocking Knowledge Management in Microsoft 365 in the Copilot...
Strategies for Unlocking Knowledge Management in Microsoft 365 in the Copilot...Strategies for Unlocking Knowledge Management in Microsoft 365 in the Copilot...
Strategies for Unlocking Knowledge Management in Microsoft 365 in the Copilot...Drew Madelung
 
Injustice - Developers Among Us (SciFiDevCon 2024)
Injustice - Developers Among Us (SciFiDevCon 2024)Injustice - Developers Among Us (SciFiDevCon 2024)
Injustice - Developers Among Us (SciFiDevCon 2024)Allon Mureinik
 
08448380779 Call Girls In Friends Colony Women Seeking Men
08448380779 Call Girls In Friends Colony Women Seeking Men08448380779 Call Girls In Friends Colony Women Seeking Men
08448380779 Call Girls In Friends Colony Women Seeking MenDelhi Call girls
 
Presentation on how to chat with PDF using ChatGPT code interpreter
Presentation on how to chat with PDF using ChatGPT code interpreterPresentation on how to chat with PDF using ChatGPT code interpreter
Presentation on how to chat with PDF using ChatGPT code interpreternaman860154
 
The Role of Taxonomy and Ontology in Semantic Layers - Heather Hedden.pdf
The Role of Taxonomy and Ontology in Semantic Layers - Heather Hedden.pdfThe Role of Taxonomy and Ontology in Semantic Layers - Heather Hedden.pdf
The Role of Taxonomy and Ontology in Semantic Layers - Heather Hedden.pdfEnterprise Knowledge
 

Recently uploaded (20)

A Domino Admins Adventures (Engage 2024)
A Domino Admins Adventures (Engage 2024)A Domino Admins Adventures (Engage 2024)
A Domino Admins Adventures (Engage 2024)
 
Mastering MySQL Database Architecture: Deep Dive into MySQL Shell and MySQL R...
Mastering MySQL Database Architecture: Deep Dive into MySQL Shell and MySQL R...Mastering MySQL Database Architecture: Deep Dive into MySQL Shell and MySQL R...
Mastering MySQL Database Architecture: Deep Dive into MySQL Shell and MySQL R...
 
How to Troubleshoot Apps for the Modern Connected Worker
How to Troubleshoot Apps for the Modern Connected WorkerHow to Troubleshoot Apps for the Modern Connected Worker
How to Troubleshoot Apps for the Modern Connected Worker
 
[2024]Digital Global Overview Report 2024 Meltwater.pdf
[2024]Digital Global Overview Report 2024 Meltwater.pdf[2024]Digital Global Overview Report 2024 Meltwater.pdf
[2024]Digital Global Overview Report 2024 Meltwater.pdf
 
Automating Google Workspace (GWS) & more with Apps Script
Automating Google Workspace (GWS) & more with Apps ScriptAutomating Google Workspace (GWS) & more with Apps Script
Automating Google Workspace (GWS) & more with Apps Script
 
Workshop - Best of Both Worlds_ Combine KG and Vector search for enhanced R...
Workshop - Best of Both Worlds_ Combine  KG and Vector search for  enhanced R...Workshop - Best of Both Worlds_ Combine  KG and Vector search for  enhanced R...
Workshop - Best of Both Worlds_ Combine KG and Vector search for enhanced R...
 
Raspberry Pi 5: Challenges and Solutions in Bringing up an OpenGL/Vulkan Driv...
Raspberry Pi 5: Challenges and Solutions in Bringing up an OpenGL/Vulkan Driv...Raspberry Pi 5: Challenges and Solutions in Bringing up an OpenGL/Vulkan Driv...
Raspberry Pi 5: Challenges and Solutions in Bringing up an OpenGL/Vulkan Driv...
 
EIS-Webinar-Prompt-Knowledge-Eng-2024-04-08.pptx
EIS-Webinar-Prompt-Knowledge-Eng-2024-04-08.pptxEIS-Webinar-Prompt-Knowledge-Eng-2024-04-08.pptx
EIS-Webinar-Prompt-Knowledge-Eng-2024-04-08.pptx
 
Salesforce Community Group Quito, Salesforce 101
Salesforce Community Group Quito, Salesforce 101Salesforce Community Group Quito, Salesforce 101
Salesforce Community Group Quito, Salesforce 101
 
Breaking the Kubernetes Kill Chain: Host Path Mount
Breaking the Kubernetes Kill Chain: Host Path MountBreaking the Kubernetes Kill Chain: Host Path Mount
Breaking the Kubernetes Kill Chain: Host Path Mount
 
CNv6 Instructor Chapter 6 Quality of Service
CNv6 Instructor Chapter 6 Quality of ServiceCNv6 Instructor Chapter 6 Quality of Service
CNv6 Instructor Chapter 6 Quality of Service
 
Finology Group – Insurtech Innovation Award 2024
Finology Group – Insurtech Innovation Award 2024Finology Group – Insurtech Innovation Award 2024
Finology Group – Insurtech Innovation Award 2024
 
Histor y of HAM Radio presentation slide
Histor y of HAM Radio presentation slideHistor y of HAM Radio presentation slide
Histor y of HAM Radio presentation slide
 
Axa Assurance Maroc - Insurer Innovation Award 2024
Axa Assurance Maroc - Insurer Innovation Award 2024Axa Assurance Maroc - Insurer Innovation Award 2024
Axa Assurance Maroc - Insurer Innovation Award 2024
 
The Codex of Business Writing Software for Real-World Solutions 2.pptx
The Codex of Business Writing Software for Real-World Solutions 2.pptxThe Codex of Business Writing Software for Real-World Solutions 2.pptx
The Codex of Business Writing Software for Real-World Solutions 2.pptx
 
Strategies for Unlocking Knowledge Management in Microsoft 365 in the Copilot...
Strategies for Unlocking Knowledge Management in Microsoft 365 in the Copilot...Strategies for Unlocking Knowledge Management in Microsoft 365 in the Copilot...
Strategies for Unlocking Knowledge Management in Microsoft 365 in the Copilot...
 
Injustice - Developers Among Us (SciFiDevCon 2024)
Injustice - Developers Among Us (SciFiDevCon 2024)Injustice - Developers Among Us (SciFiDevCon 2024)
Injustice - Developers Among Us (SciFiDevCon 2024)
 
08448380779 Call Girls In Friends Colony Women Seeking Men
08448380779 Call Girls In Friends Colony Women Seeking Men08448380779 Call Girls In Friends Colony Women Seeking Men
08448380779 Call Girls In Friends Colony Women Seeking Men
 
Presentation on how to chat with PDF using ChatGPT code interpreter
Presentation on how to chat with PDF using ChatGPT code interpreterPresentation on how to chat with PDF using ChatGPT code interpreter
Presentation on how to chat with PDF using ChatGPT code interpreter
 
The Role of Taxonomy and Ontology in Semantic Layers - Heather Hedden.pdf
The Role of Taxonomy and Ontology in Semantic Layers - Heather Hedden.pdfThe Role of Taxonomy and Ontology in Semantic Layers - Heather Hedden.pdf
The Role of Taxonomy and Ontology in Semantic Layers - Heather Hedden.pdf
 

Cloud Computing and Virtualisation

  • 1.
  • 2.
  • 3. Security in Cloud Computing & Virtualization LRP BASED ON Speeches & Workshops attended Computer Society of India Institution of Engineers White Papers & Friends Institute of Electronics & Telecommunications Engineers
  • 4. If you can't explain it simply…… ….you have not UNDERSTOOD it well enough
  • 6. CLOUD COMPUTING • Offers Computing as a Service • Provisions service in a timely on demand manner VIRTUALISATION • Provisions running multiple OS on a single Physical System and share underlying hardware resources
  • 7. Traditional Server speed performa nce Security in Virtualisation & Cloud Computing slow efficiency Purana zamana?
  • 8. APPLN OS STORAGE HW PLATFORM APPLN OS STORAGE HW PLATFORM APPLN OS STORAGE HW PLATFORM APPLN OS STORAGE HW PLATFORM EMAIL WINDOWS EXCHANGE WEB SERVER WINDOWS IIS APP SERVER LINUX GLASSFISH DB SERVER LINUX MYSQL
  • 9. APPLN OS STORAGE HW PLATFORM APPLN OS STORAGE HW PLATFORM APPLN OS STORAGE HW PLATFORM APPLN OS STORAGE HW PLATFORM EMAIL WINDOWS EXCHANGE WEB SERVER WINDOWS IIS APP SERVER LINUX GLASSFISH DB SERVER LINUX MYSQL
  • 10. SYSTEM ADMINISTRATORS • Servers taken as a whole unit that incl Hardware, the OS,the Storage and the Applications SERVERS • Often referred to by their functions ie the Exchange server, the SQL Server or the File Server etc. OVERTAXED? • If any of the servers is overtaxed,then the System Administrator must add in a new server.
  • 11. MULTIPLE SERVERS • Unless there are multiple servers,if a service experiences a HW failure, then the service is down. CLUSTERING ? • Clustering can be implemented to make them more fault tolerant. However, even clusters have limits on their scalability and not all applications work in a clustered environment.
  • 12. -Easy to Conceptualize - Fairly easy to deploy -Easy to backup -Virtually any appln / service can be run from this type of setup -Under utilized HW -Vulnerable to HW outrages -Not Very scalable -Difficult to replicate -Redundancy issues -Expensive
  • 13. Virtual servers seek to encapsulate the server software away from hardware Servers end up as mere files stored on a physical box Can be serviced by one/more hosts & one host may house one/more virtual servers If built correctly,not affected by the loss of host Host may be removed and introduced at will to accommodate maint
  • 14. -Resource Pooling - Highly reduntant -High Avail -Rapid and easy dply -Reconfigurable -Optimisation -Harder to conceptualise -Slightly costly
  • 15. Offerings from many companies Hardware Support Fits well with the move to 64 bit Virtualization is now a well established technology
  • 16. Platform Virtualization Desktop Virtualization Network Virtualization Storage Virtualization Resource Virtualization
  • 17.
  • 18.
  • 19.
  • 20.
  • 21. No need to own the Hardware Rent as needed Option of Public Cloud Can go for a Private Cloud
  • 22. Types of Cloud Models Private Public Security in Virtualisation & Cloud Computing Hybrid
  • 23.
  • 24.
  • 25. Based on the standard cloud computing model Service provider makes resources, such as applications and storage, available over the Internet Services may be free or offered on a pay-per-usage model Limited service providers like Microsoft, Google etc own all Infrastructure at their Data Center and the access allowed through Internet mode only
  • 26. Cloud infrastructure operated solely for a single organization Users "still have to buy, build, and manage them" Designed to offer the same features and benefits of cloud systems Removes a number of objections to the cloud computing model including control over enterprise and customer data, worries about security
  • 27. • Setup with a Credit Card Various Providers let u create Virtual Servers • Choose the OS • Choose the Software • Instant start/Instant Close U can create a Virtual Server U Get the Bill
  • 28.
  • 29. • Many systems have variable demands • Web sites at peak Hours Cost Control • No need to buy HW Reduce Risk
  • 30. • Business Expansion • Business change Scalability@Business Agility • Scaling Back =Scaling Up Elasticity
  • 31. Stick to Business Y should TOI worry about IT Avoid getting into NW Problems & issues
  • 32. Deployment Models IaaS SaaS Security in Virtualisation & Cloud Computing PaaS CaaS MaaS
  • 33. Communication as a Service Infrastructure as a Service Monitoring as a Service Platform as a Service Software as a Service Crime Ware as a Service IT as a Service
  • 34.
  • 35. Many cloud deployments are build on virtualised platforms However it is not a requirement Some SaaS dply are not virtualised Virtualization is not a requirement of cloud computing, its ability to efficiently share resources makes it an excellent foundation.
  • 36.
  • 37.
  • 38.
  • 39.
  • 40.
  • 41. Hypervisor, also called Virtual Machine Manager (VMM) One of many hardware virtualization techniques allowing Multiple Operating Systems Conceptually one level higher than a Supervisory program Manages the execution of the guest operating systems Used to describe the interface provided by the specific cloud computing functionality infrastructure as a service (IaaS)
  • 42. 100% SECURITY IS A MYTH COL S K KAPOOR …..Off course our answer sheets also came out to be myth
  • 43. Crime as a Service (CaaS) is just like Software as a Service (SaaS) ……………but instead of offering legal and helpful services though the Internet, criminal syndicates are offering illegal and detrimental services …such as infecting large quantities of computers, sending spam and even launching direct denial of service (DDoS) attacks
  • 44. Infrastructure As (Crime) Service or Iaa(C)S, in which the criminals offer malicious services (or infrastructures) to attack specified targets, services may include complex “traditional” infrastructures such as botnets ….but also “innovative” large scale fashioned services such as DDoS or also sharper services such as password cracking. Try to surf the web and you will discover how easy it is to purchase such a criminal kind of services. Security in the Cloud – Dealing with AAS HOLES
  • 45. Software As a (Crime) Service or Saa(C)S, in which the criminals offer malicious software (and the needed support) as a service. An example? The latest Zeus Variant dubbed Citadel provides the purchaser with help desk and even a dedicated Social Network
  • 46.
  • 47.
  • 48. Loose Control Over Assets Trust ur data to Cloud Service Provider? Loose control over Physical Security In a Public Cloud u share with others!!!! No knowledge of what runs where? Sticky Services!!!!@incompatibility Control over Encryption/Decryption Keys
  • 49. No Stds yet!!!@OCC is there working Internally developed Code in cloud? Loose control over Physical Security Msn critical applications in public cloud? Audit Logs accessible to service provider PCI DSS Constant up gradation!!! Payment Card Industry Data Security Standard
  • 50. Data Residency in SaaS Banking data to reside within country!! Citizen data not on shared servers Easier for attackers!!! Double edged- Cloud & Virtualization Patch Maintenance Bharosa & Trust
  • 51. Privileged User Access • Inquire about who has spl access to data • Who are the administrators and how r they hired? Regulatory Compliance • Is vendor willing to undergo external audits • Security classification? Data Location • Does the provider allow any control over loc of data Data Segregation • Encryption policy, schemes and design
  • 52. Recovery • What happens in case of disaster • Restoration Policies and Business Continuity Plans Investigative Support • Vendor’s ability to investigate any inappropriate or illegal activity ? Long term Viability • What happens if company goes out of Business? • Risk Management Security Monitoring and IR • Notification of Sec Vulnerabilities • IR Teams?
  • 53. Data in Transit Data at Rest Data in Processing Data Lineage@mapping Data Remanence
  • 54. Few Cases.....u should know AWS Google Docs Security in Virtualisation & Cloud Computing Cevin
  • 55. Internet Assigned Numbers Authority & RIR
  • 56.
  • 57.
  • 58.
  • 59.
  • 60. Stealing keys to access and manage hosts Attacking unpatched,vulnerable services Hijacking accounts with weak pwds Weak Firewalls Deploying Trojans
  • 61.
  • 62.
  • 63.
  • 64.
  • 65.