Cloud computing security
Upcoming SlideShare
Loading in...5
×

Like this? Share it with your network

Share

Cloud computing security

  • 155 views
Uploaded on

A cloud, in very simple terms, is a place where information technology (IT) resources such as computer hardware, operating systems, networks, storage, databases, and even entire software......

A cloud, in very simple terms, is a place where information technology (IT) resources such as computer hardware, operating systems, networks, storage, databases, and even entire software applications are available instantly, on-demand

More in: Technology , Business
  • Full Name Full Name Comment goes here.
    Are you sure you want to
    Your message goes here
    Be the first to comment
    Be the first to like this
No Downloads

Views

Total Views
155
On Slideshare
155
From Embeds
0
Number of Embeds
0

Actions

Shares
Downloads
6
Comments
0
Likes
0

Embeds 0

No embeds

Report content

Flagged as inappropriate Flag as inappropriate
Flag as inappropriate

Select your reason for flagging this presentation as inappropriate.

Cancel
    No notes for slide

Transcript

  • 1. Cloud security Presented by, – Teja Babu Sura
  • 2. Cloud security What is Cloud Computing???... A cloud, in very simple terms, is a place where information technology (IT) resources such as computer hardware, operating systems, networks, storage, databases, and even entire software applications are available instantly, on-demand
  • 3. How cloud works ???... • Cloud Software as a Service (SaaS) • Cloud Platform as a Service (PaaS) • Cloud Infrastructure as a Service (IaaS)
  • 4. Types of cloud(deployment models) :-
  • 5. Cloud Computing Security Issues ‘13 Data Breaches Data Loss Account Hijacking Insecure APIs Denial of Service Back doors
  • 6. Data Breaches:A Data Breach is a security incident in which sensitive, protected or confidential data is copied, transmitted, viewed, stolen or used by an individual unauthorized to do so. Data loss:Data loss is an error condition in information systems in which information is destroyed by failures or neglect in storage, transmission, or processing
  • 7. Account hijacking:Account hijacking is a form of identity theft. Identity theft is when someone uses your personal identifying information (e.g., name, address, social security number, financial institution account number, username or password) to commit fraud Insecure API:- Cloud Computing providers expose a set of software interfaces or APIs that customers use to manage and interact with cloud services. cloud services allow third-party access by exposing application programming interfaces
  • 8. Denial Of Service:Denial of Service, is a type of attack where multiple compromised systems -- which are usually infected with a Trojan -- are used to target a single system causing a Denial of Service (DOS) attack.
  • 9. What questions you should ask your cloud provider? Information’s of where data is stored Security and private laws Is cloud operation available for physical inspection Exit charges or penalties while migrating Documentation of disaster recovery Organization’s privacy policy
  • 10. Thank you