Security In The Cloud Timed

1,250 views

Published on

0 Comments
0 Likes
Statistics
Notes
  • Be the first to comment

  • Be the first to like this

No Downloads
Views
Total views
1,250
On SlideShare
0
From Embeds
0
Number of Embeds
11
Actions
Shares
0
Downloads
18
Comments
0
Likes
0
Embeds 0
No embeds

No notes for slide

Security In The Cloud Timed

  1. 1. Security in the Cloud<br />By: Fred Rathweg<br />Instructor: Charlie O’Neal<br />SECR5000 Security Management<br />Sunday, February 28, 2010<br />
  2. 2. What is cloud computing <br />It is not so simple a question.<br />The internet has seen exponential growth in the last decade to bring us to today where everyone is connecting on a global scale. In the past business had their data in house in the company data center and only had to worry about physical security Today business pressures are mounting to exploit the financial benefits of cloud computing. <br />2/28/2010<br />Security in the Cloud by Fred Rathweg Webster University (SECR5000 Security Management - Instructor: Charlie O’Neal)<br />2<br />
  3. 3. 2/28/2010<br />Definitions of cloud computing<br />Cloud computing is a general term for anything that involves delivering hosted services over the Internet. These services are broadly divided into three categories: <br />Software-as-a-Service (SaaS). <br />Platform-as-a-Service (PaaS),<br />Infrastructure-as-a-Service (IaaS), <br />Cloud solutions includes these technologies but is more comprehensive.<br />Security in the Cloud by Fred Rathweg Webster University (SECR5000 Security Management - Instructor: Charlie O’Neal)<br />3<br />
  4. 4. Anatomy of a cloud<br />2/28/2010<br />4<br />The application services layer hosts applications that fit the SaaS model. <br />Platform services provide application infrastructure based on demand (Amazon Web Services and Google Apps).<br />The bottom layer of the cloud are physical assets such as servers, network devices, and storage. Virtualization, as with platform services, provides on-demand resources. <br />Security in the Cloud by Fred Rathweg Webster University (SECR5000 Security Management - Instructor: Charlie O’Neal)<br />
  5. 5. Public and Private Clouds<br />2/28/2010<br />Public clouds are cloud services provided by a third party (vendor). They exist beyond the company firewall, and they are fully hosted and managed by the cloud provider. Amazon Web Services is the largest public cloud provider<br />Security in the Cloud by Fred Rathweg Webster University (SECR5000 Security Management - Instructor: Charlie O’Neal)<br />5<br />
  6. 6. 2/28/2010<br />Why cloud computing?<br />It's now feasible to open a business in the cloud without having to purchase a single piece of hardware. The entrepreneurial CIO is already looking at ways to take advantage. The opportunity to achieve the truly flexible, agile, cheap, manageable, e-business has arrived.<br /> But is it all secure? <br />Security in the Cloud by Fred Rathweg Webster University (SECR5000 Security Management - Instructor: Charlie O’Neal)<br />6<br />
  7. 7. Google to enlist NSA to help it ward off cyber attacks<br />2/28/2010<br />2/28/2010<br />On Jan. 12, 2010 Google said that its systems and 34 other large tech, defense, energy, financial and media companies had been hacked in a series of intrusions beginning in December. <br />The Gmail accounts of human rights activists in Europe, China and the United States were also compromised. Google’s future in China is in question depending on the outcome of the talks <br />Security in the Cloud by Fred Rathweg Webster University (SECR5000 Security Management - Instructor: Charlie O’Neal)<br />7<br />
  8. 8. Broad New Hacking Attack Detected A global offensive snagged corporate and personal data at nearly 2,500 companies and the operation is still running. The Department of Homeland Security said that ZeuS was among the top five malware infections.<br />2/28/2010<br />Security in the Cloud by Fred Rathweg Webster University (SECR5000 Security Management - Instructor: Charlie O’Neal)<br />8<br />
  9. 9. Where are the wholes in the cloud?<br />2/28/2010<br />There are 7 security risks in cloud computing for the enterprise that an entrepreneurial CIO should assess before entering the cloud arena.<br />Data integrity and segregation. <br />Data location. <br />Recovery, <br />Privacy<br />Investigative support.<br />Regulatory compliance, <br />Auditing <br />Security in the Cloud by Fred Rathweg Webster University (SECR5000 Security Management - Instructor: Charlie O’Neal)<br />9<br />
  10. 10. 2/28/2010<br />Conclusion:<br />There are many reasons why companies shift toward a cloud computing solution.<br />Increase Return On Investment, <br />Increase Cash Flow <br />Increased value for the stockholders. <br />Security is more cost-effective in the cloud. <br />Security in the Cloud by Fred Rathweg Webster University (SECR5000 Security Management - Instructor: Charlie O’Neal)<br />10<br />

×