SlideShare a Scribd company logo
1 of 26
INFORMATION SECURITY
 WELCOME TO THE GROUP PRESENTATION
1
Topic Name and details
Mitigations to ensure the confidentiality, integrity and
availability of the data stored on these providers? Discuss
mitigations for both the cloud providers and also the end
users.
 Vaishal Shah(30129756)
 Kawalpreet Kaur(30116373)
 Vidit Darji(30309034)
 Gagandeep Kaur(30129485)
2
Introduction of Cloud Providers
 It is a firm which delivers cloud computing that relies
on services and solution to individuals and business. It
is also known as utility computing provider.
 Based on the business model. There are many
solutions
 Infrastructure as a Service(IAAS)
 Software as service(SAAS)
 Platform as service(PAAS)
3
What is Confidentiality, integrity,
availability
 is also known as CIA triad
 structure made to guide policies for information
security within an organization.
 Are considered to be crucial elements components of
society.
4
Confidentiality, integrity,
availability
 Confidentiality is a set of rules or procedures that
restricts the boundary to use or access to information.
 Integrity is the assurance that the information
gathered is trustworthy and reliable.
 Availability is a guarantee of accurate access to the
information by authorized people.
5
Dropbox, Google docs
 Dropbox is a cloud storage service, sometimes
referred to as an online backup service, that is
frequently used for file sharing and collaboration. It is
increasingly being used in enterprises.
 This service is as a warehouse used by government
organizations, banks, post offices, video stores and
libraries to allow people to drop items.
6
Diagrammatical representation of
Dropbox, Google Drive
7
Figures about Dropbox, Google
Drive
8
Problems or Issues related to ensure Confidentiality,
Availability, Integrity by cloud providers
 Malicious behaviour of insiders.
 Incomplete or insecure data completion.
 Management interface vulnerability.
9
Issues contd.
 Loss of Governance.
 Isolation of failure.
 Compliance and legal risks.
10
Mitigations to ensure confidentiality, integrity and
availability of cloud providers
 The cloud is still new so
the push for effective
controls over the
protection of information
in the cloud is also
nascent. But every
problem comes with a
solution so there are
fewer security solutions
for the cloud providers
than there are for securing
physical devices in a
traditional infrastructure.
 CIA Triad
11
Confidentiality
 Data encryption
 User IDs and passwords
 Biometric verification and security tokens, key fobs
and soft tokens.
 Data confidentiality may involve special training for
those privy to such documents
 Storing Information only on air gapped computers,
disconnected storage devices or, for highly sensitive
information, in hard copy form only
12
Integrity
 Maintaining consistency, accuracy and trustworthiness
 Ensuring data from unauthorized access
 EMP(electromagnetic pulse) or server crash.
 Some data might include checksums,
even cryptographic checksums for verification of
integrity.
 Back ups or redundancies must be available to restore
the affected data to its correct state.
13
Availability
 Maintaining all hardware, performing hardware
repairs
 Providing adequate communication bandwidth
 Preventing occurrence of bottlenecks
 Back up copy must be stored in a geographically
isolated location
 Use of firewalls and proxy servers
 Fast and adaptive disaster recovery
14
Mitigations Cont..
 Cloud Access Security Brokers(CASBs) : Niche
market has been trying to reduce the severity of
information shared on cloud providers so this market
came up with Cloud Access Security
Brokers(CASBs) defined as a strategy to mitigate this
problem.
 Context Awareness also allows the CASB providers to
employ heuristic analysis on Cloud bound traffic, to do
some form of anomaly detection to identify malicious
or erroneous traffic. This is an area that they are all
investing heavily in today.
15
Problems for cloud providers
 Data integrity
 Data theft
 Privacy issue
 Data loss
 Data location
16
Data integrity
 User can access the data from any where
 Lack of data integrity in cloud
Data Theft
 Cost affective and flexible for operation
 High possibility of data stolen from other user
17
ssue
 Make sure that customer’s private information secure
 Keep watching who is access the data
Data Loss
 Due to financial problem when vendor closes,
customer will loss data
 Customer can not be able to access the data because
vendor shut down
18
Data location
 Anyone don’t know the location of data
 Vendor not reveal the location of data
19
Mitigation of cloud providers
 Identify the assets
 Analyze the risk
 Apple security countermeasure
 Conduct post-run
20
Problems faced by users of cloud
services
 Privacy
 Security
 Data breaches
 Data protection
21
Mitigations for users of cloud services
• Privileged user Access
• Regulatory Compliance
• Data Location
• Demonstrable customer care
22
Mitigations Cont..
• Data Segregation
• Recovery
• Investigative support/Search ability
• Long-term viability
23
References https://www.techopedia.com/definition/133/cloud-
provider
 http://www.cloud-
council.org/Security_for_Cloud_Computing-
Final_080912.pdf
 https://www.google.com.au/search?q=image+of+dropbo
x,+google+docs
 http://www.slideshare.net/pcalcada/apresentao-cm-
1524115
 http://www.cloudcouncil.org/Security_for_Cloud_Comp
uting-Final_080912.pdf
 http://whatis.techtarget.com/definition/Confidentiality-
integrity-and-availability-CIA
24
ANY QUESTIONS
??????
25
THANK YOU
26

More Related Content

What's hot

Basics of Information System Security
Basics of Information System SecurityBasics of Information System Security
Basics of Information System Securitychauhankapil
 
Information security and other issues
Information security and other issuesInformation security and other issues
Information security and other issuesHaseeb Ahmed Awan
 
INFORMATION SECURITY
INFORMATION SECURITYINFORMATION SECURITY
INFORMATION SECURITYAhmed Moussa
 
Data Governance Solutions With Seclore and Stash
Data Governance Solutions With Seclore and StashData Governance Solutions With Seclore and Stash
Data Governance Solutions With Seclore and StashSeclore
 
Information security
Information security Information security
Information security AishaIshaq4
 
Introduction to security
Introduction to securityIntroduction to security
Introduction to securityMukesh Chinta
 
Inbound Data Protection
Inbound Data ProtectionInbound Data Protection
Inbound Data ProtectionSeclore
 
Data security strategies and drivers
Data security strategies and driversData security strategies and drivers
Data security strategies and driversFreeform Dynamics
 
20100224 Presentation at RGIT Mumbai - Information Security Awareness
20100224 Presentation at RGIT Mumbai - Information Security Awareness20100224 Presentation at RGIT Mumbai - Information Security Awareness
20100224 Presentation at RGIT Mumbai - Information Security AwarenessDinesh O Bareja
 
Seclore: Information Rights Management
Seclore: Information Rights ManagementSeclore: Information Rights Management
Seclore: Information Rights ManagementRahul Neel Mani
 
Compliance regulations with Data Centric Security | Seclore
Compliance regulations with Data Centric Security | SecloreCompliance regulations with Data Centric Security | Seclore
Compliance regulations with Data Centric Security | SecloreSeclore
 
Customer Data Privacy & Protection | Seclore
Customer Data Privacy & Protection | SecloreCustomer Data Privacy & Protection | Seclore
Customer Data Privacy & Protection | SecloreSeclore
 
Benefits of automating data protection | Seclore
Benefits of automating data protection | SecloreBenefits of automating data protection | Seclore
Benefits of automating data protection | SecloreSeclore
 
Information Security and Privacy - Public Sector actions, policies and regula...
Information Security and Privacy - Public Sector actions, policies and regula...Information Security and Privacy - Public Sector actions, policies and regula...
Information Security and Privacy - Public Sector actions, policies and regula...The University of Texas (UTRGV)
 
Application Data Security | Seclore
Application Data Security | SecloreApplication Data Security | Seclore
Application Data Security | SecloreSeclore
 
Data Security For Insurance Solutions
Data Security For Insurance SolutionsData Security For Insurance Solutions
Data Security For Insurance SolutionsSeclore
 

What's hot (20)

Basics of Information System Security
Basics of Information System SecurityBasics of Information System Security
Basics of Information System Security
 
IT security
IT securityIT security
IT security
 
Information security
Information securityInformation security
Information security
 
Information security and other issues
Information security and other issuesInformation security and other issues
Information security and other issues
 
INFORMATION SECURITY
INFORMATION SECURITYINFORMATION SECURITY
INFORMATION SECURITY
 
Data Security
Data SecurityData Security
Data Security
 
Data Governance Solutions With Seclore and Stash
Data Governance Solutions With Seclore and StashData Governance Solutions With Seclore and Stash
Data Governance Solutions With Seclore and Stash
 
Information security
Information security Information security
Information security
 
Introduction to security
Introduction to securityIntroduction to security
Introduction to security
 
Inbound Data Protection
Inbound Data ProtectionInbound Data Protection
Inbound Data Protection
 
Data security strategies and drivers
Data security strategies and driversData security strategies and drivers
Data security strategies and drivers
 
20100224 Presentation at RGIT Mumbai - Information Security Awareness
20100224 Presentation at RGIT Mumbai - Information Security Awareness20100224 Presentation at RGIT Mumbai - Information Security Awareness
20100224 Presentation at RGIT Mumbai - Information Security Awareness
 
Data Security
Data SecurityData Security
Data Security
 
Seclore: Information Rights Management
Seclore: Information Rights ManagementSeclore: Information Rights Management
Seclore: Information Rights Management
 
Compliance regulations with Data Centric Security | Seclore
Compliance regulations with Data Centric Security | SecloreCompliance regulations with Data Centric Security | Seclore
Compliance regulations with Data Centric Security | Seclore
 
Customer Data Privacy & Protection | Seclore
Customer Data Privacy & Protection | SecloreCustomer Data Privacy & Protection | Seclore
Customer Data Privacy & Protection | Seclore
 
Benefits of automating data protection | Seclore
Benefits of automating data protection | SecloreBenefits of automating data protection | Seclore
Benefits of automating data protection | Seclore
 
Information Security and Privacy - Public Sector actions, policies and regula...
Information Security and Privacy - Public Sector actions, policies and regula...Information Security and Privacy - Public Sector actions, policies and regula...
Information Security and Privacy - Public Sector actions, policies and regula...
 
Application Data Security | Seclore
Application Data Security | SecloreApplication Data Security | Seclore
Application Data Security | Seclore
 
Data Security For Insurance Solutions
Data Security For Insurance SolutionsData Security For Insurance Solutions
Data Security For Insurance Solutions
 

Viewers also liked

Introduction to Information Security
Introduction to Information SecurityIntroduction to Information Security
Introduction to Information SecurityDr. Loganathan R
 
Understanding High Availability - Introducing the Theory and Concepts of High...
Understanding High Availability - Introducing the Theory and Concepts of High...Understanding High Availability - Introducing the Theory and Concepts of High...
Understanding High Availability - Introducing the Theory and Concepts of High...Astute Systems
 
Introduction to Hacking
Introduction to HackingIntroduction to Hacking
Introduction to HackingRishabha Garg
 
InformationSecurity
InformationSecurityInformationSecurity
InformationSecuritylearnt
 
Information Security Management System ISO/IEC 27001:2005
Information Security Management System ISO/IEC 27001:2005Information Security Management System ISO/IEC 27001:2005
Information Security Management System ISO/IEC 27001:2005ControlCase
 

Viewers also liked (9)

Introduction to Information Security
Introduction to Information SecurityIntroduction to Information Security
Introduction to Information Security
 
Availability and Business Resiliency Strategies
Availability and Business Resiliency StrategiesAvailability and Business Resiliency Strategies
Availability and Business Resiliency Strategies
 
Understanding High Availability - Introducing the Theory and Concepts of High...
Understanding High Availability - Introducing the Theory and Concepts of High...Understanding High Availability - Introducing the Theory and Concepts of High...
Understanding High Availability - Introducing the Theory and Concepts of High...
 
Introduction to Hacking
Introduction to HackingIntroduction to Hacking
Introduction to Hacking
 
Web Security
Web SecurityWeb Security
Web Security
 
Database Security
Database SecurityDatabase Security
Database Security
 
InformationSecurity
InformationSecurityInformationSecurity
InformationSecurity
 
Information Security and the SDLC
Information Security and the SDLCInformation Security and the SDLC
Information Security and the SDLC
 
Information Security Management System ISO/IEC 27001:2005
Information Security Management System ISO/IEC 27001:2005Information Security Management System ISO/IEC 27001:2005
Information Security Management System ISO/IEC 27001:2005
 

Similar to Mitigations for Ensuring CIA in Cloud Services

Information security group presentation
Information security group presentationInformation security group presentation
Information security group presentationvaishalshah01
 
Practical advice for cloud data protection ulf mattsson - oracle nyoug sep ...
Practical advice for cloud data protection   ulf mattsson - oracle nyoug sep ...Practical advice for cloud data protection   ulf mattsson - oracle nyoug sep ...
Practical advice for cloud data protection ulf mattsson - oracle nyoug sep ...Ulf Mattsson
 
Cloud Auditing With Zero Knowledge Privacy
Cloud Auditing With Zero Knowledge PrivacyCloud Auditing With Zero Knowledge Privacy
Cloud Auditing With Zero Knowledge PrivacyIJERA Editor
 
A proposed Solution: Data Availability and Error Correction in Cloud Computing
A proposed Solution: Data Availability and Error Correction in Cloud ComputingA proposed Solution: Data Availability and Error Correction in Cloud Computing
A proposed Solution: Data Availability and Error Correction in Cloud ComputingCSCJournals
 
Cloud data governance, risk management and compliance ny metro joint cyber...
Cloud data governance, risk management and compliance    ny metro joint cyber...Cloud data governance, risk management and compliance    ny metro joint cyber...
Cloud data governance, risk management and compliance ny metro joint cyber...Ulf Mattsson
 
A Survey on Different Techniques Used in Decentralized Cloud Computing
A Survey on Different Techniques Used in Decentralized Cloud ComputingA Survey on Different Techniques Used in Decentralized Cloud Computing
A Survey on Different Techniques Used in Decentralized Cloud ComputingEditor IJCATR
 
Data Privacy And Security Issues In Cloud Computing.pdf
Data Privacy And Security Issues In Cloud Computing.pdfData Privacy And Security Issues In Cloud Computing.pdf
Data Privacy And Security Issues In Cloud Computing.pdfCiente
 
Research Report on Preserving Data Confidentiality & Data Integrity in ...
Research Report on Preserving  Data  Confidentiality  &  Data  Integrity  in ...Research Report on Preserving  Data  Confidentiality  &  Data  Integrity  in ...
Research Report on Preserving Data Confidentiality & Data Integrity in ...Manish Sahani
 
Security and privacy in cloud computing.pptx
Security and privacy in cloud computing.pptxSecurity and privacy in cloud computing.pptx
Security and privacy in cloud computing.pptxTRSrinidi
 
Module 5-cloud computing-SECURITY IN THE CLOUD
Module 5-cloud computing-SECURITY IN THE CLOUDModule 5-cloud computing-SECURITY IN THE CLOUD
Module 5-cloud computing-SECURITY IN THE CLOUDSweta Kumari Barnwal
 
Securing sensitive data for the health care industry
Securing sensitive data for the health care industrySecuring sensitive data for the health care industry
Securing sensitive data for the health care industryCloudMask inc.
 
Encryption Technique for a Trusted Cloud Computing Environment
Encryption Technique for a Trusted Cloud Computing EnvironmentEncryption Technique for a Trusted Cloud Computing Environment
Encryption Technique for a Trusted Cloud Computing EnvironmentIOSR Journals
 
Encryption Technique for a Trusted Cloud Computing Environment
Encryption Technique for a Trusted Cloud Computing EnvironmentEncryption Technique for a Trusted Cloud Computing Environment
Encryption Technique for a Trusted Cloud Computing EnvironmentIOSR Journals
 
Encryption Technique for a Trusted Cloud Computing Environment
Encryption Technique for a Trusted Cloud Computing EnvironmentEncryption Technique for a Trusted Cloud Computing Environment
Encryption Technique for a Trusted Cloud Computing EnvironmentIOSR Journals
 
A study on security issues in cloud based e learning
A study on security issues in cloud based e learningA study on security issues in cloud based e learning
A study on security issues in cloud based e learningManimaran A
 
Data security in the cloud
Data security in the cloud Data security in the cloud
Data security in the cloud IBM Security
 
Altourage presents: Cloud Security
Altourage presents: Cloud SecurityAltourage presents: Cloud Security
Altourage presents: Cloud SecurityAltourage
 

Similar to Mitigations for Ensuring CIA in Cloud Services (20)

Information security group presentation
Information security group presentationInformation security group presentation
Information security group presentation
 
Practical advice for cloud data protection ulf mattsson - oracle nyoug sep ...
Practical advice for cloud data protection   ulf mattsson - oracle nyoug sep ...Practical advice for cloud data protection   ulf mattsson - oracle nyoug sep ...
Practical advice for cloud data protection ulf mattsson - oracle nyoug sep ...
 
Cloud Auditing With Zero Knowledge Privacy
Cloud Auditing With Zero Knowledge PrivacyCloud Auditing With Zero Knowledge Privacy
Cloud Auditing With Zero Knowledge Privacy
 
Turtles, Trust and The Future of Cybersecurity
Turtles, Trust and The Future of Cybersecurity Turtles, Trust and The Future of Cybersecurity
Turtles, Trust and The Future of Cybersecurity
 
A proposed Solution: Data Availability and Error Correction in Cloud Computing
A proposed Solution: Data Availability and Error Correction in Cloud ComputingA proposed Solution: Data Availability and Error Correction in Cloud Computing
A proposed Solution: Data Availability and Error Correction in Cloud Computing
 
Cloud data governance, risk management and compliance ny metro joint cyber...
Cloud data governance, risk management and compliance    ny metro joint cyber...Cloud data governance, risk management and compliance    ny metro joint cyber...
Cloud data governance, risk management and compliance ny metro joint cyber...
 
A Survey on Different Techniques Used in Decentralized Cloud Computing
A Survey on Different Techniques Used in Decentralized Cloud ComputingA Survey on Different Techniques Used in Decentralized Cloud Computing
A Survey on Different Techniques Used in Decentralized Cloud Computing
 
Data Privacy And Security Issues In Cloud Computing.pdf
Data Privacy And Security Issues In Cloud Computing.pdfData Privacy And Security Issues In Cloud Computing.pdf
Data Privacy And Security Issues In Cloud Computing.pdf
 
Research Report on Preserving Data Confidentiality & Data Integrity in ...
Research Report on Preserving  Data  Confidentiality  &  Data  Integrity  in ...Research Report on Preserving  Data  Confidentiality  &  Data  Integrity  in ...
Research Report on Preserving Data Confidentiality & Data Integrity in ...
 
Security and privacy in cloud computing.pptx
Security and privacy in cloud computing.pptxSecurity and privacy in cloud computing.pptx
Security and privacy in cloud computing.pptx
 
Module 5-cloud computing-SECURITY IN THE CLOUD
Module 5-cloud computing-SECURITY IN THE CLOUDModule 5-cloud computing-SECURITY IN THE CLOUD
Module 5-cloud computing-SECURITY IN THE CLOUD
 
Securing sensitive data for the health care industry
Securing sensitive data for the health care industrySecuring sensitive data for the health care industry
Securing sensitive data for the health care industry
 
Encryption Technique for a Trusted Cloud Computing Environment
Encryption Technique for a Trusted Cloud Computing EnvironmentEncryption Technique for a Trusted Cloud Computing Environment
Encryption Technique for a Trusted Cloud Computing Environment
 
Encryption Technique for a Trusted Cloud Computing Environment
Encryption Technique for a Trusted Cloud Computing EnvironmentEncryption Technique for a Trusted Cloud Computing Environment
Encryption Technique for a Trusted Cloud Computing Environment
 
H017155360
H017155360H017155360
H017155360
 
Encryption Technique for a Trusted Cloud Computing Environment
Encryption Technique for a Trusted Cloud Computing EnvironmentEncryption Technique for a Trusted Cloud Computing Environment
Encryption Technique for a Trusted Cloud Computing Environment
 
A study on security issues in cloud based e learning
A study on security issues in cloud based e learningA study on security issues in cloud based e learning
A study on security issues in cloud based e learning
 
Data security in the cloud
Data security in the cloud Data security in the cloud
Data security in the cloud
 
Altourage presents: Cloud Security
Altourage presents: Cloud SecurityAltourage presents: Cloud Security
Altourage presents: Cloud Security
 
Cloud security
Cloud securityCloud security
Cloud security
 

More from vaishalshah01

More from vaishalshah01 (9)

Erp slides
Erp slidesErp slides
Erp slides
 
Healthcare industry
Healthcare industryHealthcare industry
Healthcare industry
 
Supi ppt
Supi pptSupi ppt
Supi ppt
 
Cloud computing ppt
Cloud computing pptCloud computing ppt
Cloud computing ppt
 
Cloud computing ppt
Cloud computing pptCloud computing ppt
Cloud computing ppt
 
Cloud computing ppt
Cloud computing pptCloud computing ppt
Cloud computing ppt
 
Cloud computing ppt
Cloud computing pptCloud computing ppt
Cloud computing ppt
 
Cloud computing ppt
Cloud computing pptCloud computing ppt
Cloud computing ppt
 
Cloud computing report
Cloud computing reportCloud computing report
Cloud computing report
 

Recently uploaded

Measures of Central Tendency: Mean, Median and Mode
Measures of Central Tendency: Mean, Median and ModeMeasures of Central Tendency: Mean, Median and Mode
Measures of Central Tendency: Mean, Median and ModeThiyagu K
 
microwave assisted reaction. General introduction
microwave assisted reaction. General introductionmicrowave assisted reaction. General introduction
microwave assisted reaction. General introductionMaksud Ahmed
 
1029-Danh muc Sach Giao Khoa khoi 6.pdf
1029-Danh muc Sach Giao Khoa khoi  6.pdf1029-Danh muc Sach Giao Khoa khoi  6.pdf
1029-Danh muc Sach Giao Khoa khoi 6.pdfQucHHunhnh
 
Grant Readiness 101 TechSoup and Remy Consulting
Grant Readiness 101 TechSoup and Remy ConsultingGrant Readiness 101 TechSoup and Remy Consulting
Grant Readiness 101 TechSoup and Remy ConsultingTechSoup
 
Organic Name Reactions for the students and aspirants of Chemistry12th.pptx
Organic Name Reactions  for the students and aspirants of Chemistry12th.pptxOrganic Name Reactions  for the students and aspirants of Chemistry12th.pptx
Organic Name Reactions for the students and aspirants of Chemistry12th.pptxVS Mahajan Coaching Centre
 
Russian Call Girls in Andheri Airport Mumbai WhatsApp 9167673311 💞 Full Nigh...
Russian Call Girls in Andheri Airport Mumbai WhatsApp  9167673311 💞 Full Nigh...Russian Call Girls in Andheri Airport Mumbai WhatsApp  9167673311 💞 Full Nigh...
Russian Call Girls in Andheri Airport Mumbai WhatsApp 9167673311 💞 Full Nigh...Pooja Nehwal
 
Kisan Call Centre - To harness potential of ICT in Agriculture by answer farm...
Kisan Call Centre - To harness potential of ICT in Agriculture by answer farm...Kisan Call Centre - To harness potential of ICT in Agriculture by answer farm...
Kisan Call Centre - To harness potential of ICT in Agriculture by answer farm...Krashi Coaching
 
Student login on Anyboli platform.helpin
Student login on Anyboli platform.helpinStudent login on Anyboli platform.helpin
Student login on Anyboli platform.helpinRaunakKeshri1
 
SOCIAL AND HISTORICAL CONTEXT - LFTVD.pptx
SOCIAL AND HISTORICAL CONTEXT - LFTVD.pptxSOCIAL AND HISTORICAL CONTEXT - LFTVD.pptx
SOCIAL AND HISTORICAL CONTEXT - LFTVD.pptxiammrhaywood
 
POINT- BIOCHEMISTRY SEM 2 ENZYMES UNIT 5.pptx
POINT- BIOCHEMISTRY SEM 2 ENZYMES UNIT 5.pptxPOINT- BIOCHEMISTRY SEM 2 ENZYMES UNIT 5.pptx
POINT- BIOCHEMISTRY SEM 2 ENZYMES UNIT 5.pptxSayali Powar
 
mini mental status format.docx
mini    mental       status     format.docxmini    mental       status     format.docx
mini mental status format.docxPoojaSen20
 
Q4-W6-Restating Informational Text Grade 3
Q4-W6-Restating Informational Text Grade 3Q4-W6-Restating Informational Text Grade 3
Q4-W6-Restating Informational Text Grade 3JemimahLaneBuaron
 
Web & Social Media Analytics Previous Year Question Paper.pdf
Web & Social Media Analytics Previous Year Question Paper.pdfWeb & Social Media Analytics Previous Year Question Paper.pdf
Web & Social Media Analytics Previous Year Question Paper.pdfJayanti Pande
 
Nutritional Needs Presentation - HLTH 104
Nutritional Needs Presentation - HLTH 104Nutritional Needs Presentation - HLTH 104
Nutritional Needs Presentation - HLTH 104misteraugie
 
Arihant handbook biology for class 11 .pdf
Arihant handbook biology for class 11 .pdfArihant handbook biology for class 11 .pdf
Arihant handbook biology for class 11 .pdfchloefrazer622
 
CARE OF CHILD IN INCUBATOR..........pptx
CARE OF CHILD IN INCUBATOR..........pptxCARE OF CHILD IN INCUBATOR..........pptx
CARE OF CHILD IN INCUBATOR..........pptxGaneshChakor2
 
The basics of sentences session 2pptx copy.pptx
The basics of sentences session 2pptx copy.pptxThe basics of sentences session 2pptx copy.pptx
The basics of sentences session 2pptx copy.pptxheathfieldcps1
 

Recently uploaded (20)

Measures of Central Tendency: Mean, Median and Mode
Measures of Central Tendency: Mean, Median and ModeMeasures of Central Tendency: Mean, Median and Mode
Measures of Central Tendency: Mean, Median and Mode
 
microwave assisted reaction. General introduction
microwave assisted reaction. General introductionmicrowave assisted reaction. General introduction
microwave assisted reaction. General introduction
 
1029-Danh muc Sach Giao Khoa khoi 6.pdf
1029-Danh muc Sach Giao Khoa khoi  6.pdf1029-Danh muc Sach Giao Khoa khoi  6.pdf
1029-Danh muc Sach Giao Khoa khoi 6.pdf
 
Grant Readiness 101 TechSoup and Remy Consulting
Grant Readiness 101 TechSoup and Remy ConsultingGrant Readiness 101 TechSoup and Remy Consulting
Grant Readiness 101 TechSoup and Remy Consulting
 
Organic Name Reactions for the students and aspirants of Chemistry12th.pptx
Organic Name Reactions  for the students and aspirants of Chemistry12th.pptxOrganic Name Reactions  for the students and aspirants of Chemistry12th.pptx
Organic Name Reactions for the students and aspirants of Chemistry12th.pptx
 
Russian Call Girls in Andheri Airport Mumbai WhatsApp 9167673311 💞 Full Nigh...
Russian Call Girls in Andheri Airport Mumbai WhatsApp  9167673311 💞 Full Nigh...Russian Call Girls in Andheri Airport Mumbai WhatsApp  9167673311 💞 Full Nigh...
Russian Call Girls in Andheri Airport Mumbai WhatsApp 9167673311 💞 Full Nigh...
 
Kisan Call Centre - To harness potential of ICT in Agriculture by answer farm...
Kisan Call Centre - To harness potential of ICT in Agriculture by answer farm...Kisan Call Centre - To harness potential of ICT in Agriculture by answer farm...
Kisan Call Centre - To harness potential of ICT in Agriculture by answer farm...
 
Student login on Anyboli platform.helpin
Student login on Anyboli platform.helpinStudent login on Anyboli platform.helpin
Student login on Anyboli platform.helpin
 
SOCIAL AND HISTORICAL CONTEXT - LFTVD.pptx
SOCIAL AND HISTORICAL CONTEXT - LFTVD.pptxSOCIAL AND HISTORICAL CONTEXT - LFTVD.pptx
SOCIAL AND HISTORICAL CONTEXT - LFTVD.pptx
 
POINT- BIOCHEMISTRY SEM 2 ENZYMES UNIT 5.pptx
POINT- BIOCHEMISTRY SEM 2 ENZYMES UNIT 5.pptxPOINT- BIOCHEMISTRY SEM 2 ENZYMES UNIT 5.pptx
POINT- BIOCHEMISTRY SEM 2 ENZYMES UNIT 5.pptx
 
mini mental status format.docx
mini    mental       status     format.docxmini    mental       status     format.docx
mini mental status format.docx
 
Mattingly "AI & Prompt Design: Structured Data, Assistants, & RAG"
Mattingly "AI & Prompt Design: Structured Data, Assistants, & RAG"Mattingly "AI & Prompt Design: Structured Data, Assistants, & RAG"
Mattingly "AI & Prompt Design: Structured Data, Assistants, & RAG"
 
Q4-W6-Restating Informational Text Grade 3
Q4-W6-Restating Informational Text Grade 3Q4-W6-Restating Informational Text Grade 3
Q4-W6-Restating Informational Text Grade 3
 
Código Creativo y Arte de Software | Unidad 1
Código Creativo y Arte de Software | Unidad 1Código Creativo y Arte de Software | Unidad 1
Código Creativo y Arte de Software | Unidad 1
 
Web & Social Media Analytics Previous Year Question Paper.pdf
Web & Social Media Analytics Previous Year Question Paper.pdfWeb & Social Media Analytics Previous Year Question Paper.pdf
Web & Social Media Analytics Previous Year Question Paper.pdf
 
Nutritional Needs Presentation - HLTH 104
Nutritional Needs Presentation - HLTH 104Nutritional Needs Presentation - HLTH 104
Nutritional Needs Presentation - HLTH 104
 
Arihant handbook biology for class 11 .pdf
Arihant handbook biology for class 11 .pdfArihant handbook biology for class 11 .pdf
Arihant handbook biology for class 11 .pdf
 
CARE OF CHILD IN INCUBATOR..........pptx
CARE OF CHILD IN INCUBATOR..........pptxCARE OF CHILD IN INCUBATOR..........pptx
CARE OF CHILD IN INCUBATOR..........pptx
 
The basics of sentences session 2pptx copy.pptx
The basics of sentences session 2pptx copy.pptxThe basics of sentences session 2pptx copy.pptx
The basics of sentences session 2pptx copy.pptx
 
INDIA QUIZ 2024 RLAC DELHI UNIVERSITY.pptx
INDIA QUIZ 2024 RLAC DELHI UNIVERSITY.pptxINDIA QUIZ 2024 RLAC DELHI UNIVERSITY.pptx
INDIA QUIZ 2024 RLAC DELHI UNIVERSITY.pptx
 

Mitigations for Ensuring CIA in Cloud Services

  • 1. INFORMATION SECURITY  WELCOME TO THE GROUP PRESENTATION 1
  • 2. Topic Name and details Mitigations to ensure the confidentiality, integrity and availability of the data stored on these providers? Discuss mitigations for both the cloud providers and also the end users.  Vaishal Shah(30129756)  Kawalpreet Kaur(30116373)  Vidit Darji(30309034)  Gagandeep Kaur(30129485) 2
  • 3. Introduction of Cloud Providers  It is a firm which delivers cloud computing that relies on services and solution to individuals and business. It is also known as utility computing provider.  Based on the business model. There are many solutions  Infrastructure as a Service(IAAS)  Software as service(SAAS)  Platform as service(PAAS) 3
  • 4. What is Confidentiality, integrity, availability  is also known as CIA triad  structure made to guide policies for information security within an organization.  Are considered to be crucial elements components of society. 4
  • 5. Confidentiality, integrity, availability  Confidentiality is a set of rules or procedures that restricts the boundary to use or access to information.  Integrity is the assurance that the information gathered is trustworthy and reliable.  Availability is a guarantee of accurate access to the information by authorized people. 5
  • 6. Dropbox, Google docs  Dropbox is a cloud storage service, sometimes referred to as an online backup service, that is frequently used for file sharing and collaboration. It is increasingly being used in enterprises.  This service is as a warehouse used by government organizations, banks, post offices, video stores and libraries to allow people to drop items. 6
  • 8. Figures about Dropbox, Google Drive 8
  • 9. Problems or Issues related to ensure Confidentiality, Availability, Integrity by cloud providers  Malicious behaviour of insiders.  Incomplete or insecure data completion.  Management interface vulnerability. 9
  • 10. Issues contd.  Loss of Governance.  Isolation of failure.  Compliance and legal risks. 10
  • 11. Mitigations to ensure confidentiality, integrity and availability of cloud providers  The cloud is still new so the push for effective controls over the protection of information in the cloud is also nascent. But every problem comes with a solution so there are fewer security solutions for the cloud providers than there are for securing physical devices in a traditional infrastructure.  CIA Triad 11
  • 12. Confidentiality  Data encryption  User IDs and passwords  Biometric verification and security tokens, key fobs and soft tokens.  Data confidentiality may involve special training for those privy to such documents  Storing Information only on air gapped computers, disconnected storage devices or, for highly sensitive information, in hard copy form only 12
  • 13. Integrity  Maintaining consistency, accuracy and trustworthiness  Ensuring data from unauthorized access  EMP(electromagnetic pulse) or server crash.  Some data might include checksums, even cryptographic checksums for verification of integrity.  Back ups or redundancies must be available to restore the affected data to its correct state. 13
  • 14. Availability  Maintaining all hardware, performing hardware repairs  Providing adequate communication bandwidth  Preventing occurrence of bottlenecks  Back up copy must be stored in a geographically isolated location  Use of firewalls and proxy servers  Fast and adaptive disaster recovery 14
  • 15. Mitigations Cont..  Cloud Access Security Brokers(CASBs) : Niche market has been trying to reduce the severity of information shared on cloud providers so this market came up with Cloud Access Security Brokers(CASBs) defined as a strategy to mitigate this problem.  Context Awareness also allows the CASB providers to employ heuristic analysis on Cloud bound traffic, to do some form of anomaly detection to identify malicious or erroneous traffic. This is an area that they are all investing heavily in today. 15
  • 16. Problems for cloud providers  Data integrity  Data theft  Privacy issue  Data loss  Data location 16
  • 17. Data integrity  User can access the data from any where  Lack of data integrity in cloud Data Theft  Cost affective and flexible for operation  High possibility of data stolen from other user 17
  • 18. ssue  Make sure that customer’s private information secure  Keep watching who is access the data Data Loss  Due to financial problem when vendor closes, customer will loss data  Customer can not be able to access the data because vendor shut down 18
  • 19. Data location  Anyone don’t know the location of data  Vendor not reveal the location of data 19
  • 20. Mitigation of cloud providers  Identify the assets  Analyze the risk  Apple security countermeasure  Conduct post-run 20
  • 21. Problems faced by users of cloud services  Privacy  Security  Data breaches  Data protection 21
  • 22. Mitigations for users of cloud services • Privileged user Access • Regulatory Compliance • Data Location • Demonstrable customer care 22
  • 23. Mitigations Cont.. • Data Segregation • Recovery • Investigative support/Search ability • Long-term viability 23
  • 24. References https://www.techopedia.com/definition/133/cloud- provider  http://www.cloud- council.org/Security_for_Cloud_Computing- Final_080912.pdf  https://www.google.com.au/search?q=image+of+dropbo x,+google+docs  http://www.slideshare.net/pcalcada/apresentao-cm- 1524115  http://www.cloudcouncil.org/Security_for_Cloud_Comp uting-Final_080912.pdf  http://whatis.techtarget.com/definition/Confidentiality- integrity-and-availability-CIA 24

Editor's Notes

  1. CASBs are either on-premise, or cloud-based (or both) security policy enforcement points. Placed between your end users and the various cloud service providers, they can inspect traffic, manage and enforce policy, alert on anomalous behavior, and in most cases provide some level of DLP enforcement. These Cloud Access Security Brokers can identify individuals' access into Cloud Service Providers that are affiliated with the broker. Currently these number in the  hundreds if not thousands. For “Sanctioned” Cloud Applications (those services for which your enterprise has procured directly) end user access can be strictly enforced by context: Who you are (Role based access) Where you are coming from (corporate network, public Internet, Wi-Fi, geographic region) What device you are using (Corporate laptop, Home PC, Tablet or phone) What time of day you're working (Are you authorized to work during this time?)