SlideShare a Scribd company logo
1 of 34
Download to read offline
Cloud security
Introduction
Achmad Mardiansyah
Agenda
● Cyber security
● Security incidents
● Cloud Computing
● Cloud Security
● Q & A
2
Cyber Security introduction
3
What is Cyber security
Cybersecurity is the art of protecting networks, devices, and data from
unauthorized access or criminal use and the practice of ensuring confidentiality,
integrity, and availability of information.
Security is a very subjective terms.
Every person has their own definition of security, that’s why there are many
standards in security
4
Types of Security
● Computer Security - generic name for the collection of tools designed to
protect data and to thwart hackers
● Network Security - measures to protect data during their transmission
● Internet Security - measures to protect data during their transmission over a
collec)on of interconnected networks
5
Goals of Information Security (CIA)
● Confidentiality. prevents
unauthorized use or
disclosure of information
● Integrity. safeguards the
accuracy and
completeness of
information
● Availability. authorized
users have reliable and
timely access to information
6
Access Control
● Ability to permit or deny the use of an object by a
subject.
● It provides 3 essential services (AAA):
○ Authentication and Identification (who can login)
■ What you know
■ What you have
■ What you are
○ Authorization (what authorized users can do)
○ Accountability (keep track what a user did)
7
Vulnerability
A weakness in security procedures,
network design, or implementation that can
be exploited to violate a corporate security
policy
● Software bugs
● Configuration mistakes
● Network design flaw
Exploit
● Taking advantage of a vulnerability
CVE: Common Vulnerability and Exposure
(https://cve.mitre.org)
8
Threat
Any circumstance or event with the potential to cause harm to a networked system
● Denial of service (DOS): make computer resources (e.g., bandwidth, disk
space, or CPU ) unavailable to its intended users
● Unauthorised access: Access without of permission issued by a rightul
owner of devices or networks
● Impersonation
○ Identity theft
● Worms
● Viruses
● Malware
9
The possibility that a particular vulnerability will be
exploited
Risk analysis is the process of identifying:
● security risks
● determining their impact
● and identifying areas require protection
Risk
10
Security incidents
11
Customer data security breach
● https://en.wikipedia.org/wiki/Data_breach
● Is your account safe?
12
CIA espionage (vault7)
● https://wikileaks.org/ciav7p1/cms/index.html
● https://techcrunch.com/2017/03/09/names-and-d
efinitions-of-leaked-cia-hacking-tools/
● https://wikileaks.org/ciav7p1/cms/files/2014%20
10%2023%20--%20EDG%20Testing%20White
%20Paper%20--%20Rev%20Draft%20B.docx
●
13
Telkom as ads injector
● Telkom injects ads on every http
request from customer
● Around 2013 - ?
● script
14
Cloud computing
15
Can you live without them?
16
So, everything is connected?
17
New paradigm: human netwwork
From computer network -> human network
18
Cloud computing (CC) is...
A concept of using the internet/network to provide Everything as a service (EaaS)
● New paradigm: sell services instead of products
● IaaS, Infrastructure as a Service (RAM, CPU, Storage)
● PaaS, Platform as a Service (frameworks)
● SaaS, Software as a Service (eg. Text editor, cpu, storage)
19
How to achieve cloud computing
● Distributed computing
● Grid computing
● virtualisation
20
Cloud computing type
21
CC in short...
● If want you need is a milk, why do you buy a cow?
● There is no cloud, it’s just someone else’s computer
22
Cloud Security
23
Put security on your cloud
● See previous slide…
●
24
Some examples
25
Use HTTPS
● Dont use HTTP based website
● Always use https when accessing
website
● HTTPS will encrypt traffic from
browser to web server
●
26
Use DNS redirector/filter
● Nawala (www.nawala.org)
● Opendns (https://www.opendns.com)
● Local DNS filter:
○ Can be embeded onto your network devices
○ Can be external: example: pi hole
(https://pi-hole.net)
27
Use script blocker (more control)
● This plugin will block scripts until
you allow it to be executed
● More control
28
Activate Multi Factor authentication (MFA / 2FA)
● Similar to math:
○ What is the factor of 18?
■ 1 and 18
■ 2 and 9
■ 3 and 6
● How many factors to authenticate yourself to website?
29
Single factor 2 factor
Check if your account has been breached
30
Vendor support
● Security incident
● Security updates
● Always communicate with vendor to make sure always get support for
security
●
31
summary
● The strength of security depends on the weakest link of the chains
● Always upgrade skill and knowledge
● Be humble when speak about security. Do not attract attention
32
QA
33
End of slides
● Thank you for your attention
●
34

More Related Content

What's hot

multiple encryption in clouud computing
multiple encryption in clouud computingmultiple encryption in clouud computing
multiple encryption in clouud computing
Rauf Wani
 
Analysis-of-Security-Algorithms-in-Cloud-Computing [Autosaved]
Analysis-of-Security-Algorithms-in-Cloud-Computing [Autosaved]Analysis-of-Security-Algorithms-in-Cloud-Computing [Autosaved]
Analysis-of-Security-Algorithms-in-Cloud-Computing [Autosaved]
Mahmuda Rahman
 
Applying a Security Kernel Framework to Smart Meter Gateways
Applying a Security Kernel Framework to Smart Meter GatewaysApplying a Security Kernel Framework to Smart Meter Gateways
Applying a Security Kernel Framework to Smart Meter Gateways
Marcel Winandy
 

What's hot (19)

Tour to Azure Security Center
Tour to Azure Security CenterTour to Azure Security Center
Tour to Azure Security Center
 
Cloud Security & Cloud Encryption Explained
Cloud Security & Cloud Encryption ExplainedCloud Security & Cloud Encryption Explained
Cloud Security & Cloud Encryption Explained
 
Microsoft Windows Azure - Security Best Practices for Developing Windows Azur...
Microsoft Windows Azure - Security Best Practices for Developing Windows Azur...Microsoft Windows Azure - Security Best Practices for Developing Windows Azur...
Microsoft Windows Azure - Security Best Practices for Developing Windows Azur...
 
Cyber Security and Cloud Computing
Cyber Security and Cloud ComputingCyber Security and Cloud Computing
Cyber Security and Cloud Computing
 
multiple encryption in clouud computing
multiple encryption in clouud computingmultiple encryption in clouud computing
multiple encryption in clouud computing
 
Cloud Security - Emerging Facets and Frontiers
Cloud Security - Emerging Facets and FrontiersCloud Security - Emerging Facets and Frontiers
Cloud Security - Emerging Facets and Frontiers
 
cloud security ppt
cloud security ppt cloud security ppt
cloud security ppt
 
Security on Cloud Computing
Security on Cloud Computing Security on Cloud Computing
Security on Cloud Computing
 
Challenges with Cloud Security by Ken Y Chan
Challenges with Cloud Security by Ken Y ChanChallenges with Cloud Security by Ken Y Chan
Challenges with Cloud Security by Ken Y Chan
 
Getting Started with Azure Security Center
Getting Started with Azure Security CenterGetting Started with Azure Security Center
Getting Started with Azure Security Center
 
Govern Your Cloud: The Foundation for Success
Govern Your Cloud: The Foundation for SuccessGovern Your Cloud: The Foundation for Success
Govern Your Cloud: The Foundation for Success
 
Analysis-of-Security-Algorithms-in-Cloud-Computing [Autosaved]
Analysis-of-Security-Algorithms-in-Cloud-Computing [Autosaved]Analysis-of-Security-Algorithms-in-Cloud-Computing [Autosaved]
Analysis-of-Security-Algorithms-in-Cloud-Computing [Autosaved]
 
The Share Responsibility Model of Cloud Computing - ILTA NYC
The Share Responsibility Model of Cloud Computing - ILTA NYCThe Share Responsibility Model of Cloud Computing - ILTA NYC
The Share Responsibility Model of Cloud Computing - ILTA NYC
 
Protecting Against Web Attacks
Protecting Against Web AttacksProtecting Against Web Attacks
Protecting Against Web Attacks
 
Cloud Security Engineering - Tools and Techniques
Cloud Security Engineering - Tools and TechniquesCloud Security Engineering - Tools and Techniques
Cloud Security Engineering - Tools and Techniques
 
Applying a Security Kernel Framework to Smart Meter Gateways
Applying a Security Kernel Framework to Smart Meter GatewaysApplying a Security Kernel Framework to Smart Meter Gateways
Applying a Security Kernel Framework to Smart Meter Gateways
 
(ISC)2 CCSP - Certified Cloud Security Professional
(ISC)2 CCSP - Certified Cloud Security Professional(ISC)2 CCSP - Certified Cloud Security Professional
(ISC)2 CCSP - Certified Cloud Security Professional
 
Security issue in Cloud computing
Security issue in Cloud computingSecurity issue in Cloud computing
Security issue in Cloud computing
 
Css sf azure_8-9-17-microsoft_azure_security_overview_babak suzani_msft
Css sf azure_8-9-17-microsoft_azure_security_overview_babak suzani_msftCss sf azure_8-9-17-microsoft_azure_security_overview_babak suzani_msft
Css sf azure_8-9-17-microsoft_azure_security_overview_babak suzani_msft
 

Similar to Cloud Security Introduction

Don't Build "Death Star" Security - O'Reilly Software Architecture Conference...
Don't Build "Death Star" Security - O'Reilly Software Architecture Conference...Don't Build "Death Star" Security - O'Reilly Software Architecture Conference...
Don't Build "Death Star" Security - O'Reilly Software Architecture Conference...
David Timothy Strauss
 

Similar to Cloud Security Introduction (20)

Cassandra Lunch #90: Securing Apache Cassandra
Cassandra Lunch #90: Securing Apache CassandraCassandra Lunch #90: Securing Apache Cassandra
Cassandra Lunch #90: Securing Apache Cassandra
 
13.02 Network Security
13.02   Network Security13.02   Network Security
13.02 Network Security
 
Disruptionware-TRustedCISO103020v0.7.pptx
Disruptionware-TRustedCISO103020v0.7.pptxDisruptionware-TRustedCISO103020v0.7.pptx
Disruptionware-TRustedCISO103020v0.7.pptx
 
Security in microservices architectures
Security in microservices architecturesSecurity in microservices architectures
Security in microservices architectures
 
5.cloudsecurity
5.cloudsecurity5.cloudsecurity
5.cloudsecurity
 
Cloud security
Cloud securityCloud security
Cloud security
 
03 cia
03 cia03 cia
03 cia
 
01
01 01
01
 
The day when 3rd party security providers disappear into cloud bright talk se...
The day when 3rd party security providers disappear into cloud bright talk se...The day when 3rd party security providers disappear into cloud bright talk se...
The day when 3rd party security providers disappear into cloud bright talk se...
 
19BCP072_Presentation_Final.pdf
19BCP072_Presentation_Final.pdf19BCP072_Presentation_Final.pdf
19BCP072_Presentation_Final.pdf
 
Cybersecurity Interview Preparation Questions.pdf
Cybersecurity Interview Preparation Questions.pdfCybersecurity Interview Preparation Questions.pdf
Cybersecurity Interview Preparation Questions.pdf
 
Introduction to Cybersecurity
Introduction to CybersecurityIntroduction to Cybersecurity
Introduction to Cybersecurity
 
Don't Build "Death Star" Security - O'Reilly Software Architecture Conference...
Don't Build "Death Star" Security - O'Reilly Software Architecture Conference...Don't Build "Death Star" Security - O'Reilly Software Architecture Conference...
Don't Build "Death Star" Security - O'Reilly Software Architecture Conference...
 
Isaca atlanta ulf mattsson - do you have a roadmap for eu gdpr
Isaca atlanta   ulf mattsson - do you have a roadmap for eu gdprIsaca atlanta   ulf mattsson - do you have a roadmap for eu gdpr
Isaca atlanta ulf mattsson - do you have a roadmap for eu gdpr
 
Windstream Cloud Security Presentation
Windstream Cloud Security PresentationWindstream Cloud Security Presentation
Windstream Cloud Security Presentation
 
vodQA(Pune) 2018 - QAing the security way
vodQA(Pune) 2018 - QAing the security wayvodQA(Pune) 2018 - QAing the security way
vodQA(Pune) 2018 - QAing the security way
 
chapitre1-cloud security basics-23 (1).pptx
chapitre1-cloud security basics-23 (1).pptxchapitre1-cloud security basics-23 (1).pptx
chapitre1-cloud security basics-23 (1).pptx
 
Lecture Cloud Security.pptx
Lecture Cloud Security.pptxLecture Cloud Security.pptx
Lecture Cloud Security.pptx
 
QAing the security way!
QAing the security way!QAing the security way!
QAing the security way!
 
Network security
Network securityNetwork security
Network security
 

More from GLC Networks

More from GLC Networks (20)

Firewall mangle PBR: steering outbound path similar to inbound
Firewall mangle PBR: steering outbound path similar to inboundFirewall mangle PBR: steering outbound path similar to inbound
Firewall mangle PBR: steering outbound path similar to inbound
 
Internal BGP tuning: Mesh peering to avoid loop
Internal BGP tuning: Mesh peering to avoid loopInternal BGP tuning: Mesh peering to avoid loop
Internal BGP tuning: Mesh peering to avoid loop
 
BGP tuning: Peer with loopback
BGP tuning: Peer with loopbackBGP tuning: Peer with loopback
BGP tuning: Peer with loopback
 
BGP security tuning: pull-up route
BGP security tuning: pull-up routeBGP security tuning: pull-up route
BGP security tuning: pull-up route
 
BGP troubleshooting: route origin
BGP troubleshooting: route originBGP troubleshooting: route origin
BGP troubleshooting: route origin
 
Steering traffic in OSPF: Interface cost
Steering traffic in OSPF: Interface costSteering traffic in OSPF: Interface cost
Steering traffic in OSPF: Interface cost
 
Tuning OSPF: Bidirectional Forwarding Detection (BFD)
Tuning OSPF: Bidirectional Forwarding Detection (BFD)Tuning OSPF: Bidirectional Forwarding Detection (BFD)
Tuning OSPF: Bidirectional Forwarding Detection (BFD)
 
Tuning OSPF: Prefix Aggregate
Tuning OSPF: Prefix AggregateTuning OSPF: Prefix Aggregate
Tuning OSPF: Prefix Aggregate
 
Tuning OSPF: area hierarchy, LSA, and area type
Tuning OSPF:  area hierarchy, LSA, and area typeTuning OSPF:  area hierarchy, LSA, and area type
Tuning OSPF: area hierarchy, LSA, and area type
 
Stable OSPF: choosing network type.pdf
Stable OSPF: choosing network type.pdfStable OSPF: choosing network type.pdf
Stable OSPF: choosing network type.pdf
 
Controlling Access Between Devices in the same Layer 2 Segment
Controlling Access Between Devices in the same Layer 2 SegmentControlling Access Between Devices in the same Layer 2 Segment
Controlling Access Between Devices in the same Layer 2 Segment
 
GIT as Mikrotik Configuration Management
GIT as Mikrotik Configuration ManagementGIT as Mikrotik Configuration Management
GIT as Mikrotik Configuration Management
 
RouterOS Migration From v6 to v7
RouterOS Migration From v6 to v7RouterOS Migration From v6 to v7
RouterOS Migration From v6 to v7
 
Building a Web Server with NGINX
Building a Web Server with NGINXBuilding a Web Server with NGINX
Building a Web Server with NGINX
 
Best Current Practice (BCP) 38 Ingress Filtering for Security
Best Current Practice (BCP) 38 Ingress Filtering for SecurityBest Current Practice (BCP) 38 Ingress Filtering for Security
Best Current Practice (BCP) 38 Ingress Filtering for Security
 
EOIP Deep Dive
EOIP Deep DiveEOIP Deep Dive
EOIP Deep Dive
 
Policy Based Routing with Indirect BGP - Part 2
Policy Based Routing with Indirect BGP - Part 2Policy Based Routing with Indirect BGP - Part 2
Policy Based Routing with Indirect BGP - Part 2
 
Policy Based Routing with Indirect BGP - Part 1
Policy Based Routing with Indirect BGP - Part 1Policy Based Routing with Indirect BGP - Part 1
Policy Based Routing with Indirect BGP - Part 1
 
Internet Protocol Deep-Dive
Internet Protocol Deep-DiveInternet Protocol Deep-Dive
Internet Protocol Deep-Dive
 
Network Monitoring with The Dude and Whatsapp
Network Monitoring with The Dude and WhatsappNetwork Monitoring with The Dude and Whatsapp
Network Monitoring with The Dude and Whatsapp
 

Recently uploaded

Histor y of HAM Radio presentation slide
Histor y of HAM Radio presentation slideHistor y of HAM Radio presentation slide
Histor y of HAM Radio presentation slide
vu2urc
 
Artificial Intelligence: Facts and Myths
Artificial Intelligence: Facts and MythsArtificial Intelligence: Facts and Myths
Artificial Intelligence: Facts and Myths
Joaquim Jorge
 

Recently uploaded (20)

Automating Google Workspace (GWS) & more with Apps Script
Automating Google Workspace (GWS) & more with Apps ScriptAutomating Google Workspace (GWS) & more with Apps Script
Automating Google Workspace (GWS) & more with Apps Script
 
ProductAnonymous-April2024-WinProductDiscovery-MelissaKlemke
ProductAnonymous-April2024-WinProductDiscovery-MelissaKlemkeProductAnonymous-April2024-WinProductDiscovery-MelissaKlemke
ProductAnonymous-April2024-WinProductDiscovery-MelissaKlemke
 
GenAI Risks & Security Meetup 01052024.pdf
GenAI Risks & Security Meetup 01052024.pdfGenAI Risks & Security Meetup 01052024.pdf
GenAI Risks & Security Meetup 01052024.pdf
 
Boost PC performance: How more available memory can improve productivity
Boost PC performance: How more available memory can improve productivityBoost PC performance: How more available memory can improve productivity
Boost PC performance: How more available memory can improve productivity
 
Finology Group – Insurtech Innovation Award 2024
Finology Group – Insurtech Innovation Award 2024Finology Group – Insurtech Innovation Award 2024
Finology Group – Insurtech Innovation Award 2024
 
The 7 Things I Know About Cyber Security After 25 Years | April 2024
The 7 Things I Know About Cyber Security After 25 Years | April 2024The 7 Things I Know About Cyber Security After 25 Years | April 2024
The 7 Things I Know About Cyber Security After 25 Years | April 2024
 
Mastering MySQL Database Architecture: Deep Dive into MySQL Shell and MySQL R...
Mastering MySQL Database Architecture: Deep Dive into MySQL Shell and MySQL R...Mastering MySQL Database Architecture: Deep Dive into MySQL Shell and MySQL R...
Mastering MySQL Database Architecture: Deep Dive into MySQL Shell and MySQL R...
 
Tech Trends Report 2024 Future Today Institute.pdf
Tech Trends Report 2024 Future Today Institute.pdfTech Trends Report 2024 Future Today Institute.pdf
Tech Trends Report 2024 Future Today Institute.pdf
 
presentation ICT roal in 21st century education
presentation ICT roal in 21st century educationpresentation ICT roal in 21st century education
presentation ICT roal in 21st century education
 
2024: Domino Containers - The Next Step. News from the Domino Container commu...
2024: Domino Containers - The Next Step. News from the Domino Container commu...2024: Domino Containers - The Next Step. News from the Domino Container commu...
2024: Domino Containers - The Next Step. News from the Domino Container commu...
 
A Domino Admins Adventures (Engage 2024)
A Domino Admins Adventures (Engage 2024)A Domino Admins Adventures (Engage 2024)
A Domino Admins Adventures (Engage 2024)
 
Histor y of HAM Radio presentation slide
Histor y of HAM Radio presentation slideHistor y of HAM Radio presentation slide
Histor y of HAM Radio presentation slide
 
Boost Fertility New Invention Ups Success Rates.pdf
Boost Fertility New Invention Ups Success Rates.pdfBoost Fertility New Invention Ups Success Rates.pdf
Boost Fertility New Invention Ups Success Rates.pdf
 
Understanding Discord NSFW Servers A Guide for Responsible Users.pdf
Understanding Discord NSFW Servers A Guide for Responsible Users.pdfUnderstanding Discord NSFW Servers A Guide for Responsible Users.pdf
Understanding Discord NSFW Servers A Guide for Responsible Users.pdf
 
Artificial Intelligence: Facts and Myths
Artificial Intelligence: Facts and MythsArtificial Intelligence: Facts and Myths
Artificial Intelligence: Facts and Myths
 
Evaluating the top large language models.pdf
Evaluating the top large language models.pdfEvaluating the top large language models.pdf
Evaluating the top large language models.pdf
 
Presentation on how to chat with PDF using ChatGPT code interpreter
Presentation on how to chat with PDF using ChatGPT code interpreterPresentation on how to chat with PDF using ChatGPT code interpreter
Presentation on how to chat with PDF using ChatGPT code interpreter
 
From Event to Action: Accelerate Your Decision Making with Real-Time Automation
From Event to Action: Accelerate Your Decision Making with Real-Time AutomationFrom Event to Action: Accelerate Your Decision Making with Real-Time Automation
From Event to Action: Accelerate Your Decision Making with Real-Time Automation
 
08448380779 Call Girls In Diplomatic Enclave Women Seeking Men
08448380779 Call Girls In Diplomatic Enclave Women Seeking Men08448380779 Call Girls In Diplomatic Enclave Women Seeking Men
08448380779 Call Girls In Diplomatic Enclave Women Seeking Men
 
The Role of Taxonomy and Ontology in Semantic Layers - Heather Hedden.pdf
The Role of Taxonomy and Ontology in Semantic Layers - Heather Hedden.pdfThe Role of Taxonomy and Ontology in Semantic Layers - Heather Hedden.pdf
The Role of Taxonomy and Ontology in Semantic Layers - Heather Hedden.pdf
 

Cloud Security Introduction

  • 2. Agenda ● Cyber security ● Security incidents ● Cloud Computing ● Cloud Security ● Q & A 2
  • 4. What is Cyber security Cybersecurity is the art of protecting networks, devices, and data from unauthorized access or criminal use and the practice of ensuring confidentiality, integrity, and availability of information. Security is a very subjective terms. Every person has their own definition of security, that’s why there are many standards in security 4
  • 5. Types of Security ● Computer Security - generic name for the collection of tools designed to protect data and to thwart hackers ● Network Security - measures to protect data during their transmission ● Internet Security - measures to protect data during their transmission over a collec)on of interconnected networks 5
  • 6. Goals of Information Security (CIA) ● Confidentiality. prevents unauthorized use or disclosure of information ● Integrity. safeguards the accuracy and completeness of information ● Availability. authorized users have reliable and timely access to information 6
  • 7. Access Control ● Ability to permit or deny the use of an object by a subject. ● It provides 3 essential services (AAA): ○ Authentication and Identification (who can login) ■ What you know ■ What you have ■ What you are ○ Authorization (what authorized users can do) ○ Accountability (keep track what a user did) 7
  • 8. Vulnerability A weakness in security procedures, network design, or implementation that can be exploited to violate a corporate security policy ● Software bugs ● Configuration mistakes ● Network design flaw Exploit ● Taking advantage of a vulnerability CVE: Common Vulnerability and Exposure (https://cve.mitre.org) 8
  • 9. Threat Any circumstance or event with the potential to cause harm to a networked system ● Denial of service (DOS): make computer resources (e.g., bandwidth, disk space, or CPU ) unavailable to its intended users ● Unauthorised access: Access without of permission issued by a rightul owner of devices or networks ● Impersonation ○ Identity theft ● Worms ● Viruses ● Malware 9
  • 10. The possibility that a particular vulnerability will be exploited Risk analysis is the process of identifying: ● security risks ● determining their impact ● and identifying areas require protection Risk 10
  • 12. Customer data security breach ● https://en.wikipedia.org/wiki/Data_breach ● Is your account safe? 12
  • 13. CIA espionage (vault7) ● https://wikileaks.org/ciav7p1/cms/index.html ● https://techcrunch.com/2017/03/09/names-and-d efinitions-of-leaked-cia-hacking-tools/ ● https://wikileaks.org/ciav7p1/cms/files/2014%20 10%2023%20--%20EDG%20Testing%20White %20Paper%20--%20Rev%20Draft%20B.docx ● 13
  • 14. Telkom as ads injector ● Telkom injects ads on every http request from customer ● Around 2013 - ? ● script 14
  • 16. Can you live without them? 16
  • 17. So, everything is connected? 17
  • 18. New paradigm: human netwwork From computer network -> human network 18
  • 19. Cloud computing (CC) is... A concept of using the internet/network to provide Everything as a service (EaaS) ● New paradigm: sell services instead of products ● IaaS, Infrastructure as a Service (RAM, CPU, Storage) ● PaaS, Platform as a Service (frameworks) ● SaaS, Software as a Service (eg. Text editor, cpu, storage) 19
  • 20. How to achieve cloud computing ● Distributed computing ● Grid computing ● virtualisation 20
  • 22. CC in short... ● If want you need is a milk, why do you buy a cow? ● There is no cloud, it’s just someone else’s computer 22
  • 24. Put security on your cloud ● See previous slide… ● 24
  • 26. Use HTTPS ● Dont use HTTP based website ● Always use https when accessing website ● HTTPS will encrypt traffic from browser to web server ● 26
  • 27. Use DNS redirector/filter ● Nawala (www.nawala.org) ● Opendns (https://www.opendns.com) ● Local DNS filter: ○ Can be embeded onto your network devices ○ Can be external: example: pi hole (https://pi-hole.net) 27
  • 28. Use script blocker (more control) ● This plugin will block scripts until you allow it to be executed ● More control 28
  • 29. Activate Multi Factor authentication (MFA / 2FA) ● Similar to math: ○ What is the factor of 18? ■ 1 and 18 ■ 2 and 9 ■ 3 and 6 ● How many factors to authenticate yourself to website? 29 Single factor 2 factor
  • 30. Check if your account has been breached 30
  • 31. Vendor support ● Security incident ● Security updates ● Always communicate with vendor to make sure always get support for security ● 31
  • 32. summary ● The strength of security depends on the weakest link of the chains ● Always upgrade skill and knowledge ● Be humble when speak about security. Do not attract attention 32
  • 33. QA 33
  • 34. End of slides ● Thank you for your attention ● 34