SlideShare a Scribd company logo
1 of 9
Risks in cloud computing
BY
N.RUBA
ASST.PROF,
DEPT. OF COMPUTER APPLICATIONS,
BON SECOURS COLLEGE FOR WOMEN,
THANJAVUR.
Cloud computing & security
 Risks in cloud computing
 Introduction
 risk management
 Cloud impact
 Enterprise wide risk management
 Types of risks in CC
Risks in cloud computing
 Introduction
 Two kinds of providers
 CSP cloud service providers/SaaS or PaaS providers
 Cloud infrastructure providers/IaaS
 Feature rich applications
 Infrastructure
 Storage
 Platform
 Appln
 Services
 Client
 Security anxieties
 Secure data transfer
 Secure program interfaces
 Secure retained data
 User access to control
 Data separation
contd
 Cloud computing risks
 the solution may not meet its economic objectives
 The solution may not work in the context of the client’s
enterprise’s association
 The solution may not be tough to evolve due to adversity of
incorporating the cloud services
 A catastrophe (event cause sudden damage)may occur from
which the solution will not recover
 system that it does not meet the us value may be in sufficient,
in or users needs
 There may be an existing need For service orientation
RISK Management
 Is a significant part of business planning
 Is believed to reduce or eradicate the risk of certain types of
happenings.
 risk admin measures evolved by project mgmt institute,
ISO(international Organization for standardization),National
institute of science & technology societies.
 In cc new in its present pattern, granted to reduce
intermediate risk enterprise area.
 CLOUD IMPACT-any action
 -provided possibilities for organization of all types to reduce
the risks affiliated to IT acquisition(h/w &s/w)
ENTERPRISE WIDE RISK MANAGEMENT
• RM-followed to avert as many errors as possible and devising fee
procedures for the rest.
• Analyze the following
 Hazards(danger)-e.g blaze, tomato, robbery, privacy, vandalism or crime
 Internal procedure exposure initiated by security & security practices
,workers reimbursement & worker dishonesty.
 Mgmt process--.Six steps
 Determination of the objectives of the risk admin program
 Identification of the risks-
 analysis questionnaires, exposure checklist, flowchart, analysis of
financial stmt, other internal records, inspections & interview
 Evaluation of risks- critical , significant or insignificant
 Consideration of options and assortment of the risk remedy device
 Implementation of the decision
 Evaluation & reconsider
TYPES OF RISKS IN CC
THREATS:-
1. Misuse and illicit (forbidden by laws)use of CC
2. Insecure interfaces and APIs
3. Vicious insiders-violent
4. Issues-related technology sharing
5. Data loss or leakage
6. Hijacking(account/service)-unlawfully seize
7. Unknown risk profile
 Internal security risk-bcoz of flexibility login access by
unauthorized person.
 External security risk
 Data protection risk
 Data loss
THANK YOU

More Related Content

What's hot

Information Secuirty Vulnerability Management
Information Secuirty   Vulnerability ManagementInformation Secuirty   Vulnerability Management
Information Secuirty Vulnerability Management
tschraider
 
SOC3D_Brochure_NEW_Digital
SOC3D_Brochure_NEW_DigitalSOC3D_Brochure_NEW_Digital
SOC3D_Brochure_NEW_Digital
Oscar Williams
 

What's hot (20)

10 Steps to Building an Effective Vulnerability Management Program
10 Steps to Building an Effective Vulnerability Management Program10 Steps to Building an Effective Vulnerability Management Program
10 Steps to Building an Effective Vulnerability Management Program
 
L008 Disaster Recovery Plan (2016)
L008 Disaster Recovery Plan (2016)L008 Disaster Recovery Plan (2016)
L008 Disaster Recovery Plan (2016)
 
Information Secuirty Vulnerability Management
Information Secuirty   Vulnerability ManagementInformation Secuirty   Vulnerability Management
Information Secuirty Vulnerability Management
 
An Intro to Resolver's Resilience Application
An Intro to Resolver's Resilience ApplicationAn Intro to Resolver's Resilience Application
An Intro to Resolver's Resilience Application
 
Best Practices and ROI for Risk-based Vulnerability Management
Best Practices and ROI for Risk-based Vulnerability ManagementBest Practices and ROI for Risk-based Vulnerability Management
Best Practices and ROI for Risk-based Vulnerability Management
 
Risk monitoring and response
Risk monitoring and responseRisk monitoring and response
Risk monitoring and response
 
Designing NextGen Threat Identification Solutions
Designing NextGen Threat Identification SolutionsDesigning NextGen Threat Identification Solutions
Designing NextGen Threat Identification Solutions
 
IT Security and Risk Management - Visionet Systems
IT Security and Risk Management - Visionet SystemsIT Security and Risk Management - Visionet Systems
IT Security and Risk Management - Visionet Systems
 
An Intro to Resolver's Compliance Application
An Intro to Resolver's Compliance ApplicationAn Intro to Resolver's Compliance Application
An Intro to Resolver's Compliance Application
 
App Showcase: Compliance
App Showcase: ComplianceApp Showcase: Compliance
App Showcase: Compliance
 
USPS CISO Academy - Vulnerability Management
USPS CISO Academy - Vulnerability ManagementUSPS CISO Academy - Vulnerability Management
USPS CISO Academy - Vulnerability Management
 
Security & Risk Management
Security & Risk ManagementSecurity & Risk Management
Security & Risk Management
 
Fulcrum Group- Layer Your DR/BC
Fulcrum Group- Layer Your DR/BCFulcrum Group- Layer Your DR/BC
Fulcrum Group- Layer Your DR/BC
 
Web Application Security Vulnerability Management Framework
Web Application Security Vulnerability Management FrameworkWeb Application Security Vulnerability Management Framework
Web Application Security Vulnerability Management Framework
 
EXIGIS RiskWorksPS Solution Overview
EXIGIS RiskWorksPS Solution OverviewEXIGIS RiskWorksPS Solution Overview
EXIGIS RiskWorksPS Solution Overview
 
SOC3D_Brochure_NEW_Digital
SOC3D_Brochure_NEW_DigitalSOC3D_Brochure_NEW_Digital
SOC3D_Brochure_NEW_Digital
 
Lightweight Cybersecurity Risk Assessment Tools for Cyberinfrastructure
Lightweight Cybersecurity Risk Assessment Tools for CyberinfrastructureLightweight Cybersecurity Risk Assessment Tools for Cyberinfrastructure
Lightweight Cybersecurity Risk Assessment Tools for Cyberinfrastructure
 
SuprTEK Continuous Monitoring
SuprTEK Continuous MonitoringSuprTEK Continuous Monitoring
SuprTEK Continuous Monitoring
 
Risk Assessment Process NIST 800-30
Risk Assessment Process NIST 800-30Risk Assessment Process NIST 800-30
Risk Assessment Process NIST 800-30
 
Risk Management Methodology - Copy
Risk Management Methodology - CopyRisk Management Methodology - Copy
Risk Management Methodology - Copy
 

Similar to Risks in cc

future internetArticleERMOCTAVE A Risk Management Fra.docx
future internetArticleERMOCTAVE A Risk Management Fra.docxfuture internetArticleERMOCTAVE A Risk Management Fra.docx
future internetArticleERMOCTAVE A Risk Management Fra.docx
gilbertkpeters11344
 
future internetArticleERMOCTAVE A Risk Management Fra
future internetArticleERMOCTAVE A Risk Management Frafuture internetArticleERMOCTAVE A Risk Management Fra
future internetArticleERMOCTAVE A Risk Management Fra
DustiBuckner14
 
1973-16 Tackling the challenges of cyber security_19_03_15
1973-16 Tackling the challenges of cyber security_19_03_151973-16 Tackling the challenges of cyber security_19_03_15
1973-16 Tackling the challenges of cyber security_19_03_15
shed59
 
CANSO-Safety_Cybersecurity-Risk-Assessment-Guide-2023.pdf
CANSO-Safety_Cybersecurity-Risk-Assessment-Guide-2023.pdfCANSO-Safety_Cybersecurity-Risk-Assessment-Guide-2023.pdf
CANSO-Safety_Cybersecurity-Risk-Assessment-Guide-2023.pdf
walterzamprogno1
 
Frans van Leuven - The security aspects of Cloud Services
Frans van Leuven - The security aspects of Cloud ServicesFrans van Leuven - The security aspects of Cloud Services
Frans van Leuven - The security aspects of Cloud Services
VNU Exhibitions Europe
 
BDQCRM Service Offering Phase I Scoring
BDQCRM Service Offering Phase I ScoringBDQCRM Service Offering Phase I Scoring
BDQCRM Service Offering Phase I Scoring
Mitchell Grooms
 
AP_Cybersecurity_and_Risk_Management_Lead_from_the_C-suite_Mar_2016
AP_Cybersecurity_and_Risk_Management_Lead_from_the_C-suite_Mar_2016AP_Cybersecurity_and_Risk_Management_Lead_from_the_C-suite_Mar_2016
AP_Cybersecurity_and_Risk_Management_Lead_from_the_C-suite_Mar_2016
Ben Browning
 
Risk management planExecutive SummaryThe past.docx
Risk management planExecutive SummaryThe past.docxRisk management planExecutive SummaryThe past.docx
Risk management planExecutive SummaryThe past.docx
SUBHI7
 
Project Risk Management-Pankaj K Sinha
Project Risk Management-Pankaj K SinhaProject Risk Management-Pankaj K Sinha
Project Risk Management-Pankaj K Sinha
Pankaj K Sinha
 

Similar to Risks in cc (20)

Irv Badr: Managing Risk Safety and Security Compliance
Irv Badr: Managing Risk Safety and Security Compliance Irv Badr: Managing Risk Safety and Security Compliance
Irv Badr: Managing Risk Safety and Security Compliance
 
future internetArticleERMOCTAVE A Risk Management Fra.docx
future internetArticleERMOCTAVE A Risk Management Fra.docxfuture internetArticleERMOCTAVE A Risk Management Fra.docx
future internetArticleERMOCTAVE A Risk Management Fra.docx
 
future internetArticleERMOCTAVE A Risk Management Fra
future internetArticleERMOCTAVE A Risk Management Frafuture internetArticleERMOCTAVE A Risk Management Fra
future internetArticleERMOCTAVE A Risk Management Fra
 
Future internet articleermoctave a risk management fra
Future internet articleermoctave a risk management fraFuture internet articleermoctave a risk management fra
Future internet articleermoctave a risk management fra
 
F041123639
F041123639F041123639
F041123639
 
1973-16 Tackling the challenges of cyber security_19_03_15
1973-16 Tackling the challenges of cyber security_19_03_151973-16 Tackling the challenges of cyber security_19_03_15
1973-16 Tackling the challenges of cyber security_19_03_15
 
Risk Management Methodologies in Construction Industries
Risk Management Methodologies in Construction IndustriesRisk Management Methodologies in Construction Industries
Risk Management Methodologies in Construction Industries
 
CANSO-Safety_Cybersecurity-Risk-Assessment-Guide-2023.pdf
CANSO-Safety_Cybersecurity-Risk-Assessment-Guide-2023.pdfCANSO-Safety_Cybersecurity-Risk-Assessment-Guide-2023.pdf
CANSO-Safety_Cybersecurity-Risk-Assessment-Guide-2023.pdf
 
Frans van Leuven - The security aspects of Cloud Services
Frans van Leuven - The security aspects of Cloud ServicesFrans van Leuven - The security aspects of Cloud Services
Frans van Leuven - The security aspects of Cloud Services
 
Sample Risk Assessment Report- QuantumBanking.pdf
Sample Risk Assessment Report- QuantumBanking.pdfSample Risk Assessment Report- QuantumBanking.pdf
Sample Risk Assessment Report- QuantumBanking.pdf
 
Chapter 5 - Risk Management - 2nd Semester - M.Com - Bangalore University
Chapter 5 - Risk Management - 2nd Semester - M.Com - Bangalore UniversityChapter 5 - Risk Management - 2nd Semester - M.Com - Bangalore University
Chapter 5 - Risk Management - 2nd Semester - M.Com - Bangalore University
 
BDQCRM Service Offering Phase I Scoring
BDQCRM Service Offering Phase I ScoringBDQCRM Service Offering Phase I Scoring
BDQCRM Service Offering Phase I Scoring
 
An Intro to Resolver's Incident Management Application
An Intro to Resolver's Incident Management ApplicationAn Intro to Resolver's Incident Management Application
An Intro to Resolver's Incident Management Application
 
AP_Cybersecurity_and_Risk_Management_Lead_from_the_C-suite_Mar_2016
AP_Cybersecurity_and_Risk_Management_Lead_from_the_C-suite_Mar_2016AP_Cybersecurity_and_Risk_Management_Lead_from_the_C-suite_Mar_2016
AP_Cybersecurity_and_Risk_Management_Lead_from_the_C-suite_Mar_2016
 
Information Technology Risk Management
Information Technology Risk ManagementInformation Technology Risk Management
Information Technology Risk Management
 
Cyber Resilience - Welcoming New Normal - Eryk
Cyber Resilience - Welcoming New Normal - ErykCyber Resilience - Welcoming New Normal - Eryk
Cyber Resilience - Welcoming New Normal - Eryk
 
Risk management planExecutive SummaryThe past.docx
Risk management planExecutive SummaryThe past.docxRisk management planExecutive SummaryThe past.docx
Risk management planExecutive SummaryThe past.docx
 
Risk Management
Risk ManagementRisk Management
Risk Management
 
Project Risk Management-Pankaj K Sinha
Project Risk Management-Pankaj K SinhaProject Risk Management-Pankaj K Sinha
Project Risk Management-Pankaj K Sinha
 
CRISC Course Preview
CRISC Course PreviewCRISC Course Preview
CRISC Course Preview
 

More from RubaNagarajan

More from RubaNagarajan (19)

Computer graphics-CRT.pptx
Computer graphics-CRT.pptxComputer graphics-CRT.pptx
Computer graphics-CRT.pptx
 
Matrix representation- CG.pptx
Matrix representation- CG.pptxMatrix representation- CG.pptx
Matrix representation- CG.pptx
 
Personality development.pptx
Personality development.pptxPersonality development.pptx
Personality development.pptx
 
TRANSFORMATION-CG.pptx
TRANSFORMATION-CG.pptxTRANSFORMATION-CG.pptx
TRANSFORMATION-CG.pptx
 
dda algorithm-cg.pptx
dda algorithm-cg.pptxdda algorithm-cg.pptx
dda algorithm-cg.pptx
 
line attributes.pptx
line attributes.pptxline attributes.pptx
line attributes.pptx
 
Java files and io streams
Java files and io streamsJava files and io streams
Java files and io streams
 
Java -Exception handlingunit-iv
Java -Exception handlingunit-ivJava -Exception handlingunit-iv
Java -Exception handlingunit-iv
 
Java Programming
Java Programming Java Programming
Java Programming
 
Features of java unit 1
Features of java unit 1Features of java unit 1
Features of java unit 1
 
Introduction to Java -unit-1
Introduction to Java -unit-1Introduction to Java -unit-1
Introduction to Java -unit-1
 
Constructors in C++
Constructors in C++Constructors in C++
Constructors in C++
 
Dreamweaver
DreamweaverDreamweaver
Dreamweaver
 
Working principles of internet
Working principles of internetWorking principles of internet
Working principles of internet
 
Coreldraw
CoreldrawCoreldraw
Coreldraw
 
C programming
C programmingC programming
C programming
 
OPERATING SYSTEM
OPERATING SYSTEMOPERATING SYSTEM
OPERATING SYSTEM
 
Virtualization in cloud computing
Virtualization in cloud computingVirtualization in cloud computing
Virtualization in cloud computing
 
Cloud computing technology
Cloud computing technologyCloud computing technology
Cloud computing technology
 

Recently uploaded

1029 - Danh muc Sach Giao Khoa 10 . pdf
1029 -  Danh muc Sach Giao Khoa 10 . pdf1029 -  Danh muc Sach Giao Khoa 10 . pdf
1029 - Danh muc Sach Giao Khoa 10 . pdf
QucHHunhnh
 
Spellings Wk 3 English CAPS CARES Please Practise
Spellings Wk 3 English CAPS CARES Please PractiseSpellings Wk 3 English CAPS CARES Please Practise
Spellings Wk 3 English CAPS CARES Please Practise
AnaAcapella
 
The basics of sentences session 3pptx.pptx
The basics of sentences session 3pptx.pptxThe basics of sentences session 3pptx.pptx
The basics of sentences session 3pptx.pptx
heathfieldcps1
 
1029-Danh muc Sach Giao Khoa khoi 6.pdf
1029-Danh muc Sach Giao Khoa khoi  6.pdf1029-Danh muc Sach Giao Khoa khoi  6.pdf
1029-Danh muc Sach Giao Khoa khoi 6.pdf
QucHHunhnh
 

Recently uploaded (20)

Basic Civil Engineering first year Notes- Chapter 4 Building.pptx
Basic Civil Engineering first year Notes- Chapter 4 Building.pptxBasic Civil Engineering first year Notes- Chapter 4 Building.pptx
Basic Civil Engineering first year Notes- Chapter 4 Building.pptx
 
1029 - Danh muc Sach Giao Khoa 10 . pdf
1029 -  Danh muc Sach Giao Khoa 10 . pdf1029 -  Danh muc Sach Giao Khoa 10 . pdf
1029 - Danh muc Sach Giao Khoa 10 . pdf
 
Spellings Wk 3 English CAPS CARES Please Practise
Spellings Wk 3 English CAPS CARES Please PractiseSpellings Wk 3 English CAPS CARES Please Practise
Spellings Wk 3 English CAPS CARES Please Practise
 
microwave assisted reaction. General introduction
microwave assisted reaction. General introductionmicrowave assisted reaction. General introduction
microwave assisted reaction. General introduction
 
TỔNG ÔN TẬP THI VÀO LỚP 10 MÔN TIẾNG ANH NĂM HỌC 2023 - 2024 CÓ ĐÁP ÁN (NGỮ Â...
TỔNG ÔN TẬP THI VÀO LỚP 10 MÔN TIẾNG ANH NĂM HỌC 2023 - 2024 CÓ ĐÁP ÁN (NGỮ Â...TỔNG ÔN TẬP THI VÀO LỚP 10 MÔN TIẾNG ANH NĂM HỌC 2023 - 2024 CÓ ĐÁP ÁN (NGỮ Â...
TỔNG ÔN TẬP THI VÀO LỚP 10 MÔN TIẾNG ANH NĂM HỌC 2023 - 2024 CÓ ĐÁP ÁN (NGỮ Â...
 
ComPTIA Overview | Comptia Security+ Book SY0-701
ComPTIA Overview | Comptia Security+ Book SY0-701ComPTIA Overview | Comptia Security+ Book SY0-701
ComPTIA Overview | Comptia Security+ Book SY0-701
 
2024-NATIONAL-LEARNING-CAMP-AND-OTHER.pptx
2024-NATIONAL-LEARNING-CAMP-AND-OTHER.pptx2024-NATIONAL-LEARNING-CAMP-AND-OTHER.pptx
2024-NATIONAL-LEARNING-CAMP-AND-OTHER.pptx
 
Unit-IV- Pharma. Marketing Channels.pptx
Unit-IV- Pharma. Marketing Channels.pptxUnit-IV- Pharma. Marketing Channels.pptx
Unit-IV- Pharma. Marketing Channels.pptx
 
Grant Readiness 101 TechSoup and Remy Consulting
Grant Readiness 101 TechSoup and Remy ConsultingGrant Readiness 101 TechSoup and Remy Consulting
Grant Readiness 101 TechSoup and Remy Consulting
 
SOC 101 Demonstration of Learning Presentation
SOC 101 Demonstration of Learning PresentationSOC 101 Demonstration of Learning Presentation
SOC 101 Demonstration of Learning Presentation
 
PROCESS RECORDING FORMAT.docx
PROCESS      RECORDING        FORMAT.docxPROCESS      RECORDING        FORMAT.docx
PROCESS RECORDING FORMAT.docx
 
The basics of sentences session 3pptx.pptx
The basics of sentences session 3pptx.pptxThe basics of sentences session 3pptx.pptx
The basics of sentences session 3pptx.pptx
 
Explore beautiful and ugly buildings. Mathematics helps us create beautiful d...
Explore beautiful and ugly buildings. Mathematics helps us create beautiful d...Explore beautiful and ugly buildings. Mathematics helps us create beautiful d...
Explore beautiful and ugly buildings. Mathematics helps us create beautiful d...
 
Accessible Digital Futures project (20/03/2024)
Accessible Digital Futures project (20/03/2024)Accessible Digital Futures project (20/03/2024)
Accessible Digital Futures project (20/03/2024)
 
Understanding Accommodations and Modifications
Understanding  Accommodations and ModificationsUnderstanding  Accommodations and Modifications
Understanding Accommodations and Modifications
 
ICT role in 21st century education and it's challenges.
ICT role in 21st century education and it's challenges.ICT role in 21st century education and it's challenges.
ICT role in 21st century education and it's challenges.
 
Third Battle of Panipat detailed notes.pptx
Third Battle of Panipat detailed notes.pptxThird Battle of Panipat detailed notes.pptx
Third Battle of Panipat detailed notes.pptx
 
1029-Danh muc Sach Giao Khoa khoi 6.pdf
1029-Danh muc Sach Giao Khoa khoi  6.pdf1029-Danh muc Sach Giao Khoa khoi  6.pdf
1029-Danh muc Sach Giao Khoa khoi 6.pdf
 
General Principles of Intellectual Property: Concepts of Intellectual Proper...
General Principles of Intellectual Property: Concepts of Intellectual  Proper...General Principles of Intellectual Property: Concepts of Intellectual  Proper...
General Principles of Intellectual Property: Concepts of Intellectual Proper...
 
Making communications land - Are they received and understood as intended? we...
Making communications land - Are they received and understood as intended? we...Making communications land - Are they received and understood as intended? we...
Making communications land - Are they received and understood as intended? we...
 

Risks in cc

  • 1. Risks in cloud computing BY N.RUBA ASST.PROF, DEPT. OF COMPUTER APPLICATIONS, BON SECOURS COLLEGE FOR WOMEN, THANJAVUR.
  • 2. Cloud computing & security  Risks in cloud computing  Introduction  risk management  Cloud impact  Enterprise wide risk management  Types of risks in CC
  • 3. Risks in cloud computing  Introduction  Two kinds of providers  CSP cloud service providers/SaaS or PaaS providers  Cloud infrastructure providers/IaaS  Feature rich applications  Infrastructure  Storage  Platform  Appln  Services  Client
  • 4.  Security anxieties  Secure data transfer  Secure program interfaces  Secure retained data  User access to control  Data separation
  • 5. contd  Cloud computing risks  the solution may not meet its economic objectives  The solution may not work in the context of the client’s enterprise’s association  The solution may not be tough to evolve due to adversity of incorporating the cloud services  A catastrophe (event cause sudden damage)may occur from which the solution will not recover  system that it does not meet the us value may be in sufficient, in or users needs  There may be an existing need For service orientation
  • 6. RISK Management  Is a significant part of business planning  Is believed to reduce or eradicate the risk of certain types of happenings.  risk admin measures evolved by project mgmt institute, ISO(international Organization for standardization),National institute of science & technology societies.  In cc new in its present pattern, granted to reduce intermediate risk enterprise area.  CLOUD IMPACT-any action  -provided possibilities for organization of all types to reduce the risks affiliated to IT acquisition(h/w &s/w)
  • 7. ENTERPRISE WIDE RISK MANAGEMENT • RM-followed to avert as many errors as possible and devising fee procedures for the rest. • Analyze the following  Hazards(danger)-e.g blaze, tomato, robbery, privacy, vandalism or crime  Internal procedure exposure initiated by security & security practices ,workers reimbursement & worker dishonesty.  Mgmt process--.Six steps  Determination of the objectives of the risk admin program  Identification of the risks-  analysis questionnaires, exposure checklist, flowchart, analysis of financial stmt, other internal records, inspections & interview  Evaluation of risks- critical , significant or insignificant  Consideration of options and assortment of the risk remedy device  Implementation of the decision  Evaluation & reconsider
  • 8. TYPES OF RISKS IN CC THREATS:- 1. Misuse and illicit (forbidden by laws)use of CC 2. Insecure interfaces and APIs 3. Vicious insiders-violent 4. Issues-related technology sharing 5. Data loss or leakage 6. Hijacking(account/service)-unlawfully seize 7. Unknown risk profile  Internal security risk-bcoz of flexibility login access by unauthorized person.  External security risk  Data protection risk  Data loss