Beyond the EU: DORA and NIS 2 Directive's Global Impact
final security ppt.pptx
1. Security Challenges and
Mitigation Strategies in
Cloud Computing: A
Comprehensive Review
As cloud technology continues to revolutionize business operations, new
security challenges arise. In this presentation, we explore the most
common threats and mitigation strategies.
by Sukhpreet Singh
2. Background and Motivation
Why this study?
Security is the main
concern for users
migrating to the cloud.
What's at stake?
A breach can result in
data loss, privacy
violations, and
reputational damage.
Who benefits?
This study is intended
for businesses and
decision-makers
looking to evaluate the
security risks
associated with cloud
adoption.
3. What is Cloud Computing?
Infrastructure as a
Service (IaaS)
Allows users to rent
hardware like servers and
virtual machines from a
provider.
Software as a Service
(SaaS)
Provides access to fully
functional applications, like
Google Workspace and
Microsoft 365.
Platform as a Service
(PaaS)
A platform that provides
developers with an
environment to build and
manage web applications.
4. Common Attack Types
1
Denial of
Service
(DoS)
Attacker floods
the system with
traffic, causing
the cloud
system to
crash and
become
unavailable.
2
Malware
Injection
Hackers use
various
techniques to
inject malicious
code into your
system, like
phishing
attacks and
SQL injection.
3
Cross-site
Scripting
(XSS)
Attackers inject
malicious
scripts into a
web application
viewed by
other users,
bypassing
security
functions and
stealing
information.
4
Man-In-The-
Middle
(MITM)
As the name
suggests, an
attacker
intercepts
communication
between two
systems and
steals sensitive
data.
5. Security Challenges in Cloud
Computing
Overview of Security
Threats
Cloud computing
environments are
vulnerable to cyber attacks,
data breaches, and insider
threats.
Risk Assessment and
Management
Risk management is critical
to ensuring the integrity of
data and working to identify
early stage threats before
they become actual
breaches.
Database
maintenance and
monitoring
Effective maintenance and
monitoring of databases is
essential for avoiding
security threats.
6. Security Controls and Mitigation
Strategies
Encryption
Encrypt data in transit and on rest to
protect it from unauthorized access.
Use protocols like SSL and TLS.
Access Control
Limit access to resources by employing
multi-factor authentication, role-based
access control, and least-privilege
permissions.
Logging and Monitoring
Track user activity, monitor system logs
for anomalous behavior, and generate
alerts.
Disaster Recovery (DR) and
Business Continuity Plan (BCP)
Have a plan in place to restore data and
services in the event of a disaster or
interruption.
7. Mitigation Strategies in Cloud
Computing
1 Overview of Available Solutions
Secure multi-cloud, access control, cyber security training, endpoint
protection, and encryption are some of the solutions available for combating
security threats in cloud computing.
2 Challenges and Limitations
Current solutions still have limitations and weaknesses. Effective
implementation combined with constant review is necessary to ensure a
robust and effective security system in the cloud infrastructure.
3 Best Practices
Regular updates of operating systems, scheduled backups, disaster recovery
systems, and access control policies are some of the best practices that can
help to mitigate security risks and threats.
8. Research Methodology
1
Literature Sources
The study reviewed over 50 recent
articles, journals and conference
papers.
2
Search Process
Standardized criteria were followed to
ensure thorough evaluation of the
relevant literature.
3
Inclusion and Exclusion Criteria
Only studies that focused on security
challenges and coverage of mitigation
strategies in cloud computing were
considered.
9. Conclusions and Future Work
1 The Findings
Cloud provider standards
and policies remain a major
challenge while data
breaches remain a serious
threat.
2 New Frontiers
More research is required
to identify new threats and
develop more robust and
intelligent security systems.
3 Final Thoughts
The adoption of cloud computing as the primary platform for
enterprise data storage and management calls for continuous
investment, review, and improvement of cloud security.