IT services – on demand, pay per service, internet delivery, etc
For IaaS model. Consumer must be in complete control of the geographic location of infrastructure and what runs on the server
From “ Characterizing Intrusion Detection Sensors” by Shaikh, A. S., Chivers, H., Nobles. P., & Clark. A.J. 2008, Network Security p.10 Copyright 2008
Customer have higher degree of control and transparency, comply with security standards, regulatory compliance Customer of public cloud has a low degree of degree, since security management are done by vendors Hybrid cloud combination of two or more type of clouds
-Scalability, as in flexible business model according to the size of the organization -Pay for use model. -less maintenance as in patches and updates, in this virtualized environment. Increased automation also saves cost. Flexibility and the ownership /operation of hardware all getting outsourced. . If you’ve ever used MySpace, Facebook, LinkedIn, Picasa, Flickr, Hotmail, or Gmail, then you’ve used cloud computing
concern is to trust that a company's or an individual's information is both secure and private Unplanned outages - Understanding the cloud provider’s disaster recovery and business continuity measures, negotiating strong service level agreements and disaster recovery commitments, A major concern with cloud computing is the difficulty of determining where data will be stored, and, thus, what courts have jurisdiction and what law governs the use and treatment of such data (i.e., local, state, federal, foreign, etc.). For the location of data you wouldn’t know where it is located too
Jericho Forum and CSA joined forces to push for technology to allow business , to collaborate securely in the cloud.
- Categorize data for private and public cloud – basic usage of data and requirement.