public cloud security via ids


Published on

  • Be the first to comment

  • Be the first to like this

public cloud security via ids

  1. 1. DefinitionBenefits of using public cloud
  2. 2.  Identity management Physical and personnel security Availability Application security
  3. 3.  Highly fragmented market Lack of sufficient standards Data lock-in Security threats Service outedges
  4. 4.  1. Select the Right Apps for the Public Cloud. 2. Evaluate and Add Security, If Necessary 3. Identify and Use the Right Third-Party Auditing Services 4. Add Authentication Layers 5. Consider How Additional Security Will Affect Integration 6.IDS
  5. 5.  Definition An IDS is a software or hardware based system that monitors network traffic and monitors for suspicious activity and alerts the system or network administrator Types1. Host-Based Intrusion Detection system (HIDS)2. Network-Based Intrusion Detection system (NIDS)
  6. 6.  Signature Alerts Logs FalseAlarms Sensor
  7. 7.  Snort is an example of an IDS Snort is a very flexible network IDS that has a large set of preconfigured rules. It also allows you to write your own rule set Functions:1. It can serve as a packet sniffer2. It can work as a packet logger3. It can work as a NIDS 10
  8. 8.  Run unattended for extended periods of time Stay active and secure Recognize unusual activity Operate without unduly affecting the system’s activity Configurable 11