SlideShare a Scribd company logo
Cloud is a huge network environment that is very difficult to
handle. Many organizations face a lot of challenges as the
incident handler’s face when the event resources have moved to
the cloud environment. The first problem is the lack of network
device control. With all the resources moving to the cloud, it is
less accessible and lack of control of network device. This is
because, there are no firewalls, intrusion detection sensors or
other proxies to detect any anomaly of events. Another issue
could be with access to the security information in log
management and correlation because most of the logs generated
from the activities within the environment are stored in the
cloud. The next issue is not knowing the location of data in the
cloud. When we use the cloud, we probably won't know exactly
where our data is hosted (Kandukuri, B. R., & Rakshit, A.,
2009). One of the most important challenges could be the
inability to access event data. Some of the attacks could include
Denial of Service (DoS) attacks where you cannot access your
own cloud infrastructure. Application attacks are in which to
access the event information you have to install a web
application firewall. It is not easy to determine, which data
sources are relevant for incident detection especially for SaaS
and PaaS (Tyagi, A. K., & Niladhuri, S., 2016). Misdirection of
abuses/incident reports is another issue faced by the customers
of an organization. There should be a clear understanding
between the CSIRT handling team of a customer and some
incident handling capability of the CSP. Because of resource
pooling, it may be difficult for the CSP to find out, to which of
his customers the report refers (Tyagi et al., 2016). Cloud
computing also has numerous security issues as it encompasses
several technologies like networks, databases, operating
systems, resource scheduling, load balancing, concurrency
control, and management.
References
Tyagi, A. K., & Niladhuri, S. (2016, August). Providing trust
enabled services in vehicular cloud computing. In Proceedings
of the International Conference on Informatics and Analytics
(pp. 1-10).
Kandukuri, B. R., & Rakshit, A. (2009, September). Cloud
security issues. In 2009 IEEE International Conference on
Services Computing (pp. 517-520). IEEE.

More Related Content

Similar to Cloud is a huge network environment that is very difficult to hand.docx

DESIGN AND IMPLEMENT A NEW CLOUD SECURITY METHOD BASED ON MULTI CLOUDS ON OPE...
DESIGN AND IMPLEMENT A NEW CLOUD SECURITY METHOD BASED ON MULTI CLOUDS ON OPE...DESIGN AND IMPLEMENT A NEW CLOUD SECURITY METHOD BASED ON MULTI CLOUDS ON OPE...
DESIGN AND IMPLEMENT A NEW CLOUD SECURITY METHOD BASED ON MULTI CLOUDS ON OPE...
cscpconf
 
Design and implement a new cloud security method based on multi clouds on ope...
Design and implement a new cloud security method based on multi clouds on ope...Design and implement a new cloud security method based on multi clouds on ope...
Design and implement a new cloud security method based on multi clouds on ope...
csandit
 
Running head technology vulnerabilities in the cloud
Running head technology vulnerabilities in the cloud             Running head technology vulnerabilities in the cloud
Running head technology vulnerabilities in the cloud
AKHIL969626
 
A Survey of Cloud Computing Security Issues and Consequences
A Survey of Cloud Computing Security Issues and ConsequencesA Survey of Cloud Computing Security Issues and Consequences
A Survey of Cloud Computing Security Issues and Consequences
Associate Professor in VSB Coimbatore
 
AbstractCloud computing technology has become the new fron.docx
AbstractCloud computing technology has become the new fron.docxAbstractCloud computing technology has become the new fron.docx
AbstractCloud computing technology has become the new fron.docx
SALU18
 
Review on Security Aspects for Cloud Architecture
Review on Security Aspects for Cloud Architecture Review on Security Aspects for Cloud Architecture
Review on Security Aspects for Cloud Architecture
IJECEIAES
 
Ijaprr vol1-1-1-5dr tejinder
Ijaprr vol1-1-1-5dr tejinderIjaprr vol1-1-1-5dr tejinder
Ijaprr vol1-1-1-5dr tejinder
ijaprr_editor
 
Ad4502189193
Ad4502189193Ad4502189193
Ad4502189193
IJERA Editor
 
Eb31854857
Eb31854857Eb31854857
Eb31854857
IJERA Editor
 
B1802041217
B1802041217B1802041217
B1802041217
IOSR Journals
 
Taxonomy of cloud security
Taxonomy of cloud securityTaxonomy of cloud security
Taxonomy of cloud security
IJCSEA Journal
 
Discussion 1Cloud computing offers the ability to share informat
Discussion 1Cloud computing offers the ability to share informatDiscussion 1Cloud computing offers the ability to share informat
Discussion 1Cloud computing offers the ability to share informat
VinaOconner450
 
Security Issues in Cloud Computing by rahul abhishek
Security Issues in Cloud Computing  by rahul abhishekSecurity Issues in Cloud Computing  by rahul abhishek
Security Issues in Cloud Computing by rahul abhishek
Er. rahul abhishek
 
SECURE CLOUD ARCHITECTURE
SECURE CLOUD ARCHITECTURESECURE CLOUD ARCHITECTURE
SECURE CLOUD ARCHITECTURE
acijjournal
 
Ijaprr vol1-1-1-5dr tejinder
Ijaprr vol1-1-1-5dr tejinderIjaprr vol1-1-1-5dr tejinder
Ijaprr vol1-1-1-5dr tejinder
ijaprr
 
CLOUD COMPUTING -Risks, Countermeasures, Costs and Benefits-
CLOUD COMPUTING -Risks, Countermeasures, Costs and Benefits-CLOUD COMPUTING -Risks, Countermeasures, Costs and Benefits-
CLOUD COMPUTING -Risks, Countermeasures, Costs and Benefits-
Lillian Ekwosi-Egbulem
 
Ijsrp p5211
Ijsrp p5211Ijsrp p5211
A survey on cloud security issues and techniques
A survey on cloud security issues and techniquesA survey on cloud security issues and techniques
A survey on cloud security issues and techniques
ijcsa
 
Cloud computing seminar report
Cloud computing seminar reportCloud computing seminar report
Cloud computing seminar report
shafzonly
 
B018211016
B018211016B018211016
B018211016
IOSR Journals
 

Similar to Cloud is a huge network environment that is very difficult to hand.docx (20)

DESIGN AND IMPLEMENT A NEW CLOUD SECURITY METHOD BASED ON MULTI CLOUDS ON OPE...
DESIGN AND IMPLEMENT A NEW CLOUD SECURITY METHOD BASED ON MULTI CLOUDS ON OPE...DESIGN AND IMPLEMENT A NEW CLOUD SECURITY METHOD BASED ON MULTI CLOUDS ON OPE...
DESIGN AND IMPLEMENT A NEW CLOUD SECURITY METHOD BASED ON MULTI CLOUDS ON OPE...
 
Design and implement a new cloud security method based on multi clouds on ope...
Design and implement a new cloud security method based on multi clouds on ope...Design and implement a new cloud security method based on multi clouds on ope...
Design and implement a new cloud security method based on multi clouds on ope...
 
Running head technology vulnerabilities in the cloud
Running head technology vulnerabilities in the cloud             Running head technology vulnerabilities in the cloud
Running head technology vulnerabilities in the cloud
 
A Survey of Cloud Computing Security Issues and Consequences
A Survey of Cloud Computing Security Issues and ConsequencesA Survey of Cloud Computing Security Issues and Consequences
A Survey of Cloud Computing Security Issues and Consequences
 
AbstractCloud computing technology has become the new fron.docx
AbstractCloud computing technology has become the new fron.docxAbstractCloud computing technology has become the new fron.docx
AbstractCloud computing technology has become the new fron.docx
 
Review on Security Aspects for Cloud Architecture
Review on Security Aspects for Cloud Architecture Review on Security Aspects for Cloud Architecture
Review on Security Aspects for Cloud Architecture
 
Ijaprr vol1-1-1-5dr tejinder
Ijaprr vol1-1-1-5dr tejinderIjaprr vol1-1-1-5dr tejinder
Ijaprr vol1-1-1-5dr tejinder
 
Ad4502189193
Ad4502189193Ad4502189193
Ad4502189193
 
Eb31854857
Eb31854857Eb31854857
Eb31854857
 
B1802041217
B1802041217B1802041217
B1802041217
 
Taxonomy of cloud security
Taxonomy of cloud securityTaxonomy of cloud security
Taxonomy of cloud security
 
Discussion 1Cloud computing offers the ability to share informat
Discussion 1Cloud computing offers the ability to share informatDiscussion 1Cloud computing offers the ability to share informat
Discussion 1Cloud computing offers the ability to share informat
 
Security Issues in Cloud Computing by rahul abhishek
Security Issues in Cloud Computing  by rahul abhishekSecurity Issues in Cloud Computing  by rahul abhishek
Security Issues in Cloud Computing by rahul abhishek
 
SECURE CLOUD ARCHITECTURE
SECURE CLOUD ARCHITECTURESECURE CLOUD ARCHITECTURE
SECURE CLOUD ARCHITECTURE
 
Ijaprr vol1-1-1-5dr tejinder
Ijaprr vol1-1-1-5dr tejinderIjaprr vol1-1-1-5dr tejinder
Ijaprr vol1-1-1-5dr tejinder
 
CLOUD COMPUTING -Risks, Countermeasures, Costs and Benefits-
CLOUD COMPUTING -Risks, Countermeasures, Costs and Benefits-CLOUD COMPUTING -Risks, Countermeasures, Costs and Benefits-
CLOUD COMPUTING -Risks, Countermeasures, Costs and Benefits-
 
Ijsrp p5211
Ijsrp p5211Ijsrp p5211
Ijsrp p5211
 
A survey on cloud security issues and techniques
A survey on cloud security issues and techniquesA survey on cloud security issues and techniques
A survey on cloud security issues and techniques
 
Cloud computing seminar report
Cloud computing seminar reportCloud computing seminar report
Cloud computing seminar report
 
B018211016
B018211016B018211016
B018211016
 

More from mary772

Coding NotesImproving Diagnosis By Jacquie zegan, CCS, w.docx
Coding NotesImproving Diagnosis By Jacquie zegan, CCS, w.docxCoding NotesImproving Diagnosis By Jacquie zegan, CCS, w.docx
Coding NotesImproving Diagnosis By Jacquie zegan, CCS, w.docx
mary772
 
CNL-521 Topic 3 Vargas Case StudyBob and Elizabeth arrive.docx
CNL-521 Topic 3 Vargas Case StudyBob and Elizabeth arrive.docxCNL-521 Topic 3 Vargas Case StudyBob and Elizabeth arrive.docx
CNL-521 Topic 3 Vargas Case StudyBob and Elizabeth arrive.docx
mary772
 
Cognitive and Language Development Milestones Picture Book[WLO .docx
Cognitive and Language Development Milestones Picture Book[WLO .docxCognitive and Language Development Milestones Picture Book[WLO .docx
Cognitive and Language Development Milestones Picture Book[WLO .docx
mary772
 
Codes of (un)dress and gender constructs from the Greek to t.docx
Codes of (un)dress and gender constructs from the Greek to t.docxCodes of (un)dress and gender constructs from the Greek to t.docx
Codes of (un)dress and gender constructs from the Greek to t.docx
mary772
 
Coding Assignment 3CSC 330 Advanced Data Structures, Spri.docx
Coding Assignment 3CSC 330 Advanced Data Structures, Spri.docxCoding Assignment 3CSC 330 Advanced Data Structures, Spri.docx
Coding Assignment 3CSC 330 Advanced Data Structures, Spri.docx
mary772
 
CodeZipButtonDemo.javaCodeZipButtonDemo.java Demonstrate a p.docx
CodeZipButtonDemo.javaCodeZipButtonDemo.java Demonstrate a p.docxCodeZipButtonDemo.javaCodeZipButtonDemo.java Demonstrate a p.docx
CodeZipButtonDemo.javaCodeZipButtonDemo.java Demonstrate a p.docx
mary772
 
CoevolutionOver the ages, many species have become irremediably .docx
CoevolutionOver the ages, many species have become irremediably .docxCoevolutionOver the ages, many species have become irremediably .docx
CoevolutionOver the ages, many species have become irremediably .docx
mary772
 
Coding Component (50)Weve provided you with an implementation .docx
Coding Component (50)Weve provided you with an implementation .docxCoding Component (50)Weve provided you with an implementation .docx
Coding Component (50)Weve provided you with an implementation .docx
mary772
 
Codes of Ethics Guides Not Prescriptions A set of rules and di.docx
Codes of Ethics Guides Not Prescriptions A set of rules and di.docxCodes of Ethics Guides Not Prescriptions A set of rules and di.docx
Codes of Ethics Guides Not Prescriptions A set of rules and di.docx
mary772
 
Codecademy Monetizing a Movement 815-093 815-093 Codecademy.docx
Codecademy Monetizing a Movement 815-093 815-093 Codecademy.docxCodecademy Monetizing a Movement 815-093 815-093 Codecademy.docx
Codecademy Monetizing a Movement 815-093 815-093 Codecademy.docx
mary772
 
Code switching involves using 1 language or nonstandard versions of .docx
Code switching involves using 1 language or nonstandard versions of .docxCode switching involves using 1 language or nonstandard versions of .docx
Code switching involves using 1 language or nonstandard versions of .docx
mary772
 
Code of Ethics for the Nutrition and Dietetics Pr.docx
Code of Ethics  for the Nutrition and Dietetics Pr.docxCode of Ethics  for the Nutrition and Dietetics Pr.docx
Code of Ethics for the Nutrition and Dietetics Pr.docx
mary772
 
Code of Ethics for Engineers 4. Engineers shall act .docx
Code of Ethics for Engineers 4. Engineers shall act .docxCode of Ethics for Engineers 4. Engineers shall act .docx
Code of Ethics for Engineers 4. Engineers shall act .docx
mary772
 
Coder Name Rebecca Oquendo .docx
Coder Name  Rebecca Oquendo                                    .docxCoder Name  Rebecca Oquendo                                    .docx
Coder Name Rebecca Oquendo .docx
mary772
 
Codes of Ethical Conduct A Bottom-Up ApproachRonald Paul .docx
Codes of Ethical Conduct A Bottom-Up ApproachRonald Paul .docxCodes of Ethical Conduct A Bottom-Up ApproachRonald Paul .docx
Codes of Ethical Conduct A Bottom-Up ApproachRonald Paul .docx
mary772
 
CNL-530 Topic 2 Sexual Response Cycle ChartMasters and John.docx
CNL-530 Topic 2 Sexual Response Cycle ChartMasters and John.docxCNL-530 Topic 2 Sexual Response Cycle ChartMasters and John.docx
CNL-530 Topic 2 Sexual Response Cycle ChartMasters and John.docx
mary772
 
Code#RE00200012002020MN2DGHEType of Service.docx
Code#RE00200012002020MN2DGHEType of Service.docxCode#RE00200012002020MN2DGHEType of Service.docx
Code#RE00200012002020MN2DGHEType of Service.docx
mary772
 
CODE OF ETHICSReview the following case study and address the qu.docx
CODE OF ETHICSReview the following case study and address the qu.docxCODE OF ETHICSReview the following case study and address the qu.docx
CODE OF ETHICSReview the following case study and address the qu.docx
mary772
 
cocaine, conspiracy theories and the cia in central america by Craig.docx
cocaine, conspiracy theories and the cia in central america by Craig.docxcocaine, conspiracy theories and the cia in central america by Craig.docx
cocaine, conspiracy theories and the cia in central america by Craig.docx
mary772
 
Code of EthicsThe Code of Ethical Conduct and Statement of Com.docx
Code of EthicsThe Code of Ethical Conduct and Statement of Com.docxCode of EthicsThe Code of Ethical Conduct and Statement of Com.docx
Code of EthicsThe Code of Ethical Conduct and Statement of Com.docx
mary772
 

More from mary772 (20)

Coding NotesImproving Diagnosis By Jacquie zegan, CCS, w.docx
Coding NotesImproving Diagnosis By Jacquie zegan, CCS, w.docxCoding NotesImproving Diagnosis By Jacquie zegan, CCS, w.docx
Coding NotesImproving Diagnosis By Jacquie zegan, CCS, w.docx
 
CNL-521 Topic 3 Vargas Case StudyBob and Elizabeth arrive.docx
CNL-521 Topic 3 Vargas Case StudyBob and Elizabeth arrive.docxCNL-521 Topic 3 Vargas Case StudyBob and Elizabeth arrive.docx
CNL-521 Topic 3 Vargas Case StudyBob and Elizabeth arrive.docx
 
Cognitive and Language Development Milestones Picture Book[WLO .docx
Cognitive and Language Development Milestones Picture Book[WLO .docxCognitive and Language Development Milestones Picture Book[WLO .docx
Cognitive and Language Development Milestones Picture Book[WLO .docx
 
Codes of (un)dress and gender constructs from the Greek to t.docx
Codes of (un)dress and gender constructs from the Greek to t.docxCodes of (un)dress and gender constructs from the Greek to t.docx
Codes of (un)dress and gender constructs from the Greek to t.docx
 
Coding Assignment 3CSC 330 Advanced Data Structures, Spri.docx
Coding Assignment 3CSC 330 Advanced Data Structures, Spri.docxCoding Assignment 3CSC 330 Advanced Data Structures, Spri.docx
Coding Assignment 3CSC 330 Advanced Data Structures, Spri.docx
 
CodeZipButtonDemo.javaCodeZipButtonDemo.java Demonstrate a p.docx
CodeZipButtonDemo.javaCodeZipButtonDemo.java Demonstrate a p.docxCodeZipButtonDemo.javaCodeZipButtonDemo.java Demonstrate a p.docx
CodeZipButtonDemo.javaCodeZipButtonDemo.java Demonstrate a p.docx
 
CoevolutionOver the ages, many species have become irremediably .docx
CoevolutionOver the ages, many species have become irremediably .docxCoevolutionOver the ages, many species have become irremediably .docx
CoevolutionOver the ages, many species have become irremediably .docx
 
Coding Component (50)Weve provided you with an implementation .docx
Coding Component (50)Weve provided you with an implementation .docxCoding Component (50)Weve provided you with an implementation .docx
Coding Component (50)Weve provided you with an implementation .docx
 
Codes of Ethics Guides Not Prescriptions A set of rules and di.docx
Codes of Ethics Guides Not Prescriptions A set of rules and di.docxCodes of Ethics Guides Not Prescriptions A set of rules and di.docx
Codes of Ethics Guides Not Prescriptions A set of rules and di.docx
 
Codecademy Monetizing a Movement 815-093 815-093 Codecademy.docx
Codecademy Monetizing a Movement 815-093 815-093 Codecademy.docxCodecademy Monetizing a Movement 815-093 815-093 Codecademy.docx
Codecademy Monetizing a Movement 815-093 815-093 Codecademy.docx
 
Code switching involves using 1 language or nonstandard versions of .docx
Code switching involves using 1 language or nonstandard versions of .docxCode switching involves using 1 language or nonstandard versions of .docx
Code switching involves using 1 language or nonstandard versions of .docx
 
Code of Ethics for the Nutrition and Dietetics Pr.docx
Code of Ethics  for the Nutrition and Dietetics Pr.docxCode of Ethics  for the Nutrition and Dietetics Pr.docx
Code of Ethics for the Nutrition and Dietetics Pr.docx
 
Code of Ethics for Engineers 4. Engineers shall act .docx
Code of Ethics for Engineers 4. Engineers shall act .docxCode of Ethics for Engineers 4. Engineers shall act .docx
Code of Ethics for Engineers 4. Engineers shall act .docx
 
Coder Name Rebecca Oquendo .docx
Coder Name  Rebecca Oquendo                                    .docxCoder Name  Rebecca Oquendo                                    .docx
Coder Name Rebecca Oquendo .docx
 
Codes of Ethical Conduct A Bottom-Up ApproachRonald Paul .docx
Codes of Ethical Conduct A Bottom-Up ApproachRonald Paul .docxCodes of Ethical Conduct A Bottom-Up ApproachRonald Paul .docx
Codes of Ethical Conduct A Bottom-Up ApproachRonald Paul .docx
 
CNL-530 Topic 2 Sexual Response Cycle ChartMasters and John.docx
CNL-530 Topic 2 Sexual Response Cycle ChartMasters and John.docxCNL-530 Topic 2 Sexual Response Cycle ChartMasters and John.docx
CNL-530 Topic 2 Sexual Response Cycle ChartMasters and John.docx
 
Code#RE00200012002020MN2DGHEType of Service.docx
Code#RE00200012002020MN2DGHEType of Service.docxCode#RE00200012002020MN2DGHEType of Service.docx
Code#RE00200012002020MN2DGHEType of Service.docx
 
CODE OF ETHICSReview the following case study and address the qu.docx
CODE OF ETHICSReview the following case study and address the qu.docxCODE OF ETHICSReview the following case study and address the qu.docx
CODE OF ETHICSReview the following case study and address the qu.docx
 
cocaine, conspiracy theories and the cia in central america by Craig.docx
cocaine, conspiracy theories and the cia in central america by Craig.docxcocaine, conspiracy theories and the cia in central america by Craig.docx
cocaine, conspiracy theories and the cia in central america by Craig.docx
 
Code of EthicsThe Code of Ethical Conduct and Statement of Com.docx
Code of EthicsThe Code of Ethical Conduct and Statement of Com.docxCode of EthicsThe Code of Ethical Conduct and Statement of Com.docx
Code of EthicsThe Code of Ethical Conduct and Statement of Com.docx
 

Recently uploaded

Level 3 NCEA - NZ: A Nation In the Making 1872 - 1900 SML.ppt
Level 3 NCEA - NZ: A  Nation In the Making 1872 - 1900 SML.pptLevel 3 NCEA - NZ: A  Nation In the Making 1872 - 1900 SML.ppt
Level 3 NCEA - NZ: A Nation In the Making 1872 - 1900 SML.ppt
Henry Hollis
 
Leveraging Generative AI to Drive Nonprofit Innovation
Leveraging Generative AI to Drive Nonprofit InnovationLeveraging Generative AI to Drive Nonprofit Innovation
Leveraging Generative AI to Drive Nonprofit Innovation
TechSoup
 
Chapter wise All Notes of First year Basic Civil Engineering.pptx
Chapter wise All Notes of First year Basic Civil Engineering.pptxChapter wise All Notes of First year Basic Civil Engineering.pptx
Chapter wise All Notes of First year Basic Civil Engineering.pptx
Denish Jangid
 
CIS 4200-02 Group 1 Final Project Report (1).pdf
CIS 4200-02 Group 1 Final Project Report (1).pdfCIS 4200-02 Group 1 Final Project Report (1).pdf
CIS 4200-02 Group 1 Final Project Report (1).pdf
blueshagoo1
 
Philippine Edukasyong Pantahanan at Pangkabuhayan (EPP) Curriculum
Philippine Edukasyong Pantahanan at Pangkabuhayan (EPP) CurriculumPhilippine Edukasyong Pantahanan at Pangkabuhayan (EPP) Curriculum
Philippine Edukasyong Pantahanan at Pangkabuhayan (EPP) Curriculum
MJDuyan
 
How to deliver Powerpoint Presentations.pptx
How to deliver Powerpoint  Presentations.pptxHow to deliver Powerpoint  Presentations.pptx
How to deliver Powerpoint Presentations.pptx
HajraNaeem15
 
Stack Memory Organization of 8086 Microprocessor
Stack Memory Organization of 8086 MicroprocessorStack Memory Organization of 8086 Microprocessor
Stack Memory Organization of 8086 Microprocessor
JomonJoseph58
 
How Barcodes Can Be Leveraged Within Odoo 17
How Barcodes Can Be Leveraged Within Odoo 17How Barcodes Can Be Leveraged Within Odoo 17
How Barcodes Can Be Leveraged Within Odoo 17
Celine George
 
Wound healing PPT
Wound healing PPTWound healing PPT
Wound healing PPT
Jyoti Chand
 
How to Predict Vendor Bill Product in Odoo 17
How to Predict Vendor Bill Product in Odoo 17How to Predict Vendor Bill Product in Odoo 17
How to Predict Vendor Bill Product in Odoo 17
Celine George
 
Mule event processing models | MuleSoft Mysore Meetup #47
Mule event processing models | MuleSoft Mysore Meetup #47Mule event processing models | MuleSoft Mysore Meetup #47
Mule event processing models | MuleSoft Mysore Meetup #47
MysoreMuleSoftMeetup
 
Bonku-Babus-Friend by Sathyajith Ray (9)
Bonku-Babus-Friend by Sathyajith Ray  (9)Bonku-Babus-Friend by Sathyajith Ray  (9)
Bonku-Babus-Friend by Sathyajith Ray (9)
nitinpv4ai
 
مصحف القراءات العشر أعد أحرف الخلاف سمير بسيوني.pdf
مصحف القراءات العشر   أعد أحرف الخلاف سمير بسيوني.pdfمصحف القراءات العشر   أعد أحرف الخلاف سمير بسيوني.pdf
مصحف القراءات العشر أعد أحرف الخلاف سمير بسيوني.pdf
سمير بسيوني
 
BIOLOGY NATIONAL EXAMINATION COUNCIL (NECO) 2024 PRACTICAL MANUAL.pptx
BIOLOGY NATIONAL EXAMINATION COUNCIL (NECO) 2024 PRACTICAL MANUAL.pptxBIOLOGY NATIONAL EXAMINATION COUNCIL (NECO) 2024 PRACTICAL MANUAL.pptx
BIOLOGY NATIONAL EXAMINATION COUNCIL (NECO) 2024 PRACTICAL MANUAL.pptx
RidwanHassanYusuf
 
Pharmaceutics Pharmaceuticals best of brub
Pharmaceutics Pharmaceuticals best of brubPharmaceutics Pharmaceuticals best of brub
Pharmaceutics Pharmaceuticals best of brub
danielkiash986
 
Gender and Mental Health - Counselling and Family Therapy Applications and In...
Gender and Mental Health - Counselling and Family Therapy Applications and In...Gender and Mental Health - Counselling and Family Therapy Applications and In...
Gender and Mental Health - Counselling and Family Therapy Applications and In...
PsychoTech Services
 
HYPERTENSION - SLIDE SHARE PRESENTATION.
HYPERTENSION - SLIDE SHARE PRESENTATION.HYPERTENSION - SLIDE SHARE PRESENTATION.
HYPERTENSION - SLIDE SHARE PRESENTATION.
deepaannamalai16
 
RESULTS OF THE EVALUATION QUESTIONNAIRE.pptx
RESULTS OF THE EVALUATION QUESTIONNAIRE.pptxRESULTS OF THE EVALUATION QUESTIONNAIRE.pptx
RESULTS OF THE EVALUATION QUESTIONNAIRE.pptx
zuzanka
 
Andreas Schleicher presents PISA 2022 Volume III - Creative Thinking - 18 Jun...
Andreas Schleicher presents PISA 2022 Volume III - Creative Thinking - 18 Jun...Andreas Schleicher presents PISA 2022 Volume III - Creative Thinking - 18 Jun...
Andreas Schleicher presents PISA 2022 Volume III - Creative Thinking - 18 Jun...
EduSkills OECD
 
Nutrition Inc FY 2024, 4 - Hour Training
Nutrition Inc FY 2024, 4 - Hour TrainingNutrition Inc FY 2024, 4 - Hour Training
Nutrition Inc FY 2024, 4 - Hour Training
melliereed
 

Recently uploaded (20)

Level 3 NCEA - NZ: A Nation In the Making 1872 - 1900 SML.ppt
Level 3 NCEA - NZ: A  Nation In the Making 1872 - 1900 SML.pptLevel 3 NCEA - NZ: A  Nation In the Making 1872 - 1900 SML.ppt
Level 3 NCEA - NZ: A Nation In the Making 1872 - 1900 SML.ppt
 
Leveraging Generative AI to Drive Nonprofit Innovation
Leveraging Generative AI to Drive Nonprofit InnovationLeveraging Generative AI to Drive Nonprofit Innovation
Leveraging Generative AI to Drive Nonprofit Innovation
 
Chapter wise All Notes of First year Basic Civil Engineering.pptx
Chapter wise All Notes of First year Basic Civil Engineering.pptxChapter wise All Notes of First year Basic Civil Engineering.pptx
Chapter wise All Notes of First year Basic Civil Engineering.pptx
 
CIS 4200-02 Group 1 Final Project Report (1).pdf
CIS 4200-02 Group 1 Final Project Report (1).pdfCIS 4200-02 Group 1 Final Project Report (1).pdf
CIS 4200-02 Group 1 Final Project Report (1).pdf
 
Philippine Edukasyong Pantahanan at Pangkabuhayan (EPP) Curriculum
Philippine Edukasyong Pantahanan at Pangkabuhayan (EPP) CurriculumPhilippine Edukasyong Pantahanan at Pangkabuhayan (EPP) Curriculum
Philippine Edukasyong Pantahanan at Pangkabuhayan (EPP) Curriculum
 
How to deliver Powerpoint Presentations.pptx
How to deliver Powerpoint  Presentations.pptxHow to deliver Powerpoint  Presentations.pptx
How to deliver Powerpoint Presentations.pptx
 
Stack Memory Organization of 8086 Microprocessor
Stack Memory Organization of 8086 MicroprocessorStack Memory Organization of 8086 Microprocessor
Stack Memory Organization of 8086 Microprocessor
 
How Barcodes Can Be Leveraged Within Odoo 17
How Barcodes Can Be Leveraged Within Odoo 17How Barcodes Can Be Leveraged Within Odoo 17
How Barcodes Can Be Leveraged Within Odoo 17
 
Wound healing PPT
Wound healing PPTWound healing PPT
Wound healing PPT
 
How to Predict Vendor Bill Product in Odoo 17
How to Predict Vendor Bill Product in Odoo 17How to Predict Vendor Bill Product in Odoo 17
How to Predict Vendor Bill Product in Odoo 17
 
Mule event processing models | MuleSoft Mysore Meetup #47
Mule event processing models | MuleSoft Mysore Meetup #47Mule event processing models | MuleSoft Mysore Meetup #47
Mule event processing models | MuleSoft Mysore Meetup #47
 
Bonku-Babus-Friend by Sathyajith Ray (9)
Bonku-Babus-Friend by Sathyajith Ray  (9)Bonku-Babus-Friend by Sathyajith Ray  (9)
Bonku-Babus-Friend by Sathyajith Ray (9)
 
مصحف القراءات العشر أعد أحرف الخلاف سمير بسيوني.pdf
مصحف القراءات العشر   أعد أحرف الخلاف سمير بسيوني.pdfمصحف القراءات العشر   أعد أحرف الخلاف سمير بسيوني.pdf
مصحف القراءات العشر أعد أحرف الخلاف سمير بسيوني.pdf
 
BIOLOGY NATIONAL EXAMINATION COUNCIL (NECO) 2024 PRACTICAL MANUAL.pptx
BIOLOGY NATIONAL EXAMINATION COUNCIL (NECO) 2024 PRACTICAL MANUAL.pptxBIOLOGY NATIONAL EXAMINATION COUNCIL (NECO) 2024 PRACTICAL MANUAL.pptx
BIOLOGY NATIONAL EXAMINATION COUNCIL (NECO) 2024 PRACTICAL MANUAL.pptx
 
Pharmaceutics Pharmaceuticals best of brub
Pharmaceutics Pharmaceuticals best of brubPharmaceutics Pharmaceuticals best of brub
Pharmaceutics Pharmaceuticals best of brub
 
Gender and Mental Health - Counselling and Family Therapy Applications and In...
Gender and Mental Health - Counselling and Family Therapy Applications and In...Gender and Mental Health - Counselling and Family Therapy Applications and In...
Gender and Mental Health - Counselling and Family Therapy Applications and In...
 
HYPERTENSION - SLIDE SHARE PRESENTATION.
HYPERTENSION - SLIDE SHARE PRESENTATION.HYPERTENSION - SLIDE SHARE PRESENTATION.
HYPERTENSION - SLIDE SHARE PRESENTATION.
 
RESULTS OF THE EVALUATION QUESTIONNAIRE.pptx
RESULTS OF THE EVALUATION QUESTIONNAIRE.pptxRESULTS OF THE EVALUATION QUESTIONNAIRE.pptx
RESULTS OF THE EVALUATION QUESTIONNAIRE.pptx
 
Andreas Schleicher presents PISA 2022 Volume III - Creative Thinking - 18 Jun...
Andreas Schleicher presents PISA 2022 Volume III - Creative Thinking - 18 Jun...Andreas Schleicher presents PISA 2022 Volume III - Creative Thinking - 18 Jun...
Andreas Schleicher presents PISA 2022 Volume III - Creative Thinking - 18 Jun...
 
Nutrition Inc FY 2024, 4 - Hour Training
Nutrition Inc FY 2024, 4 - Hour TrainingNutrition Inc FY 2024, 4 - Hour Training
Nutrition Inc FY 2024, 4 - Hour Training
 

Cloud is a huge network environment that is very difficult to hand.docx

  • 1. Cloud is a huge network environment that is very difficult to handle. Many organizations face a lot of challenges as the incident handler’s face when the event resources have moved to the cloud environment. The first problem is the lack of network device control. With all the resources moving to the cloud, it is less accessible and lack of control of network device. This is because, there are no firewalls, intrusion detection sensors or other proxies to detect any anomaly of events. Another issue could be with access to the security information in log management and correlation because most of the logs generated from the activities within the environment are stored in the cloud. The next issue is not knowing the location of data in the cloud. When we use the cloud, we probably won't know exactly where our data is hosted (Kandukuri, B. R., & Rakshit, A., 2009). One of the most important challenges could be the inability to access event data. Some of the attacks could include Denial of Service (DoS) attacks where you cannot access your own cloud infrastructure. Application attacks are in which to access the event information you have to install a web application firewall. It is not easy to determine, which data sources are relevant for incident detection especially for SaaS and PaaS (Tyagi, A. K., & Niladhuri, S., 2016). Misdirection of abuses/incident reports is another issue faced by the customers of an organization. There should be a clear understanding between the CSIRT handling team of a customer and some incident handling capability of the CSP. Because of resource pooling, it may be difficult for the CSP to find out, to which of his customers the report refers (Tyagi et al., 2016). Cloud computing also has numerous security issues as it encompasses several technologies like networks, databases, operating systems, resource scheduling, load balancing, concurrency control, and management. References
  • 2. Tyagi, A. K., & Niladhuri, S. (2016, August). Providing trust enabled services in vehicular cloud computing. In Proceedings of the International Conference on Informatics and Analytics (pp. 1-10). Kandukuri, B. R., & Rakshit, A. (2009, September). Cloud security issues. In 2009 IEEE International Conference on Services Computing (pp. 517-520). IEEE.