SlideShare a Scribd company logo
1 of 18
HOW SECURE IS CLOUD?
1
WHAT IS CLOUD
Cloud computing is a general term for the delivery of hosted
services over the Internet
2
3
Common Cloud Services
• Microsoft OneDrive, Office Online
• Google Drive
• Apple icloud
• Amazon Cloud Services
• Dropbox
• Mega
4
Cloud Hardware
Google Chrome: Web browser into an operating system.
ChromeBits: a smaller-than-a-candy-bar drivesthat turn any
display with an HDMI port into a usable computer running
Chrome OS.
5
The Security and Control Problems
Unknown Data Location
 Unauthorized Activity
 Storage
 Protection
6
The Security and Control Problems (Cont’d)
Vulnerability
Unfulfilled requirements
 Availability of the service
Lack of Liability
7
Factors contribute to Security problems
Lack of Security Management Ability
Weakness in Quality Maintenance
Unprotected and Backdated Use of Software andTechnology
8
How Secure is today’s cloud computing
Cloud computing is considered as one of the secure platform
to perform the online activity if the correct vendor is selected.
9
The Risks and Recent Security Breaching
Issues in Cloud Computing:
Key loss or Data
Encrypted
Data integrity
Data and Power
Loss
Denial of
Service
(DOS)
10
The Risks and Recent Security Breaching
Issues in Cloud Computing
General Server Risks
Service and Account Hijacking
PRISM Scandal
11
The Existing Security Functions of Cloud
Computing
More Clear andTransparent
Possible Defense
More Expensive Security
12
The issues want to clarify with prospective
vendors
Types of Company. (Public or Private)
Encryption
Data Center Storage
Minimum Security Requirements
13
Opinion for Entrust corporate systems to a
cloud computing provider
• Should be 100% Secure
• Able to Detect Unauthorized Access or Misuses (eg. Cracking)
• Less Expensive but Better Service
14
Conclusion
• The blackings of the cloud computing is figured out.
• Positive measures to protect the cloud storage are
implementing
• Smart IT companies are giving most priority of the security
today.
• Problems will be resolved soon by the new entrepreneurs
• Cloud will be the safest home for the future data’s. 15
Recommendation
• It is better to chose public company
• User should be concerned about the storage policy and the
place
• The user should be confirmed about the access in the cloud by
verify the login.
16
17
18
THANKYOU ALL

More Related Content

What's hot

Reasons why accountants should switch to cloud computing
Reasons why accountants should switch to cloud computingReasons why accountants should switch to cloud computing
Reasons why accountants should switch to cloud computingLily Smith
 
Cloud Computing
Cloud ComputingCloud Computing
Cloud Computingrajesh626
 
Why deploy private cloud in the hybrid cloud era?
Why deploy private cloud in the hybrid cloud era?Why deploy private cloud in the hybrid cloud era?
Why deploy private cloud in the hybrid cloud era?IBM Services
 
IT Series: Cloud Computing Done Right CISOA 2011
IT Series: Cloud Computing Done Right CISOA 2011IT Series: Cloud Computing Done Right CISOA 2011
IT Series: Cloud Computing Done Right CISOA 2011Donald E. Hester
 
LuminrDRPresentation_AITP_October2014.pptx
LuminrDRPresentation_AITP_October2014.pptxLuminrDRPresentation_AITP_October2014.pptx
LuminrDRPresentation_AITP_October2014.pptxTimothy Krupinski
 
Cloud computing: 5 myths
Cloud computing: 5 mythsCloud computing: 5 myths
Cloud computing: 5 mythsDot Net IT
 
Cloud computing web 2.0 By Joanna Hendricks BMT 580
Cloud computing web 2.0  By Joanna Hendricks BMT 580Cloud computing web 2.0  By Joanna Hendricks BMT 580
Cloud computing web 2.0 By Joanna Hendricks BMT 580Joanna Hendricks
 
Codestone Cloud in a Box Overview
Codestone Cloud in a Box OverviewCodestone Cloud in a Box Overview
Codestone Cloud in a Box OverviewSimonFenech
 
What is cloud computing and why should I use it?
What is cloud computing and why should I use it?What is cloud computing and why should I use it?
What is cloud computing and why should I use it?DARRIN SALT
 
It resource us signal cloud presentation itr - final
It resource   us signal cloud presentation itr - finalIt resource   us signal cloud presentation itr - final
It resource us signal cloud presentation itr - finalsvanelderen
 
An introduction of cloud storage
An introduction of cloud storage An introduction of cloud storage
An introduction of cloud storage Wenbin Zhao
 
Cloud presentatie bug 2011 v2
Cloud presentatie bug 2011 v2Cloud presentatie bug 2011 v2
Cloud presentatie bug 2011 v2Frank de Jong
 

What's hot (17)

Cloud computing
Cloud computingCloud computing
Cloud computing
 
Reasons why accountants should switch to cloud computing
Reasons why accountants should switch to cloud computingReasons why accountants should switch to cloud computing
Reasons why accountants should switch to cloud computing
 
Cloud Computing
Cloud ComputingCloud Computing
Cloud Computing
 
Why deploy private cloud in the hybrid cloud era?
Why deploy private cloud in the hybrid cloud era?Why deploy private cloud in the hybrid cloud era?
Why deploy private cloud in the hybrid cloud era?
 
IT Series: Cloud Computing Done Right CISOA 2011
IT Series: Cloud Computing Done Right CISOA 2011IT Series: Cloud Computing Done Right CISOA 2011
IT Series: Cloud Computing Done Right CISOA 2011
 
LuminrDRPresentation_AITP_October2014.pptx
LuminrDRPresentation_AITP_October2014.pptxLuminrDRPresentation_AITP_October2014.pptx
LuminrDRPresentation_AITP_October2014.pptx
 
To Preserve or Collect
To Preserve or CollectTo Preserve or Collect
To Preserve or Collect
 
Cloud computing: 5 myths
Cloud computing: 5 mythsCloud computing: 5 myths
Cloud computing: 5 myths
 
Connections Cloud Talk
Connections Cloud TalkConnections Cloud Talk
Connections Cloud Talk
 
Cloud computing web 2.0 By Joanna Hendricks BMT 580
Cloud computing web 2.0  By Joanna Hendricks BMT 580Cloud computing web 2.0  By Joanna Hendricks BMT 580
Cloud computing web 2.0 By Joanna Hendricks BMT 580
 
Presentation ppm ppt
Presentation ppm pptPresentation ppm ppt
Presentation ppm ppt
 
Codestone Cloud in a Box Overview
Codestone Cloud in a Box OverviewCodestone Cloud in a Box Overview
Codestone Cloud in a Box Overview
 
What is cloud computing and why should I use it?
What is cloud computing and why should I use it?What is cloud computing and why should I use it?
What is cloud computing and why should I use it?
 
Data Segregation
Data SegregationData Segregation
Data Segregation
 
It resource us signal cloud presentation itr - final
It resource   us signal cloud presentation itr - finalIt resource   us signal cloud presentation itr - final
It resource us signal cloud presentation itr - final
 
An introduction of cloud storage
An introduction of cloud storage An introduction of cloud storage
An introduction of cloud storage
 
Cloud presentatie bug 2011 v2
Cloud presentatie bug 2011 v2Cloud presentatie bug 2011 v2
Cloud presentatie bug 2011 v2
 

Viewers also liked

Next Generation Engineering Education White Paper (2)
Next Generation Engineering Education White Paper (2)Next Generation Engineering Education White Paper (2)
Next Generation Engineering Education White Paper (2)Andy Lau
 
Curriculum Vitae Patricia Cook 1
Curriculum Vitae Patricia Cook 1Curriculum Vitae Patricia Cook 1
Curriculum Vitae Patricia Cook 1Patricia Cook
 
William Stark Resume 08_24_2015.doc
William Stark Resume 08_24_2015.docWilliam Stark Resume 08_24_2015.doc
William Stark Resume 08_24_2015.docWilliam Stark
 
Final_Resume_01.02.2016
Final_Resume_01.02.2016Final_Resume_01.02.2016
Final_Resume_01.02.2016Nadine Jarjur
 
Stunning Shipping Container Homes
Stunning Shipping Container HomesStunning Shipping Container Homes
Stunning Shipping Container HomestheMinimalistMan
 
Lambert–Eaton myasthenic syndrome ( lems)
Lambert–Eaton myasthenic syndrome  ( lems)Lambert–Eaton myasthenic syndrome  ( lems)
Lambert–Eaton myasthenic syndrome ( lems)Samit Islam Rudra
 
콩콩(CongKong) 소개서_행사주최자용_20161025
콩콩(CongKong) 소개서_행사주최자용_20161025콩콩(CongKong) 소개서_행사주최자용_20161025
콩콩(CongKong) 소개서_행사주최자용_20161025REVIVAL LABS
 
NAZIA AMIN CV PHARMACIST 1 JAN 2016
NAZIA AMIN CV PHARMACIST 1 JAN 2016NAZIA AMIN CV PHARMACIST 1 JAN 2016
NAZIA AMIN CV PHARMACIST 1 JAN 2016Nazia Amin
 

Viewers also liked (11)

Camara-Annual-Report-2014
Camara-Annual-Report-2014Camara-Annual-Report-2014
Camara-Annual-Report-2014
 
Next Generation Engineering Education White Paper (2)
Next Generation Engineering Education White Paper (2)Next Generation Engineering Education White Paper (2)
Next Generation Engineering Education White Paper (2)
 
New Email
New EmailNew Email
New Email
 
Curriculum Vitae Patricia Cook 1
Curriculum Vitae Patricia Cook 1Curriculum Vitae Patricia Cook 1
Curriculum Vitae Patricia Cook 1
 
William Stark Resume 08_24_2015.doc
William Stark Resume 08_24_2015.docWilliam Stark Resume 08_24_2015.doc
William Stark Resume 08_24_2015.doc
 
Final_Resume_01.02.2016
Final_Resume_01.02.2016Final_Resume_01.02.2016
Final_Resume_01.02.2016
 
Glycolysis
GlycolysisGlycolysis
Glycolysis
 
Stunning Shipping Container Homes
Stunning Shipping Container HomesStunning Shipping Container Homes
Stunning Shipping Container Homes
 
Lambert–Eaton myasthenic syndrome ( lems)
Lambert–Eaton myasthenic syndrome  ( lems)Lambert–Eaton myasthenic syndrome  ( lems)
Lambert–Eaton myasthenic syndrome ( lems)
 
콩콩(CongKong) 소개서_행사주최자용_20161025
콩콩(CongKong) 소개서_행사주최자용_20161025콩콩(CongKong) 소개서_행사주최자용_20161025
콩콩(CongKong) 소개서_행사주최자용_20161025
 
NAZIA AMIN CV PHARMACIST 1 JAN 2016
NAZIA AMIN CV PHARMACIST 1 JAN 2016NAZIA AMIN CV PHARMACIST 1 JAN 2016
NAZIA AMIN CV PHARMACIST 1 JAN 2016
 

Similar to How Secure is Cloud

Cloud Computing in Africa
Cloud Computing in AfricaCloud Computing in Africa
Cloud Computing in Africatechzimslides
 
MPMA 2013 - Leveraging the Cloud for Museum Collections
MPMA 2013  - Leveraging the Cloud for Museum CollectionsMPMA 2013  - Leveraging the Cloud for Museum Collections
MPMA 2013 - Leveraging the Cloud for Museum CollectionsKacy Clarke
 
Cloud Computing Introduction
Cloud Computing IntroductionCloud Computing Introduction
Cloud Computing IntroductionMzos Pune
 
chapter 3 Selected Topics in computer.pptx
chapter 3 Selected Topics in computer.pptxchapter 3 Selected Topics in computer.pptx
chapter 3 Selected Topics in computer.pptxAschalewAyele2
 
Openstack & why cloud for enterprise ppt
Openstack & why cloud for enterprise pptOpenstack & why cloud for enterprise ppt
Openstack & why cloud for enterprise pptAsmaa Ibrahim
 
The Cloud: Background & Best Practices for Small Law Firms
The Cloud: Background & Best Practices for Small Law FirmsThe Cloud: Background & Best Practices for Small Law Firms
The Cloud: Background & Best Practices for Small Law FirmsNetwork 1 Consulting
 
Cloud Computing
Cloud ComputingCloud Computing
Cloud ComputingAllwyn24
 
4.1 Introduction to cloud storage.pdf
4.1 Introduction to cloud storage.pdf4.1 Introduction to cloud storage.pdf
4.1 Introduction to cloud storage.pdfyasothamohankumar
 
cloud storage ppt
cloud storage pptcloud storage ppt
cloud storage pptNaga Dinesh
 
Christoph Streit - Reasons to use a Private Cloud
Christoph Streit - Reasons to use a Private CloudChristoph Streit - Reasons to use a Private Cloud
Christoph Streit - Reasons to use a Private CloudSymposia Media
 
Navigating through the Cloud - 7 feb 2012 at Institute for Information Manage...
Navigating through the Cloud - 7 feb 2012 at Institute for Information Manage...Navigating through the Cloud - 7 feb 2012 at Institute for Information Manage...
Navigating through the Cloud - 7 feb 2012 at Institute for Information Manage...Livingstone Advisory
 
Benefits to using private cloud storage providers
Benefits to using private  cloud storage providersBenefits to using private  cloud storage providers
Benefits to using private cloud storage providersRonit Sharma
 
Cloud-Storage-PPT - Copy.pptx
Cloud-Storage-PPT - Copy.pptxCloud-Storage-PPT - Copy.pptx
Cloud-Storage-PPT - Copy.pptxDeveshKhandare
 
Tech equity - Cloud presentation
Tech equity - Cloud presentationTech equity - Cloud presentation
Tech equity - Cloud presentationAdrian Hall
 

Similar to How Secure is Cloud (20)

Cloud Computing in Africa
Cloud Computing in AfricaCloud Computing in Africa
Cloud Computing in Africa
 
MPMA 2013 - Leveraging the Cloud for Museum Collections
MPMA 2013  - Leveraging the Cloud for Museum CollectionsMPMA 2013  - Leveraging the Cloud for Museum Collections
MPMA 2013 - Leveraging the Cloud for Museum Collections
 
Cloud Computing Introduction
Cloud Computing IntroductionCloud Computing Introduction
Cloud Computing Introduction
 
chapter 3 Selected Topics in computer.pptx
chapter 3 Selected Topics in computer.pptxchapter 3 Selected Topics in computer.pptx
chapter 3 Selected Topics in computer.pptx
 
cc ppt
cc pptcc ppt
cc ppt
 
Openstack & why cloud for enterprise ppt
Openstack & why cloud for enterprise pptOpenstack & why cloud for enterprise ppt
Openstack & why cloud for enterprise ppt
 
Cloud computing
Cloud computingCloud computing
Cloud computing
 
somee.pptx
somee.pptxsomee.pptx
somee.pptx
 
The Cloud: Background & Best Practices for Small Law Firms
The Cloud: Background & Best Practices for Small Law FirmsThe Cloud: Background & Best Practices for Small Law Firms
The Cloud: Background & Best Practices for Small Law Firms
 
4.2.cloud storage
4.2.cloud storage4.2.cloud storage
4.2.cloud storage
 
Cloud Computing
Cloud ComputingCloud Computing
Cloud Computing
 
4.1 Introduction to cloud storage.pdf
4.1 Introduction to cloud storage.pdf4.1 Introduction to cloud storage.pdf
4.1 Introduction to cloud storage.pdf
 
cloud storage ppt
cloud storage pptcloud storage ppt
cloud storage ppt
 
Christoph Streit - Reasons to use a Private Cloud
Christoph Streit - Reasons to use a Private CloudChristoph Streit - Reasons to use a Private Cloud
Christoph Streit - Reasons to use a Private Cloud
 
Navigating through the Cloud - 7 feb 2012 at Institute for Information Manage...
Navigating through the Cloud - 7 feb 2012 at Institute for Information Manage...Navigating through the Cloud - 7 feb 2012 at Institute for Information Manage...
Navigating through the Cloud - 7 feb 2012 at Institute for Information Manage...
 
Benefits to using private cloud storage providers
Benefits to using private  cloud storage providersBenefits to using private  cloud storage providers
Benefits to using private cloud storage providers
 
ECI OVUM Webinar-Cloud Revenue Opportunities-Feb 2016
ECI OVUM Webinar-Cloud Revenue Opportunities-Feb 2016ECI OVUM Webinar-Cloud Revenue Opportunities-Feb 2016
ECI OVUM Webinar-Cloud Revenue Opportunities-Feb 2016
 
Cloud-Storage-PPT - Copy.pptx
Cloud-Storage-PPT - Copy.pptxCloud-Storage-PPT - Copy.pptx
Cloud-Storage-PPT - Copy.pptx
 
Tech equity - Cloud presentation
Tech equity - Cloud presentationTech equity - Cloud presentation
Tech equity - Cloud presentation
 
Cloud computing
Cloud computingCloud computing
Cloud computing
 

Recently uploaded

Tampa BSides - Chef's Tour of Microsoft Security Adoption Framework (SAF)
Tampa BSides - Chef's Tour of Microsoft Security Adoption Framework (SAF)Tampa BSides - Chef's Tour of Microsoft Security Adoption Framework (SAF)
Tampa BSides - Chef's Tour of Microsoft Security Adoption Framework (SAF)Mark Simos
 
New from BookNet Canada for 2024: BNC BiblioShare - Tech Forum 2024
New from BookNet Canada for 2024: BNC BiblioShare - Tech Forum 2024New from BookNet Canada for 2024: BNC BiblioShare - Tech Forum 2024
New from BookNet Canada for 2024: BNC BiblioShare - Tech Forum 2024BookNet Canada
 
Unraveling Multimodality with Large Language Models.pdf
Unraveling Multimodality with Large Language Models.pdfUnraveling Multimodality with Large Language Models.pdf
Unraveling Multimodality with Large Language Models.pdfAlex Barbosa Coqueiro
 
AI as an Interface for Commercial Buildings
AI as an Interface for Commercial BuildingsAI as an Interface for Commercial Buildings
AI as an Interface for Commercial BuildingsMemoori
 
Benefits Of Flutter Compared To Other Frameworks
Benefits Of Flutter Compared To Other FrameworksBenefits Of Flutter Compared To Other Frameworks
Benefits Of Flutter Compared To Other FrameworksSoftradix Technologies
 
Artificial intelligence in the post-deep learning era
Artificial intelligence in the post-deep learning eraArtificial intelligence in the post-deep learning era
Artificial intelligence in the post-deep learning eraDeakin University
 
Build your next Gen AI Breakthrough - April 2024
Build your next Gen AI Breakthrough - April 2024Build your next Gen AI Breakthrough - April 2024
Build your next Gen AI Breakthrough - April 2024Neo4j
 
Beyond Boundaries: Leveraging No-Code Solutions for Industry Innovation
Beyond Boundaries: Leveraging No-Code Solutions for Industry InnovationBeyond Boundaries: Leveraging No-Code Solutions for Industry Innovation
Beyond Boundaries: Leveraging No-Code Solutions for Industry InnovationSafe Software
 
My INSURER PTE LTD - Insurtech Innovation Award 2024
My INSURER PTE LTD - Insurtech Innovation Award 2024My INSURER PTE LTD - Insurtech Innovation Award 2024
My INSURER PTE LTD - Insurtech Innovation Award 2024The Digital Insurer
 
Vertex AI Gemini Prompt Engineering Tips
Vertex AI Gemini Prompt Engineering TipsVertex AI Gemini Prompt Engineering Tips
Vertex AI Gemini Prompt Engineering TipsMiki Katsuragi
 
CloudStudio User manual (basic edition):
CloudStudio User manual (basic edition):CloudStudio User manual (basic edition):
CloudStudio User manual (basic edition):comworks
 
SIP trunking in Janus @ Kamailio World 2024
SIP trunking in Janus @ Kamailio World 2024SIP trunking in Janus @ Kamailio World 2024
SIP trunking in Janus @ Kamailio World 2024Lorenzo Miniero
 
"LLMs for Python Engineers: Advanced Data Analysis and Semantic Kernel",Oleks...
"LLMs for Python Engineers: Advanced Data Analysis and Semantic Kernel",Oleks..."LLMs for Python Engineers: Advanced Data Analysis and Semantic Kernel",Oleks...
"LLMs for Python Engineers: Advanced Data Analysis and Semantic Kernel",Oleks...Fwdays
 
WordPress Websites for Engineers: Elevate Your Brand
WordPress Websites for Engineers: Elevate Your BrandWordPress Websites for Engineers: Elevate Your Brand
WordPress Websites for Engineers: Elevate Your Brandgvaughan
 
Tech-Forward - Achieving Business Readiness For Copilot in Microsoft 365
Tech-Forward - Achieving Business Readiness For Copilot in Microsoft 365Tech-Forward - Achieving Business Readiness For Copilot in Microsoft 365
Tech-Forward - Achieving Business Readiness For Copilot in Microsoft 3652toLead Limited
 
SQL Database Design For Developers at php[tek] 2024
SQL Database Design For Developers at php[tek] 2024SQL Database Design For Developers at php[tek] 2024
SQL Database Design For Developers at php[tek] 2024Scott Keck-Warren
 
Kotlin Multiplatform & Compose Multiplatform - Starter kit for pragmatics
Kotlin Multiplatform & Compose Multiplatform - Starter kit for pragmaticsKotlin Multiplatform & Compose Multiplatform - Starter kit for pragmatics
Kotlin Multiplatform & Compose Multiplatform - Starter kit for pragmaticscarlostorres15106
 

Recently uploaded (20)

Hot Sexy call girls in Panjabi Bagh 🔝 9953056974 🔝 Delhi escort Service
Hot Sexy call girls in Panjabi Bagh 🔝 9953056974 🔝 Delhi escort ServiceHot Sexy call girls in Panjabi Bagh 🔝 9953056974 🔝 Delhi escort Service
Hot Sexy call girls in Panjabi Bagh 🔝 9953056974 🔝 Delhi escort Service
 
Tampa BSides - Chef's Tour of Microsoft Security Adoption Framework (SAF)
Tampa BSides - Chef's Tour of Microsoft Security Adoption Framework (SAF)Tampa BSides - Chef's Tour of Microsoft Security Adoption Framework (SAF)
Tampa BSides - Chef's Tour of Microsoft Security Adoption Framework (SAF)
 
New from BookNet Canada for 2024: BNC BiblioShare - Tech Forum 2024
New from BookNet Canada for 2024: BNC BiblioShare - Tech Forum 2024New from BookNet Canada for 2024: BNC BiblioShare - Tech Forum 2024
New from BookNet Canada for 2024: BNC BiblioShare - Tech Forum 2024
 
Unraveling Multimodality with Large Language Models.pdf
Unraveling Multimodality with Large Language Models.pdfUnraveling Multimodality with Large Language Models.pdf
Unraveling Multimodality with Large Language Models.pdf
 
AI as an Interface for Commercial Buildings
AI as an Interface for Commercial BuildingsAI as an Interface for Commercial Buildings
AI as an Interface for Commercial Buildings
 
Benefits Of Flutter Compared To Other Frameworks
Benefits Of Flutter Compared To Other FrameworksBenefits Of Flutter Compared To Other Frameworks
Benefits Of Flutter Compared To Other Frameworks
 
Artificial intelligence in the post-deep learning era
Artificial intelligence in the post-deep learning eraArtificial intelligence in the post-deep learning era
Artificial intelligence in the post-deep learning era
 
Vulnerability_Management_GRC_by Sohang Sengupta.pptx
Vulnerability_Management_GRC_by Sohang Sengupta.pptxVulnerability_Management_GRC_by Sohang Sengupta.pptx
Vulnerability_Management_GRC_by Sohang Sengupta.pptx
 
Build your next Gen AI Breakthrough - April 2024
Build your next Gen AI Breakthrough - April 2024Build your next Gen AI Breakthrough - April 2024
Build your next Gen AI Breakthrough - April 2024
 
Beyond Boundaries: Leveraging No-Code Solutions for Industry Innovation
Beyond Boundaries: Leveraging No-Code Solutions for Industry InnovationBeyond Boundaries: Leveraging No-Code Solutions for Industry Innovation
Beyond Boundaries: Leveraging No-Code Solutions for Industry Innovation
 
My INSURER PTE LTD - Insurtech Innovation Award 2024
My INSURER PTE LTD - Insurtech Innovation Award 2024My INSURER PTE LTD - Insurtech Innovation Award 2024
My INSURER PTE LTD - Insurtech Innovation Award 2024
 
Vertex AI Gemini Prompt Engineering Tips
Vertex AI Gemini Prompt Engineering TipsVertex AI Gemini Prompt Engineering Tips
Vertex AI Gemini Prompt Engineering Tips
 
CloudStudio User manual (basic edition):
CloudStudio User manual (basic edition):CloudStudio User manual (basic edition):
CloudStudio User manual (basic edition):
 
SIP trunking in Janus @ Kamailio World 2024
SIP trunking in Janus @ Kamailio World 2024SIP trunking in Janus @ Kamailio World 2024
SIP trunking in Janus @ Kamailio World 2024
 
"LLMs for Python Engineers: Advanced Data Analysis and Semantic Kernel",Oleks...
"LLMs for Python Engineers: Advanced Data Analysis and Semantic Kernel",Oleks..."LLMs for Python Engineers: Advanced Data Analysis and Semantic Kernel",Oleks...
"LLMs for Python Engineers: Advanced Data Analysis and Semantic Kernel",Oleks...
 
WordPress Websites for Engineers: Elevate Your Brand
WordPress Websites for Engineers: Elevate Your BrandWordPress Websites for Engineers: Elevate Your Brand
WordPress Websites for Engineers: Elevate Your Brand
 
Tech-Forward - Achieving Business Readiness For Copilot in Microsoft 365
Tech-Forward - Achieving Business Readiness For Copilot in Microsoft 365Tech-Forward - Achieving Business Readiness For Copilot in Microsoft 365
Tech-Forward - Achieving Business Readiness For Copilot in Microsoft 365
 
SQL Database Design For Developers at php[tek] 2024
SQL Database Design For Developers at php[tek] 2024SQL Database Design For Developers at php[tek] 2024
SQL Database Design For Developers at php[tek] 2024
 
Kotlin Multiplatform & Compose Multiplatform - Starter kit for pragmatics
Kotlin Multiplatform & Compose Multiplatform - Starter kit for pragmaticsKotlin Multiplatform & Compose Multiplatform - Starter kit for pragmatics
Kotlin Multiplatform & Compose Multiplatform - Starter kit for pragmatics
 
E-Vehicle_Hacking_by_Parul Sharma_null_owasp.pptx
E-Vehicle_Hacking_by_Parul Sharma_null_owasp.pptxE-Vehicle_Hacking_by_Parul Sharma_null_owasp.pptx
E-Vehicle_Hacking_by_Parul Sharma_null_owasp.pptx
 

How Secure is Cloud

  • 1. HOW SECURE IS CLOUD? 1
  • 2. WHAT IS CLOUD Cloud computing is a general term for the delivery of hosted services over the Internet 2
  • 3. 3
  • 4. Common Cloud Services • Microsoft OneDrive, Office Online • Google Drive • Apple icloud • Amazon Cloud Services • Dropbox • Mega 4
  • 5. Cloud Hardware Google Chrome: Web browser into an operating system. ChromeBits: a smaller-than-a-candy-bar drivesthat turn any display with an HDMI port into a usable computer running Chrome OS. 5
  • 6. The Security and Control Problems Unknown Data Location  Unauthorized Activity  Storage  Protection 6
  • 7. The Security and Control Problems (Cont’d) Vulnerability Unfulfilled requirements  Availability of the service Lack of Liability 7
  • 8. Factors contribute to Security problems Lack of Security Management Ability Weakness in Quality Maintenance Unprotected and Backdated Use of Software andTechnology 8
  • 9. How Secure is today’s cloud computing Cloud computing is considered as one of the secure platform to perform the online activity if the correct vendor is selected. 9
  • 10. The Risks and Recent Security Breaching Issues in Cloud Computing: Key loss or Data Encrypted Data integrity Data and Power Loss Denial of Service (DOS) 10
  • 11. The Risks and Recent Security Breaching Issues in Cloud Computing General Server Risks Service and Account Hijacking PRISM Scandal 11
  • 12. The Existing Security Functions of Cloud Computing More Clear andTransparent Possible Defense More Expensive Security 12
  • 13. The issues want to clarify with prospective vendors Types of Company. (Public or Private) Encryption Data Center Storage Minimum Security Requirements 13
  • 14. Opinion for Entrust corporate systems to a cloud computing provider • Should be 100% Secure • Able to Detect Unauthorized Access or Misuses (eg. Cracking) • Less Expensive but Better Service 14
  • 15. Conclusion • The blackings of the cloud computing is figured out. • Positive measures to protect the cloud storage are implementing • Smart IT companies are giving most priority of the security today. • Problems will be resolved soon by the new entrepreneurs • Cloud will be the safest home for the future data’s. 15
  • 16. Recommendation • It is better to chose public company • User should be concerned about the storage policy and the place • The user should be confirmed about the access in the cloud by verify the login. 16
  • 17. 17

Editor's Notes

  1. Drew Huston, founder and CEO of Dropbox, has been given the title of Internet entrepreneur for his achievements in his field. The creation story of the company, Huston claims, was based upon an idea that came to him after having had to deal with constantly forgetting his USB flash drive during his studies at MIT. While he was a student he found an abundance of problems with already existing storage services and set out to solve this problem for himself before realizing that his solution could benefit others as well. In 2007, he and his co-founder Arash Ferdowsi were able to secure funding to begin the development of the program, and by 2008 they were ready to launch. Dropbox had an enormous success rate, and, after officially being introduced at TechCrunch50, broke records gaining 50 million users in just under three years. By the end of 2013 Dropbox had gained over 200 million users.
  2. Common Cloud Examples  The lines between local computing and cloud computing sometimes get very, very blurry. That's because the cloud is part of almost everything on our computers these days. You can easily have a local piece of software (for instance, Microsoft Office 365) that utilizes a form of cloud computing for storage (Microsoft OneDrive). That said, Microsoft also offers a set of Web apps, now called Office Online, that are online-only versions of Word, Excel, PowerPoint, and OneNote accessed via your Web browser without installing anything. That makes them a version of cloud computing (Web-based=cloud). Some other major examples of cloud computing you're probably using: Google Drive: This is a pure cloud computing service, with all the storage found online so it can work with the cloud apps: Google Docs, Google Sheets, and Google Slides. Drive is also available on more than just desktop computers; you can use it on tablets like the iPad$228.00 at Gazelle Store or on smartphones, and there are separate apps for Docs and Sheets, as well. In fact, most of Google's services could be considered cloud computing: Gmail, Google Calendar, Google Maps, and so on. Apple iCloud: Apple's cloud service is primarily used for online storage, backup, and synchronization of your mail, contacts, calendar, and more. All the data you need is available to you on your iOS, Mac OS, or Windows device (Windows users have to install the iCloud control panel). Naturally, Apple won't be outdone by rivals: it offers cloud-based versions of its word processor (Pages), spreadsheet (Numbers), and presentations (Keynote) for use by any iCloud subscriber. iCloud is also the place iPhone users go to utilze the Find My iPhone feature that's all important when the phone goes missing. Amazon Cloud Drive: Storage at the big retailer is mainly for music, preferably MP3s that you purchase from Amazon, and images—if you have Amazon Prime, you get unlimited image storage. The Cloud Drive also holds anything you buy for the Kindle. It's essentially storage for anything digital you'd buy from Amazon, baked into all its products and services. Hybrid services like Box, Dropbox, and SugarSync all say they work in the cloud because they store a synced version of your files online, but most also sync those files with local storage. Synchronization to allow all your devices to access the same data is a cornerstone of the cloud computing experience, even if you do access the file locally. Likewise, it's considered cloud computing if you have a community of people with separate devices that need the same data synched, be it for work collaboration projects or just to keep the family in sync. For more, check out the The Best Cloud Storage Services for 2015.
  3. Google Chrome Web browser into an operating system. With a Chromebook, most everything you do is online: apps, media, and storage are all in the cloud.  ChromeBits, smaller-than-a-candy-bar drives (pictured) that turn any display with an HDMI port into a usable computer running Chrome OS. Of course, you may be wondering what happens if you're somewhere without a connection and you need to access your data. This is currently one of the biggest complaints about Chrome OS, although its offline functionality is expanding. The Chromebook isn't the first product to try this approach. So-called "dumb-terminals" that lack local storage and connect to a local server or mainframe go back decades. The first Internet-only product attempts included the old NIC (New Internet Computer), the Netpliance iOpener, and the disastrous 3Com Audrey. You could argue they all debuted well before their time—dial-up speeds of the 1990s had training wheels compared to the accelerated broadband Internet connections of today. That's why many would argue that cloud computing works at all: the connection to the Internet is as fast as the connection to the hard drive. Or is it?
  4. Management: They should to some test on their updates whether these update are working or not. No further testing is done these updates making them unable to detect problems on their updates. Organizations quality department: The problem is the sign that this department are not working properly. Their main task is to ensure the entire company products are high in quality or at least in a shape. Technology: They should keep the technology used up to date. New viruses always had undergone evolution in order to become undetectable and more harmful.
  5. Cloud computing is considered as one of the secure platform to perform the online activity if the correct vendor is selected. Although there are some limitation and the security weakness has been identified in last few years but the technology experts are predicting that it is going to be a most reliable platform in the future.
  6. General Server Risks: Denial of Service (DoS) Being of the latter is obviously always an issue for servers Service and Account Hijacking: At this point in its development, the cloud is seriously at risk for service and account hijacking PRISM Scandal: In June 2013 Edward Snowden revealed that the National Security Agency (NSA) has been collecting enormous amounts of communication and search data from internet companies such as Microsoft, Yahoo, Google
  7. More Clear and Transparent: The cloud provider’s facility, their rules and regulations, the safety issues are clearer than previous. So it is become a matter of trust for the users. Possible Defense: Cloud security alliance (CSA) is used to prevent organizations to disallow users and services from sharing account credentials between themselves. So it is now more reliable. More Expensive Security: Although one of the objective of the cloud computing is to provide the services at cheaper price so that user are more encouraged to use the cloud but the vendors identified that with cheap security system there are some possibility of data theft so they built more expensive security system because sometime data are more valuable than vendors profit
  8. I would want to know if they were a public company, what kind of encrypt software is being used, can I choose the center were my data would be stored, and if they meet current compliance requirement. Issues of privacy would be the main topic to consider. Any and all date being stored on the cloud is sensitive and should be well take care of. Additionally, overall security of the information should be provided. I would want to know how they plan on providing the utmost security and also locations of their servers. Having the servers based in the United States would be more appealing than having them based outside of the nation.
  9. If my company data storage needs were so huge and it was clear that using this service provided large economical savings and provided as good if not better security protection than was already in place, then yes I would use the service. However if the company data was highly sensitive (like the federal government top secret Intel then I would not be apt to use this service. I believe there will never be a %100 secure information system as long as people are alive. Evil exist and people possess it and are driven by it for self-serving needs and will always figure out ways to crack any system to do damage. I would only entrust my corporate systems to a cloud computing provider if the company data was not highly sensitive. There can never be a 100% secure cloud computing service regardless of the encryption software used. If my corporate had a huge need for data storage and cloud computing service meant large economical savings, then I would go for it.