6 MAJOR CYBER
SECURITY RISKS
TO CLOUD
COMPUTING
 Cloud computing has brought the
advantage of lower cost of
ownership of IT applications, super
fast time to market, and
unmatched surges in employee
productivity.
THE MOST COMMON OF THESE
CYBERSECURITY ISSUES THAT
THREATEN CLOUD COMPUTING
APPLICATIONS.
Loss of Intellectual
Property
Violations of Compliance
and Regulatory Norms
Compromised Credentials
and Authentication
Breaches
Threats to APIs
Hijacking of Accounts
Abuse of Cloud Services
LOSS OF INTELLECTUAL PROPERTY
More than 20% of the data kept on the cloud by enterprises contain sensitive
information, including but not limited to intellectual property. 
Now, most enterprises use multi-tenancy cloud services, wherein their
data is kept on servers that are also used to deliver similar services to
other organizations.
VIOLATIONSOF
COMPLIANCEAND
REGULATORY
NORMS
Enterprises need to ensure that
their cloud storage and
application service providers take
care of these regulatory norms. 
Also, for enterprises that
promote the Bring Your Own
Device and Bring Your Own Cloud
concepts, ensuring compliance to
these norms becomes a lot more
challenging.
COMPROMISED CREDENTIALS AND
AUTHENTICATION BREACHES
• Enterprises struggle with identity management issues as they
map permissions and privileges with user roles.
• Another huge problem area is when enterprises don’t remove or
change user access when he/she quits or changes role.
THREATS TO APIS
Most cloud solution providers
offer their APIs to enterprise IT
teams to help them with cloud
provisioning, orchestration,
management, and monitoring.
 This makes the security and
availability of cloud solutions
dependent on the API security.
Weak API interfaces expose cloud
applications to risks of
accountability, confidentiality,
integrity, and availability.
HIJACKING OF ACCOUNTS
Cloud services are also vulnerable to these disruptive cyber attacks
because cybercriminals have more means to monitor the activities
of users on shared clouds.
Prevention of account details loss is the first step to keeping cloud
applications safe from phishing and other violations.
ABUSE OF CLOUD
SERVICES
Cloud services can be misused to
commit nefarious cyber crimes,
right from the usage of cloud
resources to access encryption
keys, to launching DDoS attacks
on an enterprise’s servers.
Exposure to legal liabilities in
form of lawsuits from impacted
parties.
Severe loss of reputation
THANKS FOR WATCHING
SUBSCRIBE NOW!
www.slideshare.net/TyroneSystems
THAT'S ALL,
FOLKS!

6 major cyber security risks to cloud computing

  • 1.
    6 MAJOR CYBER SECURITYRISKS TO CLOUD COMPUTING
  • 2.
     Cloud computing hasbrought the advantage of lower cost of ownership of IT applications, super fast time to market, and unmatched surges in employee productivity.
  • 3.
    THE MOST COMMONOF THESE CYBERSECURITY ISSUES THAT THREATEN CLOUD COMPUTING APPLICATIONS. Loss of Intellectual Property Violations of Compliance and Regulatory Norms Compromised Credentials and Authentication Breaches Threats to APIs Hijacking of Accounts Abuse of Cloud Services
  • 4.
    LOSS OF INTELLECTUALPROPERTY More than 20% of the data kept on the cloud by enterprises contain sensitive information, including but not limited to intellectual property.  Now, most enterprises use multi-tenancy cloud services, wherein their data is kept on servers that are also used to deliver similar services to other organizations.
  • 5.
    VIOLATIONSOF COMPLIANCEAND REGULATORY NORMS Enterprises need toensure that their cloud storage and application service providers take care of these regulatory norms.  Also, for enterprises that promote the Bring Your Own Device and Bring Your Own Cloud concepts, ensuring compliance to these norms becomes a lot more challenging.
  • 6.
    COMPROMISED CREDENTIALS AND AUTHENTICATIONBREACHES • Enterprises struggle with identity management issues as they map permissions and privileges with user roles. • Another huge problem area is when enterprises don’t remove or change user access when he/she quits or changes role.
  • 7.
    THREATS TO APIS Mostcloud solution providers offer their APIs to enterprise IT teams to help them with cloud provisioning, orchestration, management, and monitoring.  This makes the security and availability of cloud solutions dependent on the API security. Weak API interfaces expose cloud applications to risks of accountability, confidentiality, integrity, and availability.
  • 8.
    HIJACKING OF ACCOUNTS Cloudservices are also vulnerable to these disruptive cyber attacks because cybercriminals have more means to monitor the activities of users on shared clouds. Prevention of account details loss is the first step to keeping cloud applications safe from phishing and other violations.
  • 9.
    ABUSE OF CLOUD SERVICES Cloudservices can be misused to commit nefarious cyber crimes, right from the usage of cloud resources to access encryption keys, to launching DDoS attacks on an enterprise’s servers. Exposure to legal liabilities in form of lawsuits from impacted parties. Severe loss of reputation
  • 10.
    THANKS FOR WATCHING SUBSCRIBENOW! www.slideshare.net/TyroneSystems THAT'S ALL, FOLKS!