Interactive Powerpoint_How to Master effective communication
Cloud computing
1. NADAR SARASWATHI COLLEGE OF ARTS AND SCIENCE
CLOUD COMPUTING
DEPARTMENT OF COMPUTER SCIENCE
TOPIC:SECURITY AS A SERVICE
SECURITY GOVERNANCE
Presented by..,
M.Shakthi ,Msc(CS)
2. SECURITY AS A SERVICE:
Security-as-a-Service (SECaaS) is a cloud-based method of outsourcing your
cybersecurity. Outsourced security can cover data protection, VoIP security,
database security, and general network security. All of these can help an
organization combat SECaaS threats, such as malware and botnets.
SECURITY AS A SERVICE:
Email security: Protects against email frauds, spam, phishing, malware etc.
Identification: Users can access with a valid log-in ID and legal permission, else
forbids if it is not authenticated.
Data loss prevention: Tools are built to monitor and secure data to protect from
data loss.
3. Types of security as a service:
• Data security.
• Identity and access management (IAM)
• Governance (policies on threat prevention, detection, and
mitigation)
• Data retention (DR) and business continuity (BC) planning.
• Legal compliance
1.Encryption
2.Network security
3.Identification
4.Data loss prevention
4. Encryption: makes the data unreadable until it has been authentically
decoded, or encrypted.
Network security: Network access management protocols are used to
secure and keep an eye on network services.
Email security: Protects against email frauds, spam, phishing, malware
etc.
Identification: Users can access with a valid log-in ID and legal
permission, else forbids if it is not authenticated.
Data loss prevention: Tools are built to monitor and secure data to
protect from data loss.
5. Benefits of SECaaS:
1. Offers the latest version of antivirus software that is compatible with cutting-
edge technologies.
2. At a reasonable cost, the company may hire qualified security personnel. To
secure the company’s data, they will provide the finest service possible.
3. The IT team’s ability to administer and monitor security procedures inside the
firm is facilitThe organization’s resources are constantly provided with greater
security.
4. ated by the use of a web interface or having access to a management dashboard,
both of which need greater security expertise.
5. When a user accesses data without a valid business reason, it may be
determined that they are doing so.
6. A web interface that allows internal management of various activities as well as
a view of the protective configuration and ongoing actions.
6.
7. SECURITY GOVERNANCE
• Security governance is the combined set of tools, personnel, and processes
that provide for formalized risk management. It includes organizational
structure, roles and responsibilities, metrics, processes, and oversight, as it
specifically impacts the security program.
• Access control policies: Limit access to information on a need-to-know basis.
• Data classification: Categorize data based on sensitivity levels and apply
appropriate security measures.
• Password management: Establish rules for password creation, storage, and
expiration.
8. MAIN PURPOSE OF SECURITY GOVERNANCE:
Security governance is a process for overseeing the cybersecurity
teams who are responsible for mitigating business risks. Security
governance leaders make the decisions that allow risks to be
prioritized so that security efforts are focused on business
priorities rather than their own.