SlideShare a Scribd company logo
- The
Technology
which Rules
the Future .
Outline:
 What is Cloud Computing?
 How Cloud Computing Works?
 Types Of Clouds?
 Types of Cloud Services?
 Cloud Computing Security:
 Cloud Security Analysis:
 Balancing the Threat Exposure:
 Working Of Fed RAMP:
 Fed RAMP Authorization Process:
 Benefits Of Fed RAMP:
 Final word:
What is cloud computing?
Cloud Computing is a technology that uses the
internet and central remote servers to maintain data
and applications.
Simple applications of Cloud Computing is yahoo
email, Gmail or hotmail etc.
How cloud computing works?
Cloud computing consists of two layers, namely
BACK END
FRONT END
Two layers:
Front end - Is the part seen by the client,i.e. the
computer user. this includes the client’s network (or
computer) and the applications used to access the
cloud via user interface such as a web browser.
Back end – Is the ‘cloud’ itself, comprising various
computers, servers and data storage devices..
Types of clouds:
Public Clouds Computing environment are open for
used to anyone who wants to sign up and use them.
(Eg:Amazon Web services,google Apennine).
Private Cloud is a Cloud Computing infrastructure
created by an organization for its own internal use
rather than using someone else’s infrastructure.
(Eg:Amazon EC2)
Hybrid Cloud is a composition of at least one private
cloud and at least one public cloud.
(Eg.IBM)
Types of cloud
services:
SAAS END CUSTOMERS
PAAS DEVELOPERS
IAAS SYS ADMINS
What is IAAS?
Infrastructure as a service is provisional in which an
organization outsources the equipment used to support
operations, including storage,hardware,servers and
networking components
Characteristics and components of IAAS include:
o utility computing service and billing model.
o Automation of administrative tasks.
o Dynamic scaling.
o Desktop virualization.
o Policy-based services.
o Internet connectivity.
What is PAAS?
Platform as a service (PAAS) is the deliverance of a
computer platform and resolution stack as a service.
It regularly goes extra with the inclusion of a software
progress platform, that is designed for cloud computing at
the top of the cloud stack.
Characteristics of PAAS:
o PAAS includes workflow amenities for application
propositions.
o PAAS is app progress, testing use and hosting as well as
proposition services such as group partnership.
o PAAS is web service amalgamation,app
versioning,security,storage,persistence,scalability,state
administration and app instrumentation.
What is SAAS?
Applications or software is delivered as a service to the
customer who can access the program from any online
device who can access the program from any online device
,eliminating the need to install and run the applications
on the customer’s own computers and simplifying
maintenance and support.
Characteristics of SAAS:
o Multi tenant Infrastructure.
o Easy Customization.
o Better Access.
CLOUD
SECURITY:
Cloud Security Analysis:
Some key issues:
o Trust ,multi-tenancy,encryption,compliance.
Cloud Security is a tractable problem.
o There are both
ADVANTAGES
CHALLENGES
Security Advantage:
Shifting public data to a external clod reduces the exposure
of the internal sensitive data.
Cloud homogeneity makes security auditing/testing
simpler.
Clouds enable automated security management.
Redundancy/disaster recovery.
Some of the Security Challenges:
Trusting vendor’s security model.
Customer inability to respond to audit findings.
Obtaining support for investigations.
Proprietary implementations can’t be examined.
Loss of physical control.
Security Related Cloud services:
Cloud Provisioning Services.
Cloud Data Storage Services.
Cloud Processing Infrastructure.
Cloud Support Services.
Cloud Network and Premier Security.
Elastic Elements :Storage Processing.
Balancing Threat Exposure:
Private Clouds may have less threat exposure than
community clouds which have threat exposure than public
clouds.
Massive Public Clouds may be cost effective than large
community clouds which may be more effective than small
private clouds.
Putting it Together:
Most clouds will require very strong security controls.
All models of cloud may be used for differing tradeoffs
between threat exposure bad efficiency.
There is no one “cloud “.there are many models and
architectures.
Federated Risk Management of Cloud Systems.
Working Process of Fed RAMP:
Fed RAMP is the result of close collaboration with security
and cloud experts from the federal council and its working
as well as private industry.
Fed ramp will authorize cloud systems in a four step
process:
o INITIATING:
o ASSESSING:
o AUTHORIZING:
o LEVERAGING:
INITIATING: The Fed RAMP assessment process is initiated
by agencies or Cloud Service Provider (CSPs) beginning a
security authorization using the Fed RAMP requirements.
ASSESSING: CSPs must implement the Fed RAMP security
requirements on their environment and hire a Fed RAMP
approved third party assessment organization (3PAO) to
perform an independent assessment to audit the cloud system
and provide a security assessment package for review.
AUTHORIZING: The Fed RAMP Joint Authorization
Board(JAB) will review the security assessment package based on
a prioritized approach and may grant a provisional
authorization.
LEVERAGING: Federal agencies can leverage CSP
authorization packages for review when granting an agency
Authority To Operate (ATO) saving time and money.
Agency x has a need for
a new cloud based IT
system
Fed RAMP Authorization process:
Agency x gets security
requirements for the new IT
system from Fed RAMP and
adds requirements if necessary
Agency x releases REP
for new IT System and
awards contract to
cloud service provider
(CSP)
Agency X submits request to
Fed RAMP office for CSP to be
Fed RAMP authorized to operate
CSP is put into Fed RAMP priority queue
(prioritization occurs based on factors
such as multi-agency use, number of
expected users,etc.)
Fed RAMP AUTHORIZATION PROCESS (CONT):
CSP and agency
sponsor begin
authorization
process with Fed
RAMP office.
CSP agency sponsor and
Fed RAMP office review
security requirements
and any alternative
implementation.
Fed RAMP office
coordinators with CSP
for creation of system
security plan(SSP).
CSP has independent
assessment of security
controls and developers
appropriate reports for
submission for Fed
RAMP office.
Fed RAMP office
reviews and
assembles the
final authorization
package for the
JAB
JAB reviews final
certification package
and authorization CSP
to operate
Fed RAMP office adds CSP to
authorized system inventory
to be reviewed and leveraged
by all Federal agencies
Fed RAMP provide continuous
monitoring of CSP
Benefits of Fed RAMP:
Saves significant cost, time and resources “Do once
use many times”
Improves real-time security visibility.
Provides a uniform approach to risk-based
management.
Enhance transparency between government and cloud
service providers (CSPs)
Improves the trustworthiness,reliability,consistency
and quality of the Federal security authorization
process.
Final Word:
Without a doubt, Cloud Computing is Truly a
Revolutionary Concept for many Business Organization.
Because of the …,
 Technology's Ease of Adoption,
Significantly Lower Maintenance Costs and
Greater Workflow Efficiency.
There is no doubt that Cloud Computing will gain wide
Spread Popularity Going Forward…
BY ,
N.HARIKRISHNAN
3RD YEAR ,B.TECH IT
SRIRAM ENGINNERING
COLLLEGE,PERMAPATTU,
THIRUVALLUR.

More Related Content

What's hot

Cloud computing
Cloud computingCloud computing
Cloud computing
Aditya Dwivedi
 
Cloud computing
Cloud computingCloud computing
Cloud computing
DebrajKarmakar
 
Cloud Computing
Cloud ComputingCloud Computing
Cloud computing ppt
Cloud computing pptCloud computing ppt
Cloud computing ppt
Sarvesh Meena
 
Cloud computing
Cloud computingCloud computing
Cloud computing
kanchu17
 
Cloud computing writeup
Cloud computing writeupCloud computing writeup
Cloud computing writeupselvavijay1987
 
Research in Cloud Computing
Research in Cloud ComputingResearch in Cloud Computing
Research in Cloud ComputingRajshri Mohan
 
My Presentation on Cloud Computing
My Presentation on Cloud ComputingMy Presentation on Cloud Computing
My Presentation on Cloud Computing
Pravin Sable
 
Cloud computing ppt
Cloud computing pptCloud computing ppt
Cloud computing pptJagriti Rai
 
Introduction to cloud computing
Introduction to cloud computingIntroduction to cloud computing
Introduction to cloud computing
Jithin Parakka
 
Cloud computing
Cloud computingCloud computing
Cloud computing
Ankita Khadatkar
 
Cloud computing
Cloud computingCloud computing
Cloud computing
Waseem Ahmed
 
INTRODUCTION TO CLOUD COMPUTING
INTRODUCTION TO CLOUD COMPUTINGINTRODUCTION TO CLOUD COMPUTING
INTRODUCTION TO CLOUD COMPUTING
Tanmoy Barman
 
cloud computing 5.pptx
cloud computing 5.pptxcloud computing 5.pptx
cloud computing 5.pptx
Jatin673232
 
Cloud Computing for college presenation project.
Cloud Computing for college presenation project.Cloud Computing for college presenation project.
Cloud Computing for college presenation project.
Mahesh Tibrewal
 
Cloud Computing- components, working, pros and cons
Cloud Computing- components, working, pros and consCloud Computing- components, working, pros and cons
Cloud Computing- components, working, pros and cons
Amritpal Singh Bedi
 
Cloud Computing
Cloud Computing Cloud Computing
Cloud Computing
MANVENDRA PRIYADARSHI
 
Cloud Computing - An Introduction
Cloud Computing - An IntroductionCloud Computing - An Introduction
Cloud Computing - An Introduction
Ravindra Dastikop
 
Cloud computing by Bharat Bodage
Cloud computing by Bharat BodageCloud computing by Bharat Bodage
Cloud computing by Bharat Bodage
Bharat Bodage
 

What's hot (20)

Cloud computing
Cloud computingCloud computing
Cloud computing
 
Cloud computing
Cloud computingCloud computing
Cloud computing
 
Cloud Computing
Cloud ComputingCloud Computing
Cloud Computing
 
Cloud computing ppt
Cloud computing pptCloud computing ppt
Cloud computing ppt
 
Cloud computing
Cloud computingCloud computing
Cloud computing
 
Cloud computing writeup
Cloud computing writeupCloud computing writeup
Cloud computing writeup
 
Research in Cloud Computing
Research in Cloud ComputingResearch in Cloud Computing
Research in Cloud Computing
 
My Presentation on Cloud Computing
My Presentation on Cloud ComputingMy Presentation on Cloud Computing
My Presentation on Cloud Computing
 
Cloud computing ppt
Cloud computing pptCloud computing ppt
Cloud computing ppt
 
Introduction to cloud computing
Introduction to cloud computingIntroduction to cloud computing
Introduction to cloud computing
 
Cloud computing
Cloud computingCloud computing
Cloud computing
 
Cloud computing
Cloud computingCloud computing
Cloud computing
 
Basics of Cloud Computing
Basics of Cloud ComputingBasics of Cloud Computing
Basics of Cloud Computing
 
INTRODUCTION TO CLOUD COMPUTING
INTRODUCTION TO CLOUD COMPUTINGINTRODUCTION TO CLOUD COMPUTING
INTRODUCTION TO CLOUD COMPUTING
 
cloud computing 5.pptx
cloud computing 5.pptxcloud computing 5.pptx
cloud computing 5.pptx
 
Cloud Computing for college presenation project.
Cloud Computing for college presenation project.Cloud Computing for college presenation project.
Cloud Computing for college presenation project.
 
Cloud Computing- components, working, pros and cons
Cloud Computing- components, working, pros and consCloud Computing- components, working, pros and cons
Cloud Computing- components, working, pros and cons
 
Cloud Computing
Cloud Computing Cloud Computing
Cloud Computing
 
Cloud Computing - An Introduction
Cloud Computing - An IntroductionCloud Computing - An Introduction
Cloud Computing - An Introduction
 
Cloud computing by Bharat Bodage
Cloud computing by Bharat BodageCloud computing by Bharat Bodage
Cloud computing by Bharat Bodage
 

Similar to Cloud computing

ERP IN CLOUD
ERP IN CLOUDERP IN CLOUD
ERP IN CLOUD
hari krishnan.n
 
Cloud Computing Networks
Cloud Computing NetworksCloud Computing Networks
Cloud Computing Networks
jayapal385
 
Cloud Computing
Cloud ComputingCloud Computing
Cloud Computing
Mathews Job
 
A Breif On Cloud computing
A Breif On Cloud computingA Breif On Cloud computing
A Breif On Cloud computing
Raja Raman
 
Cloud Use Cases And Standards
Cloud Use Cases And StandardsCloud Use Cases And Standards
Cloud Use Cases And Standards
GovCloud Network
 
cloudintro-lec01.ppt
cloudintro-lec01.pptcloudintro-lec01.ppt
cloudintro-lec01.ppt
MunmunSaha7
 
cloudintro-lec01.ppt
cloudintro-lec01.pptcloudintro-lec01.ppt
cloudintro-lec01.ppt
DevendraPathak22
 
cloudintro-lec01.ppt
cloudintro-lec01.pptcloudintro-lec01.ppt
cloudintro-lec01.ppt
ahmedraed19
 
cloudintro-lec01.ppt
cloudintro-lec01.pptcloudintro-lec01.ppt
cloudintro-lec01.ppt
Patrick Theuri
 
cloudintro-lec01.ppt
cloudintro-lec01.pptcloudintro-lec01.ppt
cloudintro-lec01.ppt
AmitPaul775033
 
Adaptive Cloud Security: Game-Changing Cloud Security and Compliance Automati...
Adaptive Cloud Security: Game-Changing Cloud Security and Compliance Automati...Adaptive Cloud Security: Game-Changing Cloud Security and Compliance Automati...
Adaptive Cloud Security: Game-Changing Cloud Security and Compliance Automati...
Amazon Web Services
 
Cloud computing
Cloud computingCloud computing
Cloud computingmikerrr
 
Cloudcomputing
CloudcomputingCloudcomputing
Cloudcomputing
Muhammad Mubashar
 
cloudintroduction.ppt
cloudintroduction.pptcloudintroduction.ppt
cloudintroduction.ppt
AhmedRebai8
 
Cloud computing
Cloud computingCloud computing
Cloud computing
Amiya Kumar
 
Ct Cloud Computing.V1.0
Ct Cloud Computing.V1.0Ct Cloud Computing.V1.0
Ct Cloud Computing.V1.0Jimmy Chu
 
lect15_cloud.ppt
lect15_cloud.pptlect15_cloud.ppt
lect15_cloud.ppt
PeerlessSecuritiesLi
 
lect15_cloud.ppt
lect15_cloud.pptlect15_cloud.ppt
lect15_cloud.ppt
Ajit Mali
 
IRJET- Cloud Computing: Security Issues Challenges and Solution
IRJET-  	  Cloud Computing: Security Issues Challenges and SolutionIRJET-  	  Cloud Computing: Security Issues Challenges and Solution
IRJET- Cloud Computing: Security Issues Challenges and Solution
IRJET Journal
 

Similar to Cloud computing (20)

ERP IN CLOUD
ERP IN CLOUDERP IN CLOUD
ERP IN CLOUD
 
Cloud Computing Networks
Cloud Computing NetworksCloud Computing Networks
Cloud Computing Networks
 
Cloud Computing
Cloud ComputingCloud Computing
Cloud Computing
 
A Breif On Cloud computing
A Breif On Cloud computingA Breif On Cloud computing
A Breif On Cloud computing
 
Cloud Use Cases And Standards
Cloud Use Cases And StandardsCloud Use Cases And Standards
Cloud Use Cases And Standards
 
cloudintro-lec01.ppt
cloudintro-lec01.pptcloudintro-lec01.ppt
cloudintro-lec01.ppt
 
cloudintro-lec01.ppt
cloudintro-lec01.pptcloudintro-lec01.ppt
cloudintro-lec01.ppt
 
cloudintro-lec01.ppt
cloudintro-lec01.pptcloudintro-lec01.ppt
cloudintro-lec01.ppt
 
cloudintro-lec01.ppt
cloudintro-lec01.pptcloudintro-lec01.ppt
cloudintro-lec01.ppt
 
cloudintro-lec01.ppt
cloudintro-lec01.pptcloudintro-lec01.ppt
cloudintro-lec01.ppt
 
Adaptive Cloud Security: Game-Changing Cloud Security and Compliance Automati...
Adaptive Cloud Security: Game-Changing Cloud Security and Compliance Automati...Adaptive Cloud Security: Game-Changing Cloud Security and Compliance Automati...
Adaptive Cloud Security: Game-Changing Cloud Security and Compliance Automati...
 
Cloud computing
Cloud computingCloud computing
Cloud computing
 
Cloudcomputing
CloudcomputingCloudcomputing
Cloudcomputing
 
cloudintroduction.ppt
cloudintroduction.pptcloudintroduction.ppt
cloudintroduction.ppt
 
Dssc Intro
Dssc IntroDssc Intro
Dssc Intro
 
Cloud computing
Cloud computingCloud computing
Cloud computing
 
Ct Cloud Computing.V1.0
Ct Cloud Computing.V1.0Ct Cloud Computing.V1.0
Ct Cloud Computing.V1.0
 
lect15_cloud.ppt
lect15_cloud.pptlect15_cloud.ppt
lect15_cloud.ppt
 
lect15_cloud.ppt
lect15_cloud.pptlect15_cloud.ppt
lect15_cloud.ppt
 
IRJET- Cloud Computing: Security Issues Challenges and Solution
IRJET-  	  Cloud Computing: Security Issues Challenges and SolutionIRJET-  	  Cloud Computing: Security Issues Challenges and Solution
IRJET- Cloud Computing: Security Issues Challenges and Solution
 

More from hari krishnan.n

SEO-Search Engine Optimisation
SEO-Search Engine OptimisationSEO-Search Engine Optimisation
SEO-Search Engine Optimisation
hari krishnan.n
 
Axis Bank Social Media Marketing
Axis Bank Social Media MarketingAxis Bank Social Media Marketing
Axis Bank Social Media Marketing
hari krishnan.n
 
Axis bank strengthens brand with progressive campaign on linkedIn
Axis bank strengthens brand with progressive campaign on linkedInAxis bank strengthens brand with progressive campaign on linkedIn
Axis bank strengthens brand with progressive campaign on linkedIn
hari krishnan.n
 
Derivative Market
Derivative MarketDerivative Market
Derivative Market
hari krishnan.n
 
Drawbacks of our Education system
Drawbacks of our Education systemDrawbacks of our Education system
Drawbacks of our Education system
hari krishnan.n
 
Cross-cultural communication
Cross-cultural communicationCross-cultural communication
Cross-cultural communication
hari krishnan.n
 
Chennai express- Social Media Marketing Strategy
Chennai express- Social Media Marketing StrategyChennai express- Social Media Marketing Strategy
Chennai express- Social Media Marketing Strategy
hari krishnan.n
 
political behavior-organisational politics,discretionary behavior,defensive b...
political behavior-organisational politics,discretionary behavior,defensive b...political behavior-organisational politics,discretionary behavior,defensive b...
political behavior-organisational politics,discretionary behavior,defensive b...
hari krishnan.n
 
Picture arithmetic cryptosystem module explanation
Picture arithmetic cryptosystem module explanationPicture arithmetic cryptosystem module explanation
Picture arithmetic cryptosystem module explanation
hari krishnan.n
 
Picture arithmetic cryptosystem using symmetric key enhanced algorithm with l...
Picture arithmetic cryptosystem using symmetric key enhanced algorithm with l...Picture arithmetic cryptosystem using symmetric key enhanced algorithm with l...
Picture arithmetic cryptosystem using symmetric key enhanced algorithm with l...
hari krishnan.n
 
I-Mode in mobile communication.
I-Mode in mobile communication.I-Mode in mobile communication.
I-Mode in mobile communication.
hari krishnan.n
 
Issues with personality tests
Issues with personality testsIssues with personality tests
Issues with personality tests
hari krishnan.n
 
Issues with personality tests
Issues with personality testsIssues with personality tests
Issues with personality tests
hari krishnan.n
 
Management productivity tools1
Management productivity tools1Management productivity tools1
Management productivity tools1
hari krishnan.n
 
Socio economic classification
Socio economic classificationSocio economic classification
Socio economic classification
hari krishnan.n
 
i-mode ppt and syncml
i-mode ppt and syncmli-mode ppt and syncml
i-mode ppt and syncml
hari krishnan.n
 

More from hari krishnan.n (17)

SEO-Search Engine Optimisation
SEO-Search Engine OptimisationSEO-Search Engine Optimisation
SEO-Search Engine Optimisation
 
Axis Bank Social Media Marketing
Axis Bank Social Media MarketingAxis Bank Social Media Marketing
Axis Bank Social Media Marketing
 
Axis bank strengthens brand with progressive campaign on linkedIn
Axis bank strengthens brand with progressive campaign on linkedInAxis bank strengthens brand with progressive campaign on linkedIn
Axis bank strengthens brand with progressive campaign on linkedIn
 
Make science in india
Make science in indiaMake science in india
Make science in india
 
Derivative Market
Derivative MarketDerivative Market
Derivative Market
 
Drawbacks of our Education system
Drawbacks of our Education systemDrawbacks of our Education system
Drawbacks of our Education system
 
Cross-cultural communication
Cross-cultural communicationCross-cultural communication
Cross-cultural communication
 
Chennai express- Social Media Marketing Strategy
Chennai express- Social Media Marketing StrategyChennai express- Social Media Marketing Strategy
Chennai express- Social Media Marketing Strategy
 
political behavior-organisational politics,discretionary behavior,defensive b...
political behavior-organisational politics,discretionary behavior,defensive b...political behavior-organisational politics,discretionary behavior,defensive b...
political behavior-organisational politics,discretionary behavior,defensive b...
 
Picture arithmetic cryptosystem module explanation
Picture arithmetic cryptosystem module explanationPicture arithmetic cryptosystem module explanation
Picture arithmetic cryptosystem module explanation
 
Picture arithmetic cryptosystem using symmetric key enhanced algorithm with l...
Picture arithmetic cryptosystem using symmetric key enhanced algorithm with l...Picture arithmetic cryptosystem using symmetric key enhanced algorithm with l...
Picture arithmetic cryptosystem using symmetric key enhanced algorithm with l...
 
I-Mode in mobile communication.
I-Mode in mobile communication.I-Mode in mobile communication.
I-Mode in mobile communication.
 
Issues with personality tests
Issues with personality testsIssues with personality tests
Issues with personality tests
 
Issues with personality tests
Issues with personality testsIssues with personality tests
Issues with personality tests
 
Management productivity tools1
Management productivity tools1Management productivity tools1
Management productivity tools1
 
Socio economic classification
Socio economic classificationSocio economic classification
Socio economic classification
 
i-mode ppt and syncml
i-mode ppt and syncmli-mode ppt and syncml
i-mode ppt and syncml
 

Recently uploaded

Designing Great Products: The Power of Design and Leadership by Chief Designe...
Designing Great Products: The Power of Design and Leadership by Chief Designe...Designing Great Products: The Power of Design and Leadership by Chief Designe...
Designing Great Products: The Power of Design and Leadership by Chief Designe...
Product School
 
AI for Every Business: Unlocking Your Product's Universal Potential by VP of ...
AI for Every Business: Unlocking Your Product's Universal Potential by VP of ...AI for Every Business: Unlocking Your Product's Universal Potential by VP of ...
AI for Every Business: Unlocking Your Product's Universal Potential by VP of ...
Product School
 
When stars align: studies in data quality, knowledge graphs, and machine lear...
When stars align: studies in data quality, knowledge graphs, and machine lear...When stars align: studies in data quality, knowledge graphs, and machine lear...
When stars align: studies in data quality, knowledge graphs, and machine lear...
Elena Simperl
 
Elevating Tactical DDD Patterns Through Object Calisthenics
Elevating Tactical DDD Patterns Through Object CalisthenicsElevating Tactical DDD Patterns Through Object Calisthenics
Elevating Tactical DDD Patterns Through Object Calisthenics
Dorra BARTAGUIZ
 
Accelerate your Kubernetes clusters with Varnish Caching
Accelerate your Kubernetes clusters with Varnish CachingAccelerate your Kubernetes clusters with Varnish Caching
Accelerate your Kubernetes clusters with Varnish Caching
Thijs Feryn
 
JMeter webinar - integration with InfluxDB and Grafana
JMeter webinar - integration with InfluxDB and GrafanaJMeter webinar - integration with InfluxDB and Grafana
JMeter webinar - integration with InfluxDB and Grafana
RTTS
 
Bits & Pixels using AI for Good.........
Bits & Pixels using AI for Good.........Bits & Pixels using AI for Good.........
Bits & Pixels using AI for Good.........
Alison B. Lowndes
 
Epistemic Interaction - tuning interfaces to provide information for AI support
Epistemic Interaction - tuning interfaces to provide information for AI supportEpistemic Interaction - tuning interfaces to provide information for AI support
Epistemic Interaction - tuning interfaces to provide information for AI support
Alan Dix
 
Slack (or Teams) Automation for Bonterra Impact Management (fka Social Soluti...
Slack (or Teams) Automation for Bonterra Impact Management (fka Social Soluti...Slack (or Teams) Automation for Bonterra Impact Management (fka Social Soluti...
Slack (or Teams) Automation for Bonterra Impact Management (fka Social Soluti...
Jeffrey Haguewood
 
Securing your Kubernetes cluster_ a step-by-step guide to success !
Securing your Kubernetes cluster_ a step-by-step guide to success !Securing your Kubernetes cluster_ a step-by-step guide to success !
Securing your Kubernetes cluster_ a step-by-step guide to success !
KatiaHIMEUR1
 
UiPath Test Automation using UiPath Test Suite series, part 4
UiPath Test Automation using UiPath Test Suite series, part 4UiPath Test Automation using UiPath Test Suite series, part 4
UiPath Test Automation using UiPath Test Suite series, part 4
DianaGray10
 
State of ICS and IoT Cyber Threat Landscape Report 2024 preview
State of ICS and IoT Cyber Threat Landscape Report 2024 previewState of ICS and IoT Cyber Threat Landscape Report 2024 preview
State of ICS and IoT Cyber Threat Landscape Report 2024 preview
Prayukth K V
 
DevOps and Testing slides at DASA Connect
DevOps and Testing slides at DASA ConnectDevOps and Testing slides at DASA Connect
DevOps and Testing slides at DASA Connect
Kari Kakkonen
 
Knowledge engineering: from people to machines and back
Knowledge engineering: from people to machines and backKnowledge engineering: from people to machines and back
Knowledge engineering: from people to machines and back
Elena Simperl
 
Assuring Contact Center Experiences for Your Customers With ThousandEyes
Assuring Contact Center Experiences for Your Customers With ThousandEyesAssuring Contact Center Experiences for Your Customers With ThousandEyes
Assuring Contact Center Experiences for Your Customers With ThousandEyes
ThousandEyes
 
Mission to Decommission: Importance of Decommissioning Products to Increase E...
Mission to Decommission: Importance of Decommissioning Products to Increase E...Mission to Decommission: Importance of Decommissioning Products to Increase E...
Mission to Decommission: Importance of Decommissioning Products to Increase E...
Product School
 
FIDO Alliance Osaka Seminar: Passkeys at Amazon.pdf
FIDO Alliance Osaka Seminar: Passkeys at Amazon.pdfFIDO Alliance Osaka Seminar: Passkeys at Amazon.pdf
FIDO Alliance Osaka Seminar: Passkeys at Amazon.pdf
FIDO Alliance
 
FIDO Alliance Osaka Seminar: Overview.pdf
FIDO Alliance Osaka Seminar: Overview.pdfFIDO Alliance Osaka Seminar: Overview.pdf
FIDO Alliance Osaka Seminar: Overview.pdf
FIDO Alliance
 
GenAISummit 2024 May 28 Sri Ambati Keynote: AGI Belongs to The Community in O...
GenAISummit 2024 May 28 Sri Ambati Keynote: AGI Belongs to The Community in O...GenAISummit 2024 May 28 Sri Ambati Keynote: AGI Belongs to The Community in O...
GenAISummit 2024 May 28 Sri Ambati Keynote: AGI Belongs to The Community in O...
Sri Ambati
 
FIDO Alliance Osaka Seminar: The WebAuthn API and Discoverable Credentials.pdf
FIDO Alliance Osaka Seminar: The WebAuthn API and Discoverable Credentials.pdfFIDO Alliance Osaka Seminar: The WebAuthn API and Discoverable Credentials.pdf
FIDO Alliance Osaka Seminar: The WebAuthn API and Discoverable Credentials.pdf
FIDO Alliance
 

Recently uploaded (20)

Designing Great Products: The Power of Design and Leadership by Chief Designe...
Designing Great Products: The Power of Design and Leadership by Chief Designe...Designing Great Products: The Power of Design and Leadership by Chief Designe...
Designing Great Products: The Power of Design and Leadership by Chief Designe...
 
AI for Every Business: Unlocking Your Product's Universal Potential by VP of ...
AI for Every Business: Unlocking Your Product's Universal Potential by VP of ...AI for Every Business: Unlocking Your Product's Universal Potential by VP of ...
AI for Every Business: Unlocking Your Product's Universal Potential by VP of ...
 
When stars align: studies in data quality, knowledge graphs, and machine lear...
When stars align: studies in data quality, knowledge graphs, and machine lear...When stars align: studies in data quality, knowledge graphs, and machine lear...
When stars align: studies in data quality, knowledge graphs, and machine lear...
 
Elevating Tactical DDD Patterns Through Object Calisthenics
Elevating Tactical DDD Patterns Through Object CalisthenicsElevating Tactical DDD Patterns Through Object Calisthenics
Elevating Tactical DDD Patterns Through Object Calisthenics
 
Accelerate your Kubernetes clusters with Varnish Caching
Accelerate your Kubernetes clusters with Varnish CachingAccelerate your Kubernetes clusters with Varnish Caching
Accelerate your Kubernetes clusters with Varnish Caching
 
JMeter webinar - integration with InfluxDB and Grafana
JMeter webinar - integration with InfluxDB and GrafanaJMeter webinar - integration with InfluxDB and Grafana
JMeter webinar - integration with InfluxDB and Grafana
 
Bits & Pixels using AI for Good.........
Bits & Pixels using AI for Good.........Bits & Pixels using AI for Good.........
Bits & Pixels using AI for Good.........
 
Epistemic Interaction - tuning interfaces to provide information for AI support
Epistemic Interaction - tuning interfaces to provide information for AI supportEpistemic Interaction - tuning interfaces to provide information for AI support
Epistemic Interaction - tuning interfaces to provide information for AI support
 
Slack (or Teams) Automation for Bonterra Impact Management (fka Social Soluti...
Slack (or Teams) Automation for Bonterra Impact Management (fka Social Soluti...Slack (or Teams) Automation for Bonterra Impact Management (fka Social Soluti...
Slack (or Teams) Automation for Bonterra Impact Management (fka Social Soluti...
 
Securing your Kubernetes cluster_ a step-by-step guide to success !
Securing your Kubernetes cluster_ a step-by-step guide to success !Securing your Kubernetes cluster_ a step-by-step guide to success !
Securing your Kubernetes cluster_ a step-by-step guide to success !
 
UiPath Test Automation using UiPath Test Suite series, part 4
UiPath Test Automation using UiPath Test Suite series, part 4UiPath Test Automation using UiPath Test Suite series, part 4
UiPath Test Automation using UiPath Test Suite series, part 4
 
State of ICS and IoT Cyber Threat Landscape Report 2024 preview
State of ICS and IoT Cyber Threat Landscape Report 2024 previewState of ICS and IoT Cyber Threat Landscape Report 2024 preview
State of ICS and IoT Cyber Threat Landscape Report 2024 preview
 
DevOps and Testing slides at DASA Connect
DevOps and Testing slides at DASA ConnectDevOps and Testing slides at DASA Connect
DevOps and Testing slides at DASA Connect
 
Knowledge engineering: from people to machines and back
Knowledge engineering: from people to machines and backKnowledge engineering: from people to machines and back
Knowledge engineering: from people to machines and back
 
Assuring Contact Center Experiences for Your Customers With ThousandEyes
Assuring Contact Center Experiences for Your Customers With ThousandEyesAssuring Contact Center Experiences for Your Customers With ThousandEyes
Assuring Contact Center Experiences for Your Customers With ThousandEyes
 
Mission to Decommission: Importance of Decommissioning Products to Increase E...
Mission to Decommission: Importance of Decommissioning Products to Increase E...Mission to Decommission: Importance of Decommissioning Products to Increase E...
Mission to Decommission: Importance of Decommissioning Products to Increase E...
 
FIDO Alliance Osaka Seminar: Passkeys at Amazon.pdf
FIDO Alliance Osaka Seminar: Passkeys at Amazon.pdfFIDO Alliance Osaka Seminar: Passkeys at Amazon.pdf
FIDO Alliance Osaka Seminar: Passkeys at Amazon.pdf
 
FIDO Alliance Osaka Seminar: Overview.pdf
FIDO Alliance Osaka Seminar: Overview.pdfFIDO Alliance Osaka Seminar: Overview.pdf
FIDO Alliance Osaka Seminar: Overview.pdf
 
GenAISummit 2024 May 28 Sri Ambati Keynote: AGI Belongs to The Community in O...
GenAISummit 2024 May 28 Sri Ambati Keynote: AGI Belongs to The Community in O...GenAISummit 2024 May 28 Sri Ambati Keynote: AGI Belongs to The Community in O...
GenAISummit 2024 May 28 Sri Ambati Keynote: AGI Belongs to The Community in O...
 
FIDO Alliance Osaka Seminar: The WebAuthn API and Discoverable Credentials.pdf
FIDO Alliance Osaka Seminar: The WebAuthn API and Discoverable Credentials.pdfFIDO Alliance Osaka Seminar: The WebAuthn API and Discoverable Credentials.pdf
FIDO Alliance Osaka Seminar: The WebAuthn API and Discoverable Credentials.pdf
 

Cloud computing

  • 2. Outline:  What is Cloud Computing?  How Cloud Computing Works?  Types Of Clouds?  Types of Cloud Services?  Cloud Computing Security:  Cloud Security Analysis:  Balancing the Threat Exposure:  Working Of Fed RAMP:  Fed RAMP Authorization Process:  Benefits Of Fed RAMP:  Final word:
  • 3. What is cloud computing? Cloud Computing is a technology that uses the internet and central remote servers to maintain data and applications. Simple applications of Cloud Computing is yahoo email, Gmail or hotmail etc.
  • 4. How cloud computing works? Cloud computing consists of two layers, namely BACK END FRONT END
  • 5. Two layers: Front end - Is the part seen by the client,i.e. the computer user. this includes the client’s network (or computer) and the applications used to access the cloud via user interface such as a web browser. Back end – Is the ‘cloud’ itself, comprising various computers, servers and data storage devices..
  • 7. Public Clouds Computing environment are open for used to anyone who wants to sign up and use them. (Eg:Amazon Web services,google Apennine). Private Cloud is a Cloud Computing infrastructure created by an organization for its own internal use rather than using someone else’s infrastructure. (Eg:Amazon EC2) Hybrid Cloud is a composition of at least one private cloud and at least one public cloud. (Eg.IBM)
  • 8. Types of cloud services: SAAS END CUSTOMERS PAAS DEVELOPERS IAAS SYS ADMINS
  • 9. What is IAAS? Infrastructure as a service is provisional in which an organization outsources the equipment used to support operations, including storage,hardware,servers and networking components Characteristics and components of IAAS include: o utility computing service and billing model. o Automation of administrative tasks. o Dynamic scaling. o Desktop virualization. o Policy-based services. o Internet connectivity.
  • 10. What is PAAS? Platform as a service (PAAS) is the deliverance of a computer platform and resolution stack as a service. It regularly goes extra with the inclusion of a software progress platform, that is designed for cloud computing at the top of the cloud stack. Characteristics of PAAS: o PAAS includes workflow amenities for application propositions. o PAAS is app progress, testing use and hosting as well as proposition services such as group partnership. o PAAS is web service amalgamation,app versioning,security,storage,persistence,scalability,state administration and app instrumentation.
  • 11. What is SAAS? Applications or software is delivered as a service to the customer who can access the program from any online device who can access the program from any online device ,eliminating the need to install and run the applications on the customer’s own computers and simplifying maintenance and support. Characteristics of SAAS: o Multi tenant Infrastructure. o Easy Customization. o Better Access.
  • 13. Cloud Security Analysis: Some key issues: o Trust ,multi-tenancy,encryption,compliance. Cloud Security is a tractable problem. o There are both ADVANTAGES CHALLENGES
  • 14. Security Advantage: Shifting public data to a external clod reduces the exposure of the internal sensitive data. Cloud homogeneity makes security auditing/testing simpler. Clouds enable automated security management. Redundancy/disaster recovery.
  • 15. Some of the Security Challenges: Trusting vendor’s security model. Customer inability to respond to audit findings. Obtaining support for investigations. Proprietary implementations can’t be examined. Loss of physical control.
  • 16. Security Related Cloud services: Cloud Provisioning Services. Cloud Data Storage Services. Cloud Processing Infrastructure. Cloud Support Services. Cloud Network and Premier Security. Elastic Elements :Storage Processing.
  • 17. Balancing Threat Exposure: Private Clouds may have less threat exposure than community clouds which have threat exposure than public clouds. Massive Public Clouds may be cost effective than large community clouds which may be more effective than small private clouds.
  • 18. Putting it Together: Most clouds will require very strong security controls. All models of cloud may be used for differing tradeoffs between threat exposure bad efficiency. There is no one “cloud “.there are many models and architectures. Federated Risk Management of Cloud Systems.
  • 19. Working Process of Fed RAMP: Fed RAMP is the result of close collaboration with security and cloud experts from the federal council and its working as well as private industry. Fed ramp will authorize cloud systems in a four step process: o INITIATING: o ASSESSING: o AUTHORIZING: o LEVERAGING:
  • 20. INITIATING: The Fed RAMP assessment process is initiated by agencies or Cloud Service Provider (CSPs) beginning a security authorization using the Fed RAMP requirements. ASSESSING: CSPs must implement the Fed RAMP security requirements on their environment and hire a Fed RAMP approved third party assessment organization (3PAO) to perform an independent assessment to audit the cloud system and provide a security assessment package for review. AUTHORIZING: The Fed RAMP Joint Authorization Board(JAB) will review the security assessment package based on a prioritized approach and may grant a provisional authorization. LEVERAGING: Federal agencies can leverage CSP authorization packages for review when granting an agency Authority To Operate (ATO) saving time and money.
  • 21. Agency x has a need for a new cloud based IT system Fed RAMP Authorization process: Agency x gets security requirements for the new IT system from Fed RAMP and adds requirements if necessary Agency x releases REP for new IT System and awards contract to cloud service provider (CSP) Agency X submits request to Fed RAMP office for CSP to be Fed RAMP authorized to operate CSP is put into Fed RAMP priority queue (prioritization occurs based on factors such as multi-agency use, number of expected users,etc.)
  • 22. Fed RAMP AUTHORIZATION PROCESS (CONT): CSP and agency sponsor begin authorization process with Fed RAMP office. CSP agency sponsor and Fed RAMP office review security requirements and any alternative implementation. Fed RAMP office coordinators with CSP for creation of system security plan(SSP). CSP has independent assessment of security controls and developers appropriate reports for submission for Fed RAMP office. Fed RAMP office reviews and assembles the final authorization package for the JAB JAB reviews final certification package and authorization CSP to operate Fed RAMP office adds CSP to authorized system inventory to be reviewed and leveraged by all Federal agencies Fed RAMP provide continuous monitoring of CSP
  • 23. Benefits of Fed RAMP: Saves significant cost, time and resources “Do once use many times” Improves real-time security visibility. Provides a uniform approach to risk-based management. Enhance transparency between government and cloud service providers (CSPs) Improves the trustworthiness,reliability,consistency and quality of the Federal security authorization process.
  • 24. Final Word: Without a doubt, Cloud Computing is Truly a Revolutionary Concept for many Business Organization. Because of the …,  Technology's Ease of Adoption, Significantly Lower Maintenance Costs and Greater Workflow Efficiency. There is no doubt that Cloud Computing will gain wide Spread Popularity Going Forward…
  • 25.
  • 26. BY , N.HARIKRISHNAN 3RD YEAR ,B.TECH IT SRIRAM ENGINNERING COLLLEGE,PERMAPATTU, THIRUVALLUR.