This document discusses cloud computing risks and security. It identifies several types of risks including unauthorized access to data, insecure interfaces, insider threats, technology sharing issues, data loss or leakage, hijacking, and unknown risk profiles. It also discusses how cloud service providers use methods like encryption, VPNs, logging, and data segregation to protect customer data and security. Finally, it outlines some advantages of cloud computing in establishing security through data centralization, incident response capabilities, and logging while also noting challenges around regulatory compliance, disaster recovery, and ensuring long-term data accessibility.
1.Secure datatransfer
2. Secure programs interfaces
3. Secure retained data
4.user access to control
5.data separation
5.
It’s asignificant part of business planning.
Risk management believe to reduce the risk
R.M method for recognizing, considering risk.
Some of risk administrations are ISO,NIT
A disaster at a cloud provider can affect every one of
its customers.
And hackers and malware are not the only ones who
may target a cloud service provider.
Cloud computing risks are also presented by insider
threats.
6.
Cloud computingprovide all types of possibilities to
reduce the risk in IT .
Over 2-3 years IT organization evolving better
concentrated on
“Auditing, inspecting, reconsidering & modernizing”
Hybrid clouds start to verify their enterprise worth.
7.
Risk caneffect in market Authority:
Robust development,
premium supply charges &
investor confidence.
Risk management is not only buying protection for the
company, it should consider insurable & uninsurable
risk.
Its also define cost effective during the risk
management.
9.
#1. Unauthorizedaccess to customer and
business data
Criminals do not like to work. They may
target small business networks because they
are easier to breach, and they often go after
larger companies because of the allure of
larger payouts.
10.
#2. Insecureinterfaces & APIs
Provider should double check that security to
their service forms
Logging security
#3.Vicious insider
Large risk in cc environment.
Gain unauthorized access to organozations
11.
#4. Issuesrelated technology sharing
It is based on IaaS
Remember: you have many ways to protect
your data when it is in control
#5. data loss or leakage
Data may be deleted or loss without produce
backup
#6. Hijacking
Deception & exploitation of program
vulnerabilities
12.
#7. Unknownrisk profile
This is less engaged with h/w & s/w
maintenance.
13.
Malicious insiders& abusive use of login access by an
unauthorized persons.
Identity theft
External security Risk
Malware infections and data breaches
Data Protection Risk-
Data loss risk-deletion of record, loss of
encryption key,correption of data.
15.
It isa open environment security risk.
Its have high accessibility and associated with Risk too.
Cc provide higher service quality , security,
availability & reliability.
Current state
Data storage & computation are offer in the single
data center(service provider)
A single point of malfunction will not be presumed
for any data loss compare with house computing.
16.
How dataprotected?
How code protected?
Cc provide security,availablity & reliablity.
Security advantages:
Data centralization
Incident Response
Forensic image verification time-MD5 hash function
Logging-benchmark logs solveing the logging problems
17.
Investigation-illegal cloudenvironment
Data segregation –data normally distributed
Long term viability-double check the data
accessibility
Compromised server- backup of data
Regularity compliance-update not in regular
Recovery – natural and man made disasters.
18.
If thedata is confidential ,the data can handle by the
authorized person only.
Cc is the platform of digital matching form.
Human-human data flow.
Cloud ,digital persona & data security:
Salesforce.com-12 year of experience-service-infrastructure
scalability to accessibility.
After get authentication only can control the cloud .
Protect data from unauthorized control
19.
Content levelsecurity endows Organizations to
organize data .
Contents are the organizational level, rather than the
institutional level.
20.
Cloud serviceproviders use a combination of methods
to protect your data. ... Cloud providers take steps to
protect data that's in transit.
Data Security methods include virtual private
networks, encryption, or masking. Virtual private
networks (VPNs) allow remote employees to connect
to corporate networks.
21.
Data integritystrengthen by PRIVACY,SECURITY, &
RELIABLITY
And the integrity getting damaged by
HACKERS,PROGRAM MISTAKE, comp. virus
Data availability -
Data backup plan -
Disaster Recovery plan-
22.
Only authorizedpersons only can access the resource within the system.
Setp1- Authenticate individual
Step2-get info. About individual
Step3-permit
Auditing:
Advantage is to reduce the cost of IT services.
Reduce the capital cost.
Unlimited scalablity
Pay- as-usage
23.
Cc establishDB in virtual environment by reveling
internal & external attacks.
Double check the data inherently protected.
software testing:
Reducing testing cost
S/W testing tools to cc Applications