SlideShare a Scribd company logo
1 of 13
PUBLIC
CLOUD
SECURITY
Prepared By:
Jhanvi Dattani
CSPIT-CHARUSAT
Outline:
๏ƒ˜ Why and What Is Cloud
๏ƒ˜ Types Of Cloud
๏ƒ˜ Continue
๏ƒ˜ Security
๏ƒ˜ Is Cloud Secure
๏ƒ˜ Security And Cloud
๏ƒ˜ Office 365 (Data Center)
๏ƒ˜ During Data Transfer
๏ƒ˜ Conclusion
๏ƒ˜ References
Why and What Is Cloud??
๏ƒ˜ Cloud computing is the on-demand delivery of compute
power, database storage, applications, and other IT resources
through a cloud services platform via the internet with pay-
as-you-go pricing.
๏ƒ˜ Cloud is the most feasible and economic option, for
providing high amount computational power, database and
other infrastructure that are needed by emerging
technologies.
๏ƒ˜ It works on simple fundamental:
๏ƒ˜ Use the resources online.
๏ƒ˜ Pay for it (according to your demand).
๏ƒ˜ Drop it, whenever not needed.
Types Of Cloud..
Continue..
1) Public Cloud:
๏ƒ˜ Public clouds are owned by a third party cloud service provider
๏ƒ˜ takes care of hardware, software and other infrastructure
๏ƒ˜ delivers computing resources like servers and storage over the Internet to
customer.
2) Private Cloud:
๏ƒ˜ data center is physically located at the specific organization
๏ƒ˜ all information can be accessed via local network
๏ƒ˜ Else they are hosted by third party cloud accessed via private network.
3) Hybrid Cloud:
๏ƒ˜ This is the amalgamation of public and private clouds,
๏ƒ˜ it allows workloads to move between private and public clouds,
๏ƒ˜ hybrid cloud gives businesses greater flexibility and more data deployment
options.
Security..
๏ƒ˜ Security always comes into picture when we store data at
the places where we do not have any idea about how it is
stored or where it is stored physically.
๏ƒ˜ This same case applies when we use cloud services as means
of storing data โ€“becoming the reason about worry for data
security.
๏ƒ˜ Public clouds are secure because many securities are
provided starting form physical layer, logical layer and also
when someone tries to transfer confidential information of
company to any outsider.
Is Cloud Secure ??
๏ƒ˜ Well, the answer to this question is yes upto an extent.
๏ƒ˜ Tough firewall security is provided in public clouds.
๏ƒ˜ Penetration testing that are performed on public clouds,
gives overall result rather than giving result at the exact
moment.
๏ƒ˜ Public clouds attract the best security people available.
๏ƒ˜ When it comes to data transfer high level encryption is
provided thus, becoming hard for the intruder to interpret
data.
๏ƒ˜ Eg: AES, triple DES, two fish, RSA, etc.
๏ƒ˜ Ensure single tenant architecture on cloud.
๏ƒ˜ Cloud Providers should daily give you update about
Security And Cloud:
๏ƒ˜Data center (physically stored).
๏ƒ˜During data transfer over internet.
Office 365 (Data Center):
๏ƒ˜If you are not the administrator and pull the disk drive out,
then mechanisms are provided the person cannot see any
data.(physical layer)
๏ƒ˜If the intruder somehow gets access to data at data center,
then he wonโ€™t be allowed to open up the browser on
server(to dump the malicious code) and if browser is opened
then he will be unable to run it as it will be the process that is
not in category of whitelisted ones (logical layer).
๏ƒ˜If any insider person tries to send data to other person, then
mechanisms are provided to ensure that the email is read
only by certain set of individuals and not all.
During Data Transfer:
๏ƒ˜Implement a multifactor authentication .
๏ƒ˜Provide encryption system on the user end to protect against
data breaches.
๏ƒ˜Provide good firewall.
๏ƒ˜Keep password strong to avoid attacks.
๏ƒ˜Also, changing password on monthly basis reduces chances
of data breach.
Conclusion:
Whenever you are on the internet, you are not 100% secure.
But on the contrary it can be said that the tough algorithms
and tight security mechanisms provided by companies prevent
intruder from attacking. So always it is recommended to keep
strong and weird passwords, use secure websites, etc.
References:
๏ƒ˜ http://www.zdnet.com/article/12-reasons-why-public-clouds-are-better-than-
private-clouds/
๏ƒ˜ https://www.youtube.com/watch?v=S4QqQG8tTSg
๏ƒ˜ https://www.nytimes.com/2017/01/23/insider/where-does-cloud-storage-really-
reside-and-is-it-secure.html
๏ƒ˜ https://www.networkworld.com/article/3016673/public-cloud/public-cloud-vs-on-
premises-which-is-more-secure.html
๏ƒ˜ http://www.computerweekly.com/answer/Cloud-computing-network-security-
best-practices
THANK YOU

More Related Content

What's hot

CLOUD COMPUTING AND STORAGE
CLOUD COMPUTING AND STORAGECLOUD COMPUTING AND STORAGE
CLOUD COMPUTING AND STORAGE
Shalini Toluchuri
ย 
Analysis-of-Security-Algorithms-in-Cloud-Computing [Autosaved]
Analysis-of-Security-Algorithms-in-Cloud-Computing [Autosaved]Analysis-of-Security-Algorithms-in-Cloud-Computing [Autosaved]
Analysis-of-Security-Algorithms-in-Cloud-Computing [Autosaved]
Mahmuda Rahman
ย 
Cloud Computing
Cloud ComputingCloud Computing
Cloud Computing
Ruchir Tarawat
ย 
Security in multi cloud data storage with sic architecture
Security in multi cloud data storage with sic architectureSecurity in multi cloud data storage with sic architecture
Security in multi cloud data storage with sic architecture
eSAT Journals
ย 
Threats and risks to cloud computing
Threats and risks to cloud computingThreats and risks to cloud computing
Threats and risks to cloud computing
Ryo Matsumoto
ย 
Privacy preserving delegated access control in public cloud
Privacy preserving delegated access control in public cloudPrivacy preserving delegated access control in public cloud
Privacy preserving delegated access control in public cloud
Aswathy Rajan
ย 
Final year presentation
Final year presentationFinal year presentation
Final year presentation
Abhishek Jain
ย 

What's hot (19)

CLOUD COMPUTING AND STORAGE
CLOUD COMPUTING AND STORAGECLOUD COMPUTING AND STORAGE
CLOUD COMPUTING AND STORAGE
ย 
Cloud Computing Using Encryption and Intrusion Detection
Cloud Computing Using Encryption and Intrusion DetectionCloud Computing Using Encryption and Intrusion Detection
Cloud Computing Using Encryption and Intrusion Detection
ย 
Data Confidentiality in Cloud Computing
Data Confidentiality in Cloud ComputingData Confidentiality in Cloud Computing
Data Confidentiality in Cloud Computing
ย 
A Study of Data Storage Security Issues in Cloud Computing
A Study of Data Storage Security Issues in Cloud ComputingA Study of Data Storage Security Issues in Cloud Computing
A Study of Data Storage Security Issues in Cloud Computing
ย 
Analysis-of-Security-Algorithms-in-Cloud-Computing [Autosaved]
Analysis-of-Security-Algorithms-in-Cloud-Computing [Autosaved]Analysis-of-Security-Algorithms-in-Cloud-Computing [Autosaved]
Analysis-of-Security-Algorithms-in-Cloud-Computing [Autosaved]
ย 
Cloud Computing
Cloud ComputingCloud Computing
Cloud Computing
ย 
Analysis of classical encryption techniques in cloud computing
Analysis of classical encryption techniques in cloud computingAnalysis of classical encryption techniques in cloud computing
Analysis of classical encryption techniques in cloud computing
ย 
J018145862
J018145862J018145862
J018145862
ย 
Decentralized Cloud Storage-Storjio
DecentralizedCloud Storage-StorjioDecentralizedCloud Storage-Storjio
Decentralized Cloud Storage-Storjio
ย 
Security in multi cloud data storage with sic architecture
Security in multi cloud data storage with sic architectureSecurity in multi cloud data storage with sic architecture
Security in multi cloud data storage with sic architecture
ย 
Security in multi cloud data storage with sic
Security in multi cloud data storage with sicSecurity in multi cloud data storage with sic
Security in multi cloud data storage with sic
ย 
A hybrid cloud approach for secure authorized deduplication
A hybrid cloud approach for secure authorized deduplicationA hybrid cloud approach for secure authorized deduplication
A hybrid cloud approach for secure authorized deduplication
ย 
Privacy preserving delegated access control in public clouds
Privacy preserving delegated access control in public cloudsPrivacy preserving delegated access control in public clouds
Privacy preserving delegated access control in public clouds
ย 
Threats and risks to cloud computing
Threats and risks to cloud computingThreats and risks to cloud computing
Threats and risks to cloud computing
ย 
Cloud Computing Security Threats and Responses
Cloud Computing Security Threats and ResponsesCloud Computing Security Threats and Responses
Cloud Computing Security Threats and Responses
ย 
Privacy preserving delegated access control in public cloud
Privacy preserving delegated access control in public cloudPrivacy preserving delegated access control in public cloud
Privacy preserving delegated access control in public cloud
ย 
Privacy preserving delegated access control in public clouds
Privacy preserving delegated access control in public cloudsPrivacy preserving delegated access control in public clouds
Privacy preserving delegated access control in public clouds
ย 
SMONA: Secure Multi Owner Data Sharing for Dynamic Groups in the Cloud
SMONA: Secure Multi Owner Data Sharing for Dynamic Groups in the CloudSMONA: Secure Multi Owner Data Sharing for Dynamic Groups in the Cloud
SMONA: Secure Multi Owner Data Sharing for Dynamic Groups in the Cloud
ย 
Final year presentation
Final year presentationFinal year presentation
Final year presentation
ย 

Similar to Cloud security

Security Issues in Cloud Computing by rahul abhishek
Security Issues in Cloud Computing  by rahul abhishekSecurity Issues in Cloud Computing  by rahul abhishek
Security Issues in Cloud Computing by rahul abhishek
Er. rahul abhishek
ย 
Security Issues in Cloud Computing by rahul abhishek
Security Issues in Cloud Computing  by rahul abhishekSecurity Issues in Cloud Computing  by rahul abhishek
Security Issues in Cloud Computing by rahul abhishek
Er. rahul abhishek
ย 
fog computing provide security to the data in cloud
fog computing provide security to the data in cloudfog computing provide security to the data in cloud
fog computing provide security to the data in cloud
priyanka reddy
ย 
Iaetsd cloud computing and security challenges
Iaetsd cloud computing and security challengesIaetsd cloud computing and security challenges
Iaetsd cloud computing and security challenges
Iaetsd Iaetsd
ย 
AWS Security Challenges
AWS Security ChallengesAWS Security Challenges
AWS Security Challenges
STO STRATEGY
ย 

Similar to Cloud security (20)

Security Issues in Cloud Computing by rahul abhishek
Security Issues in Cloud Computing  by rahul abhishekSecurity Issues in Cloud Computing  by rahul abhishek
Security Issues in Cloud Computing by rahul abhishek
ย 
Security Issues in Cloud Computing by rahul abhishek
Security Issues in Cloud Computing  by rahul abhishekSecurity Issues in Cloud Computing  by rahul abhishek
Security Issues in Cloud Computing by rahul abhishek
ย 
UNIT -V.docx
UNIT -V.docxUNIT -V.docx
UNIT -V.docx
ย 
Enhancing Data Storage Security in Cloud Computing Through Steganography
Enhancing Data Storage Security in Cloud Computing Through SteganographyEnhancing Data Storage Security in Cloud Computing Through Steganography
Enhancing Data Storage Security in Cloud Computing Through Steganography
ย 
Fog computing document
Fog computing documentFog computing document
Fog computing document
ย 
Cloud security
Cloud securityCloud security
Cloud security
ย 
fog computing provide security to the data in cloud
fog computing provide security to the data in cloudfog computing provide security to the data in cloud
fog computing provide security to the data in cloud
ย 
Fog doc
Fog doc Fog doc
Fog doc
ย 
Iaetsd cloud computing and security challenges
Iaetsd cloud computing and security challengesIaetsd cloud computing and security challenges
Iaetsd cloud computing and security challenges
ย 
Kp3419221926
Kp3419221926Kp3419221926
Kp3419221926
ย 
Aes based secured framework for cloud databases
Aes based secured framework for cloud databasesAes based secured framework for cloud databases
Aes based secured framework for cloud databases
ย 
Enhancing Privacy in Cloud Service Provider Using Cryptographic Algorithm
Enhancing Privacy in Cloud Service Provider Using Cryptographic AlgorithmEnhancing Privacy in Cloud Service Provider Using Cryptographic Algorithm
Enhancing Privacy in Cloud Service Provider Using Cryptographic Algorithm
ย 
Encryption Technique for a Trusted Cloud Computing Environment
Encryption Technique for a Trusted Cloud Computing EnvironmentEncryption Technique for a Trusted Cloud Computing Environment
Encryption Technique for a Trusted Cloud Computing Environment
ย 
Encryption Technique for a Trusted Cloud Computing Environment
Encryption Technique for a Trusted Cloud Computing EnvironmentEncryption Technique for a Trusted Cloud Computing Environment
Encryption Technique for a Trusted Cloud Computing Environment
ย 
H017155360
H017155360H017155360
H017155360
ย 
Encryption Technique for a Trusted Cloud Computing Environment
Encryption Technique for a Trusted Cloud Computing EnvironmentEncryption Technique for a Trusted Cloud Computing Environment
Encryption Technique for a Trusted Cloud Computing Environment
ย 
Introduction to cloud computing
Introduction to cloud computingIntroduction to cloud computing
Introduction to cloud computing
ย 
B1802041217
B1802041217B1802041217
B1802041217
ย 
AWS Security Challenges
AWS Security ChallengesAWS Security Challenges
AWS Security Challenges
ย 
Security in cloud computing
Security in cloud computingSecurity in cloud computing
Security in cloud computing
ย 

Recently uploaded

CALL ON โžฅ8923113531 ๐Ÿ”Call Girls Lucknow Lucknow best sexual service Online
CALL ON โžฅ8923113531 ๐Ÿ”Call Girls Lucknow Lucknow best sexual service OnlineCALL ON โžฅ8923113531 ๐Ÿ”Call Girls Lucknow Lucknow best sexual service Online
CALL ON โžฅ8923113531 ๐Ÿ”Call Girls Lucknow Lucknow best sexual service Online
anilsa9823
ย 
Call Girls In Saket Delhi ๐Ÿ’ฏCall Us ๐Ÿ”8264348440๐Ÿ”
Call Girls In Saket Delhi ๐Ÿ’ฏCall Us ๐Ÿ”8264348440๐Ÿ”Call Girls In Saket Delhi ๐Ÿ’ฏCall Us ๐Ÿ”8264348440๐Ÿ”
Call Girls In Saket Delhi ๐Ÿ’ฏCall Us ๐Ÿ”8264348440๐Ÿ”
soniya singh
ย 
Hot Service (+9316020077 ) Goa Call Girls Real Photos and Genuine Service
Hot Service (+9316020077 ) Goa  Call Girls Real Photos and Genuine ServiceHot Service (+9316020077 ) Goa  Call Girls Real Photos and Genuine Service
Hot Service (+9316020077 ) Goa Call Girls Real Photos and Genuine Service
sexy call girls service in goa
ย 
Call Girls Service Chandigarh Lucky โค๏ธ 7710465962 Independent Call Girls In C...
Call Girls Service Chandigarh Lucky โค๏ธ 7710465962 Independent Call Girls In C...Call Girls Service Chandigarh Lucky โค๏ธ 7710465962 Independent Call Girls In C...
Call Girls Service Chandigarh Lucky โค๏ธ 7710465962 Independent Call Girls In C...
Sheetaleventcompany
ย 
Call Girls In Defence Colony Delhi ๐Ÿ’ฏCall Us ๐Ÿ”8264348440๐Ÿ”
Call Girls In Defence Colony Delhi ๐Ÿ’ฏCall Us ๐Ÿ”8264348440๐Ÿ”Call Girls In Defence Colony Delhi ๐Ÿ’ฏCall Us ๐Ÿ”8264348440๐Ÿ”
Call Girls In Defence Colony Delhi ๐Ÿ’ฏCall Us ๐Ÿ”8264348440๐Ÿ”
soniya singh
ย 
Call Girls In Ashram Chowk Delhi ๐Ÿ’ฏCall Us ๐Ÿ”8264348440๐Ÿ”
Call Girls In Ashram Chowk Delhi ๐Ÿ’ฏCall Us ๐Ÿ”8264348440๐Ÿ”Call Girls In Ashram Chowk Delhi ๐Ÿ’ฏCall Us ๐Ÿ”8264348440๐Ÿ”
Call Girls In Ashram Chowk Delhi ๐Ÿ’ฏCall Us ๐Ÿ”8264348440๐Ÿ”
soniya singh
ย 
Rohini Sector 6 Call Girls Delhi 9999965857 @Sabina Saikh No Advance
Rohini Sector 6 Call Girls Delhi 9999965857 @Sabina Saikh No AdvanceRohini Sector 6 Call Girls Delhi 9999965857 @Sabina Saikh No Advance
Rohini Sector 6 Call Girls Delhi 9999965857 @Sabina Saikh No Advance
Call Girls In Delhi Whatsup 9873940964 Enjoy Unlimited Pleasure
ย 
Call Girls In Sukhdev Vihar Delhi ๐Ÿ’ฏCall Us ๐Ÿ”8264348440๐Ÿ”
Call Girls In Sukhdev Vihar Delhi ๐Ÿ’ฏCall Us ๐Ÿ”8264348440๐Ÿ”Call Girls In Sukhdev Vihar Delhi ๐Ÿ’ฏCall Us ๐Ÿ”8264348440๐Ÿ”
Call Girls In Sukhdev Vihar Delhi ๐Ÿ’ฏCall Us ๐Ÿ”8264348440๐Ÿ”
soniya singh
ย 

Recently uploaded (20)

WhatsApp ๐Ÿ“ž 8448380779 โœ…Call Girls In Mamura Sector 66 ( Noida)
WhatsApp ๐Ÿ“ž 8448380779 โœ…Call Girls In Mamura Sector 66 ( Noida)WhatsApp ๐Ÿ“ž 8448380779 โœ…Call Girls In Mamura Sector 66 ( Noida)
WhatsApp ๐Ÿ“ž 8448380779 โœ…Call Girls In Mamura Sector 66 ( Noida)
ย 
INDIVIDUAL ASSIGNMENT #3 CBG, PRESENTATION.
INDIVIDUAL ASSIGNMENT #3 CBG, PRESENTATION.INDIVIDUAL ASSIGNMENT #3 CBG, PRESENTATION.
INDIVIDUAL ASSIGNMENT #3 CBG, PRESENTATION.
ย 
CALL ON โžฅ8923113531 ๐Ÿ”Call Girls Lucknow Lucknow best sexual service Online
CALL ON โžฅ8923113531 ๐Ÿ”Call Girls Lucknow Lucknow best sexual service OnlineCALL ON โžฅ8923113531 ๐Ÿ”Call Girls Lucknow Lucknow best sexual service Online
CALL ON โžฅ8923113531 ๐Ÿ”Call Girls Lucknow Lucknow best sexual service Online
ย 
Call Girls In Saket Delhi ๐Ÿ’ฏCall Us ๐Ÿ”8264348440๐Ÿ”
Call Girls In Saket Delhi ๐Ÿ’ฏCall Us ๐Ÿ”8264348440๐Ÿ”Call Girls In Saket Delhi ๐Ÿ’ฏCall Us ๐Ÿ”8264348440๐Ÿ”
Call Girls In Saket Delhi ๐Ÿ’ฏCall Us ๐Ÿ”8264348440๐Ÿ”
ย 
Top Rated Pune Call Girls Daund โŸŸ 6297143586 โŸŸ Call Me For Genuine Sex Servi...
Top Rated  Pune Call Girls Daund โŸŸ 6297143586 โŸŸ Call Me For Genuine Sex Servi...Top Rated  Pune Call Girls Daund โŸŸ 6297143586 โŸŸ Call Me For Genuine Sex Servi...
Top Rated Pune Call Girls Daund โŸŸ 6297143586 โŸŸ Call Me For Genuine Sex Servi...
ย 
Hot Service (+9316020077 ) Goa Call Girls Real Photos and Genuine Service
Hot Service (+9316020077 ) Goa  Call Girls Real Photos and Genuine ServiceHot Service (+9316020077 ) Goa  Call Girls Real Photos and Genuine Service
Hot Service (+9316020077 ) Goa Call Girls Real Photos and Genuine Service
ย 
Call Girls Service Chandigarh Lucky โค๏ธ 7710465962 Independent Call Girls In C...
Call Girls Service Chandigarh Lucky โค๏ธ 7710465962 Independent Call Girls In C...Call Girls Service Chandigarh Lucky โค๏ธ 7710465962 Independent Call Girls In C...
Call Girls Service Chandigarh Lucky โค๏ธ 7710465962 Independent Call Girls In C...
ย 
Best VIP Call Girls Noida Sector 75 Call Me: 8448380779
Best VIP Call Girls Noida Sector 75 Call Me: 8448380779Best VIP Call Girls Noida Sector 75 Call Me: 8448380779
Best VIP Call Girls Noida Sector 75 Call Me: 8448380779
ย 
DDoS In Oceania and the Pacific, presented by Dave Phelan at NZNOG 2024
DDoS In Oceania and the Pacific, presented by Dave Phelan at NZNOG 2024DDoS In Oceania and the Pacific, presented by Dave Phelan at NZNOG 2024
DDoS In Oceania and the Pacific, presented by Dave Phelan at NZNOG 2024
ย 
All Time Service Available Call Girls Mg Road ๐Ÿ‘Œ โญ๏ธ 6378878445
All Time Service Available Call Girls Mg Road ๐Ÿ‘Œ โญ๏ธ 6378878445All Time Service Available Call Girls Mg Road ๐Ÿ‘Œ โญ๏ธ 6378878445
All Time Service Available Call Girls Mg Road ๐Ÿ‘Œ โญ๏ธ 6378878445
ย 
Call Girls In Defence Colony Delhi ๐Ÿ’ฏCall Us ๐Ÿ”8264348440๐Ÿ”
Call Girls In Defence Colony Delhi ๐Ÿ’ฏCall Us ๐Ÿ”8264348440๐Ÿ”Call Girls In Defence Colony Delhi ๐Ÿ’ฏCall Us ๐Ÿ”8264348440๐Ÿ”
Call Girls In Defence Colony Delhi ๐Ÿ’ฏCall Us ๐Ÿ”8264348440๐Ÿ”
ย 
Pune Airport ( Call Girls ) Pune 6297143586 Hot Model With Sexy Bhabi Ready...
Pune Airport ( Call Girls ) Pune  6297143586  Hot Model With Sexy Bhabi Ready...Pune Airport ( Call Girls ) Pune  6297143586  Hot Model With Sexy Bhabi Ready...
Pune Airport ( Call Girls ) Pune 6297143586 Hot Model With Sexy Bhabi Ready...
ย 
On Starlink, presented by Geoff Huston at NZNOG 2024
On Starlink, presented by Geoff Huston at NZNOG 2024On Starlink, presented by Geoff Huston at NZNOG 2024
On Starlink, presented by Geoff Huston at NZNOG 2024
ย 
Call Girls In Ashram Chowk Delhi ๐Ÿ’ฏCall Us ๐Ÿ”8264348440๐Ÿ”
Call Girls In Ashram Chowk Delhi ๐Ÿ’ฏCall Us ๐Ÿ”8264348440๐Ÿ”Call Girls In Ashram Chowk Delhi ๐Ÿ’ฏCall Us ๐Ÿ”8264348440๐Ÿ”
Call Girls In Ashram Chowk Delhi ๐Ÿ’ฏCall Us ๐Ÿ”8264348440๐Ÿ”
ย 
(+971568250507 ))# Young Call Girls in Ajman By Pakistani Call Girls in ...
(+971568250507  ))#  Young Call Girls  in Ajman  By Pakistani Call Girls  in ...(+971568250507  ))#  Young Call Girls  in Ajman  By Pakistani Call Girls  in ...
(+971568250507 ))# Young Call Girls in Ajman By Pakistani Call Girls in ...
ย 
How is AI changing journalism? (v. April 2024)
How is AI changing journalism? (v. April 2024)How is AI changing journalism? (v. April 2024)
How is AI changing journalism? (v. April 2024)
ย 
Rohini Sector 6 Call Girls Delhi 9999965857 @Sabina Saikh No Advance
Rohini Sector 6 Call Girls Delhi 9999965857 @Sabina Saikh No AdvanceRohini Sector 6 Call Girls Delhi 9999965857 @Sabina Saikh No Advance
Rohini Sector 6 Call Girls Delhi 9999965857 @Sabina Saikh No Advance
ย 
๐“€คCall On 7877925207 ๐“€ค Ahmedguda Call Girls Hot Model With Sexy Bhabi Ready Fo...
๐“€คCall On 7877925207 ๐“€ค Ahmedguda Call Girls Hot Model With Sexy Bhabi Ready Fo...๐“€คCall On 7877925207 ๐“€ค Ahmedguda Call Girls Hot Model With Sexy Bhabi Ready Fo...
๐“€คCall On 7877925207 ๐“€ค Ahmedguda Call Girls Hot Model With Sexy Bhabi Ready Fo...
ย 
VVVIP Call Girls In Connaught Place โžก๏ธ Delhi โžก๏ธ 9999965857 ๐Ÿš€ No Advance 24HRS...
VVVIP Call Girls In Connaught Place โžก๏ธ Delhi โžก๏ธ 9999965857 ๐Ÿš€ No Advance 24HRS...VVVIP Call Girls In Connaught Place โžก๏ธ Delhi โžก๏ธ 9999965857 ๐Ÿš€ No Advance 24HRS...
VVVIP Call Girls In Connaught Place โžก๏ธ Delhi โžก๏ธ 9999965857 ๐Ÿš€ No Advance 24HRS...
ย 
Call Girls In Sukhdev Vihar Delhi ๐Ÿ’ฏCall Us ๐Ÿ”8264348440๐Ÿ”
Call Girls In Sukhdev Vihar Delhi ๐Ÿ’ฏCall Us ๐Ÿ”8264348440๐Ÿ”Call Girls In Sukhdev Vihar Delhi ๐Ÿ’ฏCall Us ๐Ÿ”8264348440๐Ÿ”
Call Girls In Sukhdev Vihar Delhi ๐Ÿ’ฏCall Us ๐Ÿ”8264348440๐Ÿ”
ย 

Cloud security

  • 2. Outline: ๏ƒ˜ Why and What Is Cloud ๏ƒ˜ Types Of Cloud ๏ƒ˜ Continue ๏ƒ˜ Security ๏ƒ˜ Is Cloud Secure ๏ƒ˜ Security And Cloud ๏ƒ˜ Office 365 (Data Center) ๏ƒ˜ During Data Transfer ๏ƒ˜ Conclusion ๏ƒ˜ References
  • 3. Why and What Is Cloud?? ๏ƒ˜ Cloud computing is the on-demand delivery of compute power, database storage, applications, and other IT resources through a cloud services platform via the internet with pay- as-you-go pricing. ๏ƒ˜ Cloud is the most feasible and economic option, for providing high amount computational power, database and other infrastructure that are needed by emerging technologies. ๏ƒ˜ It works on simple fundamental: ๏ƒ˜ Use the resources online. ๏ƒ˜ Pay for it (according to your demand). ๏ƒ˜ Drop it, whenever not needed.
  • 5. Continue.. 1) Public Cloud: ๏ƒ˜ Public clouds are owned by a third party cloud service provider ๏ƒ˜ takes care of hardware, software and other infrastructure ๏ƒ˜ delivers computing resources like servers and storage over the Internet to customer. 2) Private Cloud: ๏ƒ˜ data center is physically located at the specific organization ๏ƒ˜ all information can be accessed via local network ๏ƒ˜ Else they are hosted by third party cloud accessed via private network. 3) Hybrid Cloud: ๏ƒ˜ This is the amalgamation of public and private clouds, ๏ƒ˜ it allows workloads to move between private and public clouds, ๏ƒ˜ hybrid cloud gives businesses greater flexibility and more data deployment options.
  • 6. Security.. ๏ƒ˜ Security always comes into picture when we store data at the places where we do not have any idea about how it is stored or where it is stored physically. ๏ƒ˜ This same case applies when we use cloud services as means of storing data โ€“becoming the reason about worry for data security. ๏ƒ˜ Public clouds are secure because many securities are provided starting form physical layer, logical layer and also when someone tries to transfer confidential information of company to any outsider.
  • 7. Is Cloud Secure ?? ๏ƒ˜ Well, the answer to this question is yes upto an extent. ๏ƒ˜ Tough firewall security is provided in public clouds. ๏ƒ˜ Penetration testing that are performed on public clouds, gives overall result rather than giving result at the exact moment. ๏ƒ˜ Public clouds attract the best security people available. ๏ƒ˜ When it comes to data transfer high level encryption is provided thus, becoming hard for the intruder to interpret data. ๏ƒ˜ Eg: AES, triple DES, two fish, RSA, etc. ๏ƒ˜ Ensure single tenant architecture on cloud. ๏ƒ˜ Cloud Providers should daily give you update about
  • 8. Security And Cloud: ๏ƒ˜Data center (physically stored). ๏ƒ˜During data transfer over internet.
  • 9. Office 365 (Data Center): ๏ƒ˜If you are not the administrator and pull the disk drive out, then mechanisms are provided the person cannot see any data.(physical layer) ๏ƒ˜If the intruder somehow gets access to data at data center, then he wonโ€™t be allowed to open up the browser on server(to dump the malicious code) and if browser is opened then he will be unable to run it as it will be the process that is not in category of whitelisted ones (logical layer). ๏ƒ˜If any insider person tries to send data to other person, then mechanisms are provided to ensure that the email is read only by certain set of individuals and not all.
  • 10. During Data Transfer: ๏ƒ˜Implement a multifactor authentication . ๏ƒ˜Provide encryption system on the user end to protect against data breaches. ๏ƒ˜Provide good firewall. ๏ƒ˜Keep password strong to avoid attacks. ๏ƒ˜Also, changing password on monthly basis reduces chances of data breach.
  • 11. Conclusion: Whenever you are on the internet, you are not 100% secure. But on the contrary it can be said that the tough algorithms and tight security mechanisms provided by companies prevent intruder from attacking. So always it is recommended to keep strong and weird passwords, use secure websites, etc.
  • 12. References: ๏ƒ˜ http://www.zdnet.com/article/12-reasons-why-public-clouds-are-better-than- private-clouds/ ๏ƒ˜ https://www.youtube.com/watch?v=S4QqQG8tTSg ๏ƒ˜ https://www.nytimes.com/2017/01/23/insider/where-does-cloud-storage-really- reside-and-is-it-secure.html ๏ƒ˜ https://www.networkworld.com/article/3016673/public-cloud/public-cloud-vs-on- premises-which-is-more-secure.html ๏ƒ˜ http://www.computerweekly.com/answer/Cloud-computing-network-security- best-practices