2. Outline:
๏ Why and What Is Cloud
๏ Types Of Cloud
๏ Continue
๏ Security
๏ Is Cloud Secure
๏ Security And Cloud
๏ Office 365 (Data Center)
๏ During Data Transfer
๏ Conclusion
๏ References
3. Why and What Is Cloud??
๏ Cloud computing is the on-demand delivery of compute
power, database storage, applications, and other IT resources
through a cloud services platform via the internet with pay-
as-you-go pricing.
๏ Cloud is the most feasible and economic option, for
providing high amount computational power, database and
other infrastructure that are needed by emerging
technologies.
๏ It works on simple fundamental:
๏ Use the resources online.
๏ Pay for it (according to your demand).
๏ Drop it, whenever not needed.
5. Continue..
1) Public Cloud:
๏ Public clouds are owned by a third party cloud service provider
๏ takes care of hardware, software and other infrastructure
๏ delivers computing resources like servers and storage over the Internet to
customer.
2) Private Cloud:
๏ data center is physically located at the specific organization
๏ all information can be accessed via local network
๏ Else they are hosted by third party cloud accessed via private network.
3) Hybrid Cloud:
๏ This is the amalgamation of public and private clouds,
๏ it allows workloads to move between private and public clouds,
๏ hybrid cloud gives businesses greater flexibility and more data deployment
options.
6. Security..
๏ Security always comes into picture when we store data at
the places where we do not have any idea about how it is
stored or where it is stored physically.
๏ This same case applies when we use cloud services as means
of storing data โbecoming the reason about worry for data
security.
๏ Public clouds are secure because many securities are
provided starting form physical layer, logical layer and also
when someone tries to transfer confidential information of
company to any outsider.
7. Is Cloud Secure ??
๏ Well, the answer to this question is yes upto an extent.
๏ Tough firewall security is provided in public clouds.
๏ Penetration testing that are performed on public clouds,
gives overall result rather than giving result at the exact
moment.
๏ Public clouds attract the best security people available.
๏ When it comes to data transfer high level encryption is
provided thus, becoming hard for the intruder to interpret
data.
๏ Eg: AES, triple DES, two fish, RSA, etc.
๏ Ensure single tenant architecture on cloud.
๏ Cloud Providers should daily give you update about
9. Office 365 (Data Center):
๏If you are not the administrator and pull the disk drive out,
then mechanisms are provided the person cannot see any
data.(physical layer)
๏If the intruder somehow gets access to data at data center,
then he wonโt be allowed to open up the browser on
server(to dump the malicious code) and if browser is opened
then he will be unable to run it as it will be the process that is
not in category of whitelisted ones (logical layer).
๏If any insider person tries to send data to other person, then
mechanisms are provided to ensure that the email is read
only by certain set of individuals and not all.
10. During Data Transfer:
๏Implement a multifactor authentication .
๏Provide encryption system on the user end to protect against
data breaches.
๏Provide good firewall.
๏Keep password strong to avoid attacks.
๏Also, changing password on monthly basis reduces chances
of data breach.
11. Conclusion:
Whenever you are on the internet, you are not 100% secure.
But on the contrary it can be said that the tough algorithms
and tight security mechanisms provided by companies prevent
intruder from attacking. So always it is recommended to keep
strong and weird passwords, use secure websites, etc.