SlideShare a Scribd company logo
Tiago de Almeida
tdealmeida@luc.edu
COMP 448 – NETWORK SECURITY
CLOUD SECURITY TOP THREATS
-  Cloud Security Alliance (CSA)
-  “Security Guidance for Critical Areas of
Focus in Cloud Computing”
-  “Top Threats to Cloud Computing”
BACKGROUND INFORMATION
L O Y O L A U N I V E R S I T Y C H I C A G O
Abuse and nefarious use of cloud computing
- Easy to register accounts and start using
- Relative anonymity -> Relative impunity
- Key cracking, DDOS, hosting malicious data, etc
Remediation:
- Stricter registration process
- Enhanced credit card fraud monitoring
TOP THREAT #1
L O Y O L A U N I V E R S I T Y C H I C A G O
Insecure interfaces and APIs
- Used to manage and interact with cloud services
- Security of services is dependent upon the security
of the interfaces
- Must be design to protect against malicious use
Remediation:
- Ensuring strong authentication and access controls
- Analyzing the security model of provider’s interfaces
TOP THREAT #2
L O Y O L A U N I V E R S I T Y C H I C A G O
Malicious insiders
- Lack of transparency into provider processes and
procedures
- How do employees access physical and virtual assets?
How are they monitored?
- Corporate espionage, organized crime, intrusion
Remediation:
- Specifying human resource requirements on contracts
- Transparency into information security and management
practices
TOP THREAT #3
L O Y O L A U N I V E R S I T Y C H I C A G O
Shared technology issues
- One individual customer must not impact other tenants
- Underlying infrastructure components not designed to
provide isolation for multi-tenant architectures
- Virtualization helps, but has also presented flaws
Remediation:
- Implementing security practices for installation/config
- Vulnerability scanning and configuration audits
TOP THREAT #4
L O Y O L A U N I V E R S I T Y C H I C A G O
Data loss or leakage
- May happen through deletion or alteration, unreliable
media, loss of encoding key, etc
- Unauthorized access to sensitive data
- Issues can have a devastating impact on a business
Remediation:
- Encrypting and protecting integrity of data in transit
- Strong key management and destruction practices
TOP THREAT #5
L O Y O L A U N I V E R S I T Y C H I C A G O
Account or service hijacking
- Eavesdropping on your activities and transactions
- Manipulation of data and returning of falsified info
- Redirect your clients to an illegitimate site
Remediation:
- Prohibition of account credentials sharing
- Use of two-factor authentication
TOP THREAT #6
L O Y O L A U N I V E R S I T Y C H I C A G O
Unknown risk profile
- Companies may loose track of security concerns
- Versions of software, code update, vulnerabilities
profiles, intrusion attempts, security practices and design:
important for understanding company’s security posture
Remediation:
- Disclosure of applicable data, logs and infrastructure
details
- Monitoring and alerting practices
TOP THREAT #7
L O Y O L A U N I V E R S I T Y C H I C A G O
THANK YOU
Tiago de Almeida
tdealmeida@luc.edu

More Related Content

What's hot

Zero Trust Model
Zero Trust ModelZero Trust Model
Zero Trust Model
Yash
 
Data loss prevention (dlp)
Data loss prevention (dlp)Data loss prevention (dlp)
Data loss prevention (dlp)
Hussein Al-Sanabani
 
5. Identity and Access Management
5. Identity and Access Management5. Identity and Access Management
5. Identity and Access Management
Sam Bowne
 
Cloud security
Cloud securityCloud security
Cloud security
BikashPokharel3
 
Cloud computing security
Cloud computing security Cloud computing security
Cloud computing security
Akhila Param
 
1. Security and Risk Management
1. Security and Risk Management1. Security and Risk Management
1. Security and Risk Management
Sam Bowne
 
Vulnerability Assessment Report
Vulnerability Assessment ReportVulnerability Assessment Report
Vulnerability Assessment Report
Harshit Singh Bhatia
 
Vulnerability assessment and penetration testing
Vulnerability assessment and penetration testingVulnerability assessment and penetration testing
Vulnerability assessment and penetration testing
Abu Sadat Mohammed Yasin
 
Zero trust deck 2020
Zero trust deck 2020Zero trust deck 2020
Zero trust deck 2020
Guido Marchetti
 
Types of Threat Actors and Attack Vectors
Types of Threat Actors and Attack VectorsTypes of Threat Actors and Attack Vectors
Types of Threat Actors and Attack Vectors
LearningwithRayYT
 
security-reference-architecture.pdf
security-reference-architecture.pdfsecurity-reference-architecture.pdf
security-reference-architecture.pdf
JoniGarcia9
 
Chapter 5 - Identity Management
Chapter 5 - Identity ManagementChapter 5 - Identity Management
Chapter 5 - Identity Management
Karthikeyan Dhayalan
 
Security Best Practices
Security Best PracticesSecurity Best Practices
Security Best Practices
Amazon Web Services
 
Data Leakage Prevention (DLP)
Data Leakage Prevention (DLP)Data Leakage Prevention (DLP)
Data Leakage Prevention (DLP)
Network Intelligence India
 
NIST Zero Trust Explained
NIST Zero Trust ExplainedNIST Zero Trust Explained
NIST Zero Trust Explained
rtp2009
 
Endpoint Protection
Endpoint ProtectionEndpoint Protection
Endpoint Protection
Sophos
 
Cloud security Presentation
Cloud security PresentationCloud security Presentation
Cloud security Presentation
Ajay p
 
Application Security - Your Success Depends on it
Application Security - Your Success Depends on itApplication Security - Your Success Depends on it
Application Security - Your Success Depends on it
WSO2
 
Vulnerability and Patch Management
Vulnerability and Patch ManagementVulnerability and Patch Management
Vulnerability and Patch Management
n|u - The Open Security Community
 
Introduction to Cybersecurity
Introduction to CybersecurityIntroduction to Cybersecurity
Introduction to Cybersecurity
Krutarth Vasavada
 

What's hot (20)

Zero Trust Model
Zero Trust ModelZero Trust Model
Zero Trust Model
 
Data loss prevention (dlp)
Data loss prevention (dlp)Data loss prevention (dlp)
Data loss prevention (dlp)
 
5. Identity and Access Management
5. Identity and Access Management5. Identity and Access Management
5. Identity and Access Management
 
Cloud security
Cloud securityCloud security
Cloud security
 
Cloud computing security
Cloud computing security Cloud computing security
Cloud computing security
 
1. Security and Risk Management
1. Security and Risk Management1. Security and Risk Management
1. Security and Risk Management
 
Vulnerability Assessment Report
Vulnerability Assessment ReportVulnerability Assessment Report
Vulnerability Assessment Report
 
Vulnerability assessment and penetration testing
Vulnerability assessment and penetration testingVulnerability assessment and penetration testing
Vulnerability assessment and penetration testing
 
Zero trust deck 2020
Zero trust deck 2020Zero trust deck 2020
Zero trust deck 2020
 
Types of Threat Actors and Attack Vectors
Types of Threat Actors and Attack VectorsTypes of Threat Actors and Attack Vectors
Types of Threat Actors and Attack Vectors
 
security-reference-architecture.pdf
security-reference-architecture.pdfsecurity-reference-architecture.pdf
security-reference-architecture.pdf
 
Chapter 5 - Identity Management
Chapter 5 - Identity ManagementChapter 5 - Identity Management
Chapter 5 - Identity Management
 
Security Best Practices
Security Best PracticesSecurity Best Practices
Security Best Practices
 
Data Leakage Prevention (DLP)
Data Leakage Prevention (DLP)Data Leakage Prevention (DLP)
Data Leakage Prevention (DLP)
 
NIST Zero Trust Explained
NIST Zero Trust ExplainedNIST Zero Trust Explained
NIST Zero Trust Explained
 
Endpoint Protection
Endpoint ProtectionEndpoint Protection
Endpoint Protection
 
Cloud security Presentation
Cloud security PresentationCloud security Presentation
Cloud security Presentation
 
Application Security - Your Success Depends on it
Application Security - Your Success Depends on itApplication Security - Your Success Depends on it
Application Security - Your Success Depends on it
 
Vulnerability and Patch Management
Vulnerability and Patch ManagementVulnerability and Patch Management
Vulnerability and Patch Management
 
Introduction to Cybersecurity
Introduction to CybersecurityIntroduction to Cybersecurity
Introduction to Cybersecurity
 

Viewers also liked

Novos produtos para fibra óptica
Novos produtos para fibra ópticaNovos produtos para fibra óptica
Novos produtos para fibra óptica
Leuze electronic Ltda
 
Palestra encontro provedores regionais montes claros 22 07_2015 eduardo grize...
Palestra encontro provedores regionais montes claros 22 07_2015 eduardo grize...Palestra encontro provedores regionais montes claros 22 07_2015 eduardo grize...
Palestra encontro provedores regionais montes claros 22 07_2015 eduardo grize...
Eduardo Grizendi
 
NetconAmericas_2015_Estructuracion_Empresa_Telecom
NetconAmericas_2015_Estructuracion_Empresa_TelecomNetconAmericas_2015_Estructuracion_Empresa_Telecom
NetconAmericas_2015_Estructuracion_Empresa_Telecom
Cristiano Ferraz
 
Maximizando resultados
Maximizando resultadosMaximizando resultados
Maximizando resultados
Thiago de Oliveira
 
Armando domos
Armando domosArmando domos
Armando domos
vdnp1963
 
Sebrae Recife
Sebrae RecifeSebrae Recife
Sebrae Recife
Elis Monteiro
 
Curso T&T primeira parte
Curso T&T primeira parteCurso T&T primeira parte
Curso T&T primeira parte
Elis Monteiro
 
Terceira parte do curso T&T
Terceira parte do curso T&TTerceira parte do curso T&T
Terceira parte do curso T&T
Elis Monteiro
 
Fibra optica-eduardo web
Fibra optica-eduardo webFibra optica-eduardo web
Fibra optica-eduardo web
Eduardo Cassettari
 
Cabo otico fig. 8 ftth 4 fo 62.5
Cabo otico fig. 8 ftth 4 fo 62.5Cabo otico fig. 8 ftth 4 fo 62.5
Cabo otico fig. 8 ftth 4 fo 62.5
Paulo Pires
 
Sua mensagem direto ao ponto
Sua mensagem direto ao pontoSua mensagem direto ao ponto
Sua mensagem direto ao ponto
Luiz Gustavo Schmoekel
 
Extracaotrab Gn3
Extracaotrab Gn3Extracaotrab Gn3
Extracaotrab Gn3
Thiago de Oliveira
 
Biography steinbach en
Biography steinbach enBiography steinbach en
Biography steinbach en
Y2Studio
 
Unidade 1 redes de comp
Unidade 1   redes de compUnidade 1   redes de comp
Unidade 1 redes de comp
Leandro Almeida
 
The Portuguese Digital Agenda
The Portuguese Digital AgendaThe Portuguese Digital Agenda
The Portuguese Digital Agenda
Rui Grilo
 
Jornal plp140
Jornal plp140Jornal plp140
Jornal plp140
Y2Studio
 
VDSL2 Technology and Business
VDSL2 Technology and BusinessVDSL2 Technology and Business
VDSL2 Technology and Business
Tiago de Almeida
 
Formação ITED Ensaios Coaxial
Formação ITED Ensaios CoaxialFormação ITED Ensaios Coaxial
Formação ITED Ensaios Coaxial
Fernando Reis
 
Formação TDT
Formação TDTFormação TDT
Formação TDT
Fernando Reis
 
Case Cianet - Sleep Inn Galleria Campinas (1)
Case Cianet - Sleep Inn Galleria Campinas (1)Case Cianet - Sleep Inn Galleria Campinas (1)
Case Cianet - Sleep Inn Galleria Campinas (1)
Thiago de Oliveira
 

Viewers also liked (20)

Novos produtos para fibra óptica
Novos produtos para fibra ópticaNovos produtos para fibra óptica
Novos produtos para fibra óptica
 
Palestra encontro provedores regionais montes claros 22 07_2015 eduardo grize...
Palestra encontro provedores regionais montes claros 22 07_2015 eduardo grize...Palestra encontro provedores regionais montes claros 22 07_2015 eduardo grize...
Palestra encontro provedores regionais montes claros 22 07_2015 eduardo grize...
 
NetconAmericas_2015_Estructuracion_Empresa_Telecom
NetconAmericas_2015_Estructuracion_Empresa_TelecomNetconAmericas_2015_Estructuracion_Empresa_Telecom
NetconAmericas_2015_Estructuracion_Empresa_Telecom
 
Maximizando resultados
Maximizando resultadosMaximizando resultados
Maximizando resultados
 
Armando domos
Armando domosArmando domos
Armando domos
 
Sebrae Recife
Sebrae RecifeSebrae Recife
Sebrae Recife
 
Curso T&T primeira parte
Curso T&T primeira parteCurso T&T primeira parte
Curso T&T primeira parte
 
Terceira parte do curso T&T
Terceira parte do curso T&TTerceira parte do curso T&T
Terceira parte do curso T&T
 
Fibra optica-eduardo web
Fibra optica-eduardo webFibra optica-eduardo web
Fibra optica-eduardo web
 
Cabo otico fig. 8 ftth 4 fo 62.5
Cabo otico fig. 8 ftth 4 fo 62.5Cabo otico fig. 8 ftth 4 fo 62.5
Cabo otico fig. 8 ftth 4 fo 62.5
 
Sua mensagem direto ao ponto
Sua mensagem direto ao pontoSua mensagem direto ao ponto
Sua mensagem direto ao ponto
 
Extracaotrab Gn3
Extracaotrab Gn3Extracaotrab Gn3
Extracaotrab Gn3
 
Biography steinbach en
Biography steinbach enBiography steinbach en
Biography steinbach en
 
Unidade 1 redes de comp
Unidade 1   redes de compUnidade 1   redes de comp
Unidade 1 redes de comp
 
The Portuguese Digital Agenda
The Portuguese Digital AgendaThe Portuguese Digital Agenda
The Portuguese Digital Agenda
 
Jornal plp140
Jornal plp140Jornal plp140
Jornal plp140
 
VDSL2 Technology and Business
VDSL2 Technology and BusinessVDSL2 Technology and Business
VDSL2 Technology and Business
 
Formação ITED Ensaios Coaxial
Formação ITED Ensaios CoaxialFormação ITED Ensaios Coaxial
Formação ITED Ensaios Coaxial
 
Formação TDT
Formação TDTFormação TDT
Formação TDT
 
Case Cianet - Sleep Inn Galleria Campinas (1)
Case Cianet - Sleep Inn Galleria Campinas (1)Case Cianet - Sleep Inn Galleria Campinas (1)
Case Cianet - Sleep Inn Galleria Campinas (1)
 

Similar to Cloud Security Top Threats

Security Issues for Cloud Applications
Security Issues for Cloud ApplicationsSecurity Issues for Cloud Applications
Security Issues for Cloud Applications
Guillermo Remache
 
Seclud it polesc_sjuly7
Seclud it polesc_sjuly7Seclud it polesc_sjuly7
Seclud it polesc_sjuly7
Sergio Loureiro
 
IBM Messaging Security - Why securing your environment is important : IBM Int...
IBM Messaging Security - Why securing your environment is important : IBM Int...IBM Messaging Security - Why securing your environment is important : IBM Int...
IBM Messaging Security - Why securing your environment is important : IBM Int...
Leif Davidsen
 
3433 IBM messaging security why securing your environment is important-feb2...
3433   IBM messaging security why securing your environment is important-feb2...3433   IBM messaging security why securing your environment is important-feb2...
3433 IBM messaging security why securing your environment is important-feb2...
Robert Parker
 
2017 Cyber Risk Grades by Industry: Normshield Executive Presentation
2017 Cyber Risk Grades by Industry:  Normshield Executive Presentation2017 Cyber Risk Grades by Industry:  Normshield Executive Presentation
2017 Cyber Risk Grades by Industry: Normshield Executive Presentation
NormShield, Inc.
 
Privileged accesss management for den csa user group CA Technologies
Privileged accesss management for den csa user group CA TechnologiesPrivileged accesss management for den csa user group CA Technologies
Privileged accesss management for den csa user group CA Technologies
Trish McGinity, CCSK
 
Top 10 mobile security risks - Khổng Văn Cường
Top 10 mobile security risks - Khổng Văn CườngTop 10 mobile security risks - Khổng Văn Cường
Top 10 mobile security risks - Khổng Văn Cường
Security Bootcamp
 
Implementing an improved security for collin’s database and telecommuters
Implementing an improved security for collin’s database and telecommutersImplementing an improved security for collin’s database and telecommuters
Implementing an improved security for collin’s database and telecommuters
Rishabh Gupta
 
MultiValue Security
MultiValue SecurityMultiValue Security
MultiValue Security
Rocket Software
 
Top 10 mobile security risks - Khổng Văn Cường
Top 10 mobile security risks - Khổng Văn CườngTop 10 mobile security risks - Khổng Văn Cường
Top 10 mobile security risks - Khổng Văn Cường
Võ Thái Lâm
 
Cybersecurity update 12
Cybersecurity update 12Cybersecurity update 12
Cybersecurity update 12
Jim Kaplan CIA CFE
 
NormShield 2018 Cyber Security Risk Brief
NormShield 2018 Cyber Security Risk BriefNormShield 2018 Cyber Security Risk Brief
NormShield 2018 Cyber Security Risk Brief
NormShield
 
Kripta Key Product Key Management System.pdf
Kripta Key Product Key Management System.pdfKripta Key Product Key Management System.pdf
Kripta Key Product Key Management System.pdf
langkahgontay88
 
What CISOs should know about SAP security
What CISOs should know about SAP securityWhat CISOs should know about SAP security
What CISOs should know about SAP security
ERPScan
 
TIC-TOC: VPN Is Dead; Are you Monetizing Its Replacement?
TIC-TOC: VPN Is Dead; Are you Monetizing Its Replacement?TIC-TOC: VPN Is Dead; Are you Monetizing Its Replacement?
TIC-TOC: VPN Is Dead; Are you Monetizing Its Replacement?
SaraPia5
 
Privileged Access Management (PAM)
Privileged Access Management (PAM)Privileged Access Management (PAM)
Privileged Access Management (PAM)
danb02
 
2.1 Web Vulnerabilities.pptx
2.1 Web Vulnerabilities.pptx2.1 Web Vulnerabilities.pptx
2.1 Web Vulnerabilities.pptx
MiteshVyas16
 
PLNOG14: Firewalls In Modern Data Centers - Piotr Wojciechowski
PLNOG14: Firewalls In Modern Data Centers - Piotr WojciechowskiPLNOG14: Firewalls In Modern Data Centers - Piotr Wojciechowski
PLNOG14: Firewalls In Modern Data Centers - Piotr Wojciechowski
PROIDEA
 
IRJET- Design and Analytical Study of Id Based Pixel Secured Cloud Enablem...
IRJET- 	  Design and Analytical Study of Id Based Pixel Secured Cloud Enablem...IRJET- 	  Design and Analytical Study of Id Based Pixel Secured Cloud Enablem...
IRJET- Design and Analytical Study of Id Based Pixel Secured Cloud Enablem...
IRJET Journal
 
Lecture Cloud Security.pptx
Lecture Cloud Security.pptxLecture Cloud Security.pptx
Lecture Cloud Security.pptx
ShimoFcis
 

Similar to Cloud Security Top Threats (20)

Security Issues for Cloud Applications
Security Issues for Cloud ApplicationsSecurity Issues for Cloud Applications
Security Issues for Cloud Applications
 
Seclud it polesc_sjuly7
Seclud it polesc_sjuly7Seclud it polesc_sjuly7
Seclud it polesc_sjuly7
 
IBM Messaging Security - Why securing your environment is important : IBM Int...
IBM Messaging Security - Why securing your environment is important : IBM Int...IBM Messaging Security - Why securing your environment is important : IBM Int...
IBM Messaging Security - Why securing your environment is important : IBM Int...
 
3433 IBM messaging security why securing your environment is important-feb2...
3433   IBM messaging security why securing your environment is important-feb2...3433   IBM messaging security why securing your environment is important-feb2...
3433 IBM messaging security why securing your environment is important-feb2...
 
2017 Cyber Risk Grades by Industry: Normshield Executive Presentation
2017 Cyber Risk Grades by Industry:  Normshield Executive Presentation2017 Cyber Risk Grades by Industry:  Normshield Executive Presentation
2017 Cyber Risk Grades by Industry: Normshield Executive Presentation
 
Privileged accesss management for den csa user group CA Technologies
Privileged accesss management for den csa user group CA TechnologiesPrivileged accesss management for den csa user group CA Technologies
Privileged accesss management for den csa user group CA Technologies
 
Top 10 mobile security risks - Khổng Văn Cường
Top 10 mobile security risks - Khổng Văn CườngTop 10 mobile security risks - Khổng Văn Cường
Top 10 mobile security risks - Khổng Văn Cường
 
Implementing an improved security for collin’s database and telecommuters
Implementing an improved security for collin’s database and telecommutersImplementing an improved security for collin’s database and telecommuters
Implementing an improved security for collin’s database and telecommuters
 
MultiValue Security
MultiValue SecurityMultiValue Security
MultiValue Security
 
Top 10 mobile security risks - Khổng Văn Cường
Top 10 mobile security risks - Khổng Văn CườngTop 10 mobile security risks - Khổng Văn Cường
Top 10 mobile security risks - Khổng Văn Cường
 
Cybersecurity update 12
Cybersecurity update 12Cybersecurity update 12
Cybersecurity update 12
 
NormShield 2018 Cyber Security Risk Brief
NormShield 2018 Cyber Security Risk BriefNormShield 2018 Cyber Security Risk Brief
NormShield 2018 Cyber Security Risk Brief
 
Kripta Key Product Key Management System.pdf
Kripta Key Product Key Management System.pdfKripta Key Product Key Management System.pdf
Kripta Key Product Key Management System.pdf
 
What CISOs should know about SAP security
What CISOs should know about SAP securityWhat CISOs should know about SAP security
What CISOs should know about SAP security
 
TIC-TOC: VPN Is Dead; Are you Monetizing Its Replacement?
TIC-TOC: VPN Is Dead; Are you Monetizing Its Replacement?TIC-TOC: VPN Is Dead; Are you Monetizing Its Replacement?
TIC-TOC: VPN Is Dead; Are you Monetizing Its Replacement?
 
Privileged Access Management (PAM)
Privileged Access Management (PAM)Privileged Access Management (PAM)
Privileged Access Management (PAM)
 
2.1 Web Vulnerabilities.pptx
2.1 Web Vulnerabilities.pptx2.1 Web Vulnerabilities.pptx
2.1 Web Vulnerabilities.pptx
 
PLNOG14: Firewalls In Modern Data Centers - Piotr Wojciechowski
PLNOG14: Firewalls In Modern Data Centers - Piotr WojciechowskiPLNOG14: Firewalls In Modern Data Centers - Piotr Wojciechowski
PLNOG14: Firewalls In Modern Data Centers - Piotr Wojciechowski
 
IRJET- Design and Analytical Study of Id Based Pixel Secured Cloud Enablem...
IRJET- 	  Design and Analytical Study of Id Based Pixel Secured Cloud Enablem...IRJET- 	  Design and Analytical Study of Id Based Pixel Secured Cloud Enablem...
IRJET- Design and Analytical Study of Id Based Pixel Secured Cloud Enablem...
 
Lecture Cloud Security.pptx
Lecture Cloud Security.pptxLecture Cloud Security.pptx
Lecture Cloud Security.pptx
 

Recently uploaded

Discover the benefits of outsourcing SEO to India
Discover the benefits of outsourcing SEO to IndiaDiscover the benefits of outsourcing SEO to India
Discover the benefits of outsourcing SEO to India
davidjhones387
 
可查真实(Monash毕业证)西澳大学毕业证成绩单退学买
可查真实(Monash毕业证)西澳大学毕业证成绩单退学买可查真实(Monash毕业证)西澳大学毕业证成绩单退学买
可查真实(Monash毕业证)西澳大学毕业证成绩单退学买
cuobya
 
留学挂科(UofM毕业证)明尼苏达大学毕业证成绩单复刻办理
留学挂科(UofM毕业证)明尼苏达大学毕业证成绩单复刻办理留学挂科(UofM毕业证)明尼苏达大学毕业证成绩单复刻办理
留学挂科(UofM毕业证)明尼苏达大学毕业证成绩单复刻办理
uehowe
 
重新申请毕业证书(RMIT毕业证)皇家墨尔本理工大学毕业证成绩单精仿办理
重新申请毕业证书(RMIT毕业证)皇家墨尔本理工大学毕业证成绩单精仿办理重新申请毕业证书(RMIT毕业证)皇家墨尔本理工大学毕业证成绩单精仿办理
重新申请毕业证书(RMIT毕业证)皇家墨尔本理工大学毕业证成绩单精仿办理
vmemo1
 
存档可查的(USC毕业证)南加利福尼亚大学毕业证成绩单制做办理
存档可查的(USC毕业证)南加利福尼亚大学毕业证成绩单制做办理存档可查的(USC毕业证)南加利福尼亚大学毕业证成绩单制做办理
存档可查的(USC毕业证)南加利福尼亚大学毕业证成绩单制做办理
fovkoyb
 
Search Result Showing My Post is Now Buried
Search Result Showing My Post is Now BuriedSearch Result Showing My Post is Now Buried
Search Result Showing My Post is Now Buried
Trish Parr
 
假文凭国外(Adelaide毕业证)澳大利亚国立大学毕业证成绩单办理
假文凭国外(Adelaide毕业证)澳大利亚国立大学毕业证成绩单办理假文凭国外(Adelaide毕业证)澳大利亚国立大学毕业证成绩单办理
假文凭国外(Adelaide毕业证)澳大利亚国立大学毕业证成绩单办理
cuobya
 
办理新西兰奥克兰大学毕业证学位证书范本原版一模一样
办理新西兰奥克兰大学毕业证学位证书范本原版一模一样办理新西兰奥克兰大学毕业证学位证书范本原版一模一样
办理新西兰奥克兰大学毕业证学位证书范本原版一模一样
xjq03c34
 
学位认证网(DU毕业证)迪肯大学毕业证成绩单一比一原版制作
学位认证网(DU毕业证)迪肯大学毕业证成绩单一比一原版制作学位认证网(DU毕业证)迪肯大学毕业证成绩单一比一原版制作
学位认证网(DU毕业证)迪肯大学毕业证成绩单一比一原版制作
zyfovom
 
Ready to Unlock the Power of Blockchain!
Ready to Unlock the Power of Blockchain!Ready to Unlock the Power of Blockchain!
Ready to Unlock the Power of Blockchain!
Toptal Tech
 
国外证书(Lincoln毕业证)新西兰林肯大学毕业证成绩单不能毕业办理
国外证书(Lincoln毕业证)新西兰林肯大学毕业证成绩单不能毕业办理国外证书(Lincoln毕业证)新西兰林肯大学毕业证成绩单不能毕业办理
国外证书(Lincoln毕业证)新西兰林肯大学毕业证成绩单不能毕业办理
zoowe
 
不能毕业如何获得(USYD毕业证)悉尼大学毕业证成绩单一比一原版制作
不能毕业如何获得(USYD毕业证)悉尼大学毕业证成绩单一比一原版制作不能毕业如何获得(USYD毕业证)悉尼大学毕业证成绩单一比一原版制作
不能毕业如何获得(USYD毕业证)悉尼大学毕业证成绩单一比一原版制作
bseovas
 
7 Best Cloud Hosting Services to Try Out in 2024
7 Best Cloud Hosting Services to Try Out in 20247 Best Cloud Hosting Services to Try Out in 2024
7 Best Cloud Hosting Services to Try Out in 2024
Danica Gill
 
Design Thinking NETFLIX using all techniques.pptx
Design Thinking NETFLIX using all techniques.pptxDesign Thinking NETFLIX using all techniques.pptx
Design Thinking NETFLIX using all techniques.pptx
saathvikreddy2003
 
办理毕业证(UPenn毕业证)宾夕法尼亚大学毕业证成绩单快速办理
办理毕业证(UPenn毕业证)宾夕法尼亚大学毕业证成绩单快速办理办理毕业证(UPenn毕业证)宾夕法尼亚大学毕业证成绩单快速办理
办理毕业证(UPenn毕业证)宾夕法尼亚大学毕业证成绩单快速办理
uehowe
 
办理毕业证(NYU毕业证)纽约大学毕业证成绩单官方原版办理
办理毕业证(NYU毕业证)纽约大学毕业证成绩单官方原版办理办理毕业证(NYU毕业证)纽约大学毕业证成绩单官方原版办理
办理毕业证(NYU毕业证)纽约大学毕业证成绩单官方原版办理
uehowe
 
Azure EA Sponsorship - Customer Guide.pdf
Azure EA Sponsorship - Customer Guide.pdfAzure EA Sponsorship - Customer Guide.pdf
Azure EA Sponsorship - Customer Guide.pdf
AanSulistiyo
 
Understanding User Behavior with Google Analytics.pdf
Understanding User Behavior with Google Analytics.pdfUnderstanding User Behavior with Google Analytics.pdf
Understanding User Behavior with Google Analytics.pdf
SEO Article Boost
 
[HUN][hackersuli] Red Teaming alapok 2024
[HUN][hackersuli] Red Teaming alapok 2024[HUN][hackersuli] Red Teaming alapok 2024
[HUN][hackersuli] Red Teaming alapok 2024
hackersuli
 
Gen Z and the marketplaces - let's translate their needs
Gen Z and the marketplaces - let's translate their needsGen Z and the marketplaces - let's translate their needs
Gen Z and the marketplaces - let's translate their needs
Laura Szabó
 

Recently uploaded (20)

Discover the benefits of outsourcing SEO to India
Discover the benefits of outsourcing SEO to IndiaDiscover the benefits of outsourcing SEO to India
Discover the benefits of outsourcing SEO to India
 
可查真实(Monash毕业证)西澳大学毕业证成绩单退学买
可查真实(Monash毕业证)西澳大学毕业证成绩单退学买可查真实(Monash毕业证)西澳大学毕业证成绩单退学买
可查真实(Monash毕业证)西澳大学毕业证成绩单退学买
 
留学挂科(UofM毕业证)明尼苏达大学毕业证成绩单复刻办理
留学挂科(UofM毕业证)明尼苏达大学毕业证成绩单复刻办理留学挂科(UofM毕业证)明尼苏达大学毕业证成绩单复刻办理
留学挂科(UofM毕业证)明尼苏达大学毕业证成绩单复刻办理
 
重新申请毕业证书(RMIT毕业证)皇家墨尔本理工大学毕业证成绩单精仿办理
重新申请毕业证书(RMIT毕业证)皇家墨尔本理工大学毕业证成绩单精仿办理重新申请毕业证书(RMIT毕业证)皇家墨尔本理工大学毕业证成绩单精仿办理
重新申请毕业证书(RMIT毕业证)皇家墨尔本理工大学毕业证成绩单精仿办理
 
存档可查的(USC毕业证)南加利福尼亚大学毕业证成绩单制做办理
存档可查的(USC毕业证)南加利福尼亚大学毕业证成绩单制做办理存档可查的(USC毕业证)南加利福尼亚大学毕业证成绩单制做办理
存档可查的(USC毕业证)南加利福尼亚大学毕业证成绩单制做办理
 
Search Result Showing My Post is Now Buried
Search Result Showing My Post is Now BuriedSearch Result Showing My Post is Now Buried
Search Result Showing My Post is Now Buried
 
假文凭国外(Adelaide毕业证)澳大利亚国立大学毕业证成绩单办理
假文凭国外(Adelaide毕业证)澳大利亚国立大学毕业证成绩单办理假文凭国外(Adelaide毕业证)澳大利亚国立大学毕业证成绩单办理
假文凭国外(Adelaide毕业证)澳大利亚国立大学毕业证成绩单办理
 
办理新西兰奥克兰大学毕业证学位证书范本原版一模一样
办理新西兰奥克兰大学毕业证学位证书范本原版一模一样办理新西兰奥克兰大学毕业证学位证书范本原版一模一样
办理新西兰奥克兰大学毕业证学位证书范本原版一模一样
 
学位认证网(DU毕业证)迪肯大学毕业证成绩单一比一原版制作
学位认证网(DU毕业证)迪肯大学毕业证成绩单一比一原版制作学位认证网(DU毕业证)迪肯大学毕业证成绩单一比一原版制作
学位认证网(DU毕业证)迪肯大学毕业证成绩单一比一原版制作
 
Ready to Unlock the Power of Blockchain!
Ready to Unlock the Power of Blockchain!Ready to Unlock the Power of Blockchain!
Ready to Unlock the Power of Blockchain!
 
国外证书(Lincoln毕业证)新西兰林肯大学毕业证成绩单不能毕业办理
国外证书(Lincoln毕业证)新西兰林肯大学毕业证成绩单不能毕业办理国外证书(Lincoln毕业证)新西兰林肯大学毕业证成绩单不能毕业办理
国外证书(Lincoln毕业证)新西兰林肯大学毕业证成绩单不能毕业办理
 
不能毕业如何获得(USYD毕业证)悉尼大学毕业证成绩单一比一原版制作
不能毕业如何获得(USYD毕业证)悉尼大学毕业证成绩单一比一原版制作不能毕业如何获得(USYD毕业证)悉尼大学毕业证成绩单一比一原版制作
不能毕业如何获得(USYD毕业证)悉尼大学毕业证成绩单一比一原版制作
 
7 Best Cloud Hosting Services to Try Out in 2024
7 Best Cloud Hosting Services to Try Out in 20247 Best Cloud Hosting Services to Try Out in 2024
7 Best Cloud Hosting Services to Try Out in 2024
 
Design Thinking NETFLIX using all techniques.pptx
Design Thinking NETFLIX using all techniques.pptxDesign Thinking NETFLIX using all techniques.pptx
Design Thinking NETFLIX using all techniques.pptx
 
办理毕业证(UPenn毕业证)宾夕法尼亚大学毕业证成绩单快速办理
办理毕业证(UPenn毕业证)宾夕法尼亚大学毕业证成绩单快速办理办理毕业证(UPenn毕业证)宾夕法尼亚大学毕业证成绩单快速办理
办理毕业证(UPenn毕业证)宾夕法尼亚大学毕业证成绩单快速办理
 
办理毕业证(NYU毕业证)纽约大学毕业证成绩单官方原版办理
办理毕业证(NYU毕业证)纽约大学毕业证成绩单官方原版办理办理毕业证(NYU毕业证)纽约大学毕业证成绩单官方原版办理
办理毕业证(NYU毕业证)纽约大学毕业证成绩单官方原版办理
 
Azure EA Sponsorship - Customer Guide.pdf
Azure EA Sponsorship - Customer Guide.pdfAzure EA Sponsorship - Customer Guide.pdf
Azure EA Sponsorship - Customer Guide.pdf
 
Understanding User Behavior with Google Analytics.pdf
Understanding User Behavior with Google Analytics.pdfUnderstanding User Behavior with Google Analytics.pdf
Understanding User Behavior with Google Analytics.pdf
 
[HUN][hackersuli] Red Teaming alapok 2024
[HUN][hackersuli] Red Teaming alapok 2024[HUN][hackersuli] Red Teaming alapok 2024
[HUN][hackersuli] Red Teaming alapok 2024
 
Gen Z and the marketplaces - let's translate their needs
Gen Z and the marketplaces - let's translate their needsGen Z and the marketplaces - let's translate their needs
Gen Z and the marketplaces - let's translate their needs
 

Cloud Security Top Threats

  • 1. Tiago de Almeida tdealmeida@luc.edu COMP 448 – NETWORK SECURITY CLOUD SECURITY TOP THREATS
  • 2. -  Cloud Security Alliance (CSA) -  “Security Guidance for Critical Areas of Focus in Cloud Computing” -  “Top Threats to Cloud Computing” BACKGROUND INFORMATION L O Y O L A U N I V E R S I T Y C H I C A G O
  • 3. Abuse and nefarious use of cloud computing - Easy to register accounts and start using - Relative anonymity -> Relative impunity - Key cracking, DDOS, hosting malicious data, etc Remediation: - Stricter registration process - Enhanced credit card fraud monitoring TOP THREAT #1 L O Y O L A U N I V E R S I T Y C H I C A G O
  • 4. Insecure interfaces and APIs - Used to manage and interact with cloud services - Security of services is dependent upon the security of the interfaces - Must be design to protect against malicious use Remediation: - Ensuring strong authentication and access controls - Analyzing the security model of provider’s interfaces TOP THREAT #2 L O Y O L A U N I V E R S I T Y C H I C A G O
  • 5. Malicious insiders - Lack of transparency into provider processes and procedures - How do employees access physical and virtual assets? How are they monitored? - Corporate espionage, organized crime, intrusion Remediation: - Specifying human resource requirements on contracts - Transparency into information security and management practices TOP THREAT #3 L O Y O L A U N I V E R S I T Y C H I C A G O
  • 6. Shared technology issues - One individual customer must not impact other tenants - Underlying infrastructure components not designed to provide isolation for multi-tenant architectures - Virtualization helps, but has also presented flaws Remediation: - Implementing security practices for installation/config - Vulnerability scanning and configuration audits TOP THREAT #4 L O Y O L A U N I V E R S I T Y C H I C A G O
  • 7. Data loss or leakage - May happen through deletion or alteration, unreliable media, loss of encoding key, etc - Unauthorized access to sensitive data - Issues can have a devastating impact on a business Remediation: - Encrypting and protecting integrity of data in transit - Strong key management and destruction practices TOP THREAT #5 L O Y O L A U N I V E R S I T Y C H I C A G O
  • 8. Account or service hijacking - Eavesdropping on your activities and transactions - Manipulation of data and returning of falsified info - Redirect your clients to an illegitimate site Remediation: - Prohibition of account credentials sharing - Use of two-factor authentication TOP THREAT #6 L O Y O L A U N I V E R S I T Y C H I C A G O
  • 9. Unknown risk profile - Companies may loose track of security concerns - Versions of software, code update, vulnerabilities profiles, intrusion attempts, security practices and design: important for understanding company’s security posture Remediation: - Disclosure of applicable data, logs and infrastructure details - Monitoring and alerting practices TOP THREAT #7 L O Y O L A U N I V E R S I T Y C H I C A G O
  • 10. THANK YOU Tiago de Almeida tdealmeida@luc.edu