SlideShare a Scribd company logo
1 of 30
NAME - SOURODEEP CHAKRABORTY
ROLL - 9210
SEMESTER – V
STUDENT ID – BGC201120
REGISTRATION NO - 1072011400167
CLOUD COMPUTING
 CLOUD SECURITY SERVICES
 AUTHENTICATION
 AUTHORIZATON
 AUDITING
 ACCOUNTABILITY
 CONCLUSION
GLANCE
CLOUD SECURITY, ALSO KNOWN AS CLOUD COMPUTING SECURITY, IS A
COLLECTION OF SECURITY MEASURES DESIGNED TO PROTECT CLOUD-BASED
INFRASTRUCTURE, APPLICATIONS, AND DATA. THESE MEASURES ENSURE
USER AND DEVICE AUTHENTICATION, DATA AND RESOURCE ACCESS
CONTROL, AND DATA PRIVACY PROTECTION.
CLOUD SECURITY SERVICES
CLOUD SOFTWARE ASSURANCE INCLUDE…….
4A
AUTHENTICATION
AUTHORIZATION
AUDITING
ACCOUNTABILITY
CLOUD SECURITY SERVICES
AUTHENTICATION
HOW DO YOU PROVE TO SOMEONE THAT YOU ARE
WHO YOU CLAIM TO BE ?????
AUTHENTICATION CAN BE DEFINED AS DETERMINING
AN IDENTITY TO THE REQUIRED LEVEL OF
ASSURANCE……
AUTHENTICATION IS THE FIRST STEP IN ANY
CRYPTOGRAPHIC SOLUTION
- BECAUSE UNLESS WE KNOW WHO IS
COMMUNICATING, THERE IS NO POINT IN ENCRYPTION
WHAT IS BEING COMMUNICATED.
AUTHENTICATION
 AUTHENTICATION IS ANY PROCESS BY WHICH A
SYSTEM VERIFIES THE IDENTITY OF A USER WHO
WISHES TO ACCESS IT…
 AUTHENTICATION MAY BE IMPLEMENTED USING
CREDENTIAL, EACH OF WHICH IS COMPOSED OF AN
USER-ID AND PASSWORD. ALTERNATELY
AUTHENTICATION MAY BE IMPLEMENTED WITH
SMARD CARD, AN AUTHENTICATION SERVER OR
EVEN A PUBLIC KEY INFRASTRUCTURE…..
AUTHENTICATION
MANY WAYS TO PROVE WHO YOU ARE:
 WHAT YOU KNOW
--PASSWORD / SECRET KEY
 WHERE YOU ARE
-- IP ADDRESS < INTERNET PROTOCOL >
 WHAT YOU ARE
BIOMETRICS IS AN AUTHENTICATION METHOD THAT IDENTIFIES
AND RECOGNIZES PEOPLE.
AUTHENTICATION
BIOMETRICS
PHYSIOLOGICAL BEHAVIOURAL
FACE
FINGER VOICE SIGNATURE
IRIS
DNA
HAND
AUTHENTICATION
PASSWORD
A PASSWORD IS A STRING OF ALPHABET, NUMBERS
AND SPECIAL CHARACTERS WHICH IS SUPPOSED TO BE
KNOWN ONLY TO BE ENTITY THAT IS BEING
AUTHENTICATE…
AUTHENTICATION
 GIVEN WHO YOU ARE, WHAT CAN YOU DO???
 HOW DO WE CONTROL PRIVILEGE???
AUTHORIZATION
THE PROCESS OF GIVING THE USER PERMISSON TO
ACCESS A SPECIFIC RESOURCE OR FUNCTIONS…..
AUTHORIZATION
ACCESS CONTROL TYPES
ROLE BASED ACCESS CONTROL (RBAC)
CONTEXT BASED ACCESS CONTROL (CBAC)
CONTEXT AWARE ACCESS CONTROL (CAAC)
AUTHORIZATION
ROLE BASED ACCESS CONTROL(RBAC)
 SANDHU ETAL FORMALIZED RBAC IN 1996.
USER U ACTING IN ROLE R IS GRANTED PERMISSON P.
 ADVANTAGES: GREATLY IMPROVED EFFICIENCY
DISADVANTAGES: CAN’T SPECIFY FINEGRAINED RULE
AUTHORIZATION
CONTEXT BASED ACCESS CONTROL(CBAC)
WHAT IS CONTEXT?
CIRCUMSTANCES IN WHICH AN EVENT OCCURS.
SUBJECT OBJECT SYSTEM
NAME TYPE TIME
AGE OWNER DATE
ID CPU SPEED
LOCATION
AUTHORIZATION
CONTEXT BASED ACCESS CONTROL(CBAC)
 ADVANTAGES:
ACCESS CONTROL IN CONTEXT-AWARE.
 DISADVANTAGE:
THIS IS STILL A STATIC MODEL.
AUTHORIZATION
CONTEXT AWARE ACCESS CONTROL(CAAC)
 DYNAMIC SPECIFICATION & ENFORCEMENT OF
ARBITARY ACCESS RULES…
 SEPARATION OF OBJECT AND THE MAIN BUISNESS
LOGIC OF TARGET APPLICATION
AUTHORIZATION
Auditing is essentially the action of making sure someone
complies with a rule or follows safety procedures...
AUDITING
 WHY DO WE NEED A CLOUD COMPUTING
AUDIT?????
The primary goal of a Cloud Audit Checklist is to assure
that all data requests, access, processing and storage are
properly documented for regulatory compliance.
A secondary goal of this Cloud Audit Checklist is to
establish a process which will allow an auditor to
document compliance with the security standards
required by law or regulation.
AUDITING
 TYPES OF AUDIT
SYSTEM AUDIT
A SYSTEM AUDIT IS A ONE-TIME OR
PERIODIC EVENT TO EVALUATE SECURITY.
MONITORING
MONITORING IS AN ONGOING
ACTIVITY THAT EXAMINES THE EITHER THE
SYSTEM OR THE USERS
AUDITING
CLOUD AUDITOR
∆ A cloud auditor is a third party who examines
controls of cloud computing service providers.
∆ Cloud auditor performs an audit to verify compliance
with the standards and expressed his opinion through
a report.
AUDITING
INFORMATION TECHNOLOGY AUDITORS TYPICALLY
AUDIT THE FOLLOWING FUNCTIONS :-----
 SYSTEM CONTROLS
 SYSTEM DEVELOPMENT STANDARDS
 BACKUP CONTROL
 DATA DISPLAY PROCEDURES
 DATA CENTER SECURITY
 CONTINGENCY PLANS
AUDITING
ACCOUNTABILITY IS ALL ABOUT DEVELOPING A
HOLISTIC APPROACH TO ACHIEVING TRUST AND
SECURITY IN THE CLOUD, ENCOMPASSING
LEGAL
REGULATORY
TECHNICAL MECHANISMS
ACCOUNTABILITY
ACCOUNTABILITY
RESPONSIBILITY
YOU ARE RESPONSIBLE FOR PROTECTING THE SECURITY OF YOUR
DATA AND IDENTITIES, ON-PREMISES RESOURCES, AND THE
CLOUD COMPONENTS YOU CONTROL (WHICH VARIES BY SERVICE
TYPE).
ACCOUNTABILITY
REMEDIATION
 The ability to detail the origin of policy violations in order to
provide appropriate responses.
 The ability to suggest
response actions to ease
the process for customers
responding to the event.
ACCOUNTABILITY
ASSURANCE
THE CONTROLS INSIDE OF CLOUD ASSURANCE ARE
BUILT TO HELP BUILD STRONGER VALUE IN YOUR
BUSINESS SYSTEMS.
ACCOUNTABILITY
 WITH THE HELP OF CLOUD SECURITY, YOU CAN CENTRALIZE THE
COMPANY’S SECURITY INFRASTRUCTURE FOR ENHANCED
PROTECTION.
 TIME TO SAY GOODBYE TO HARDWARE
 MINIMIZED CAPITAL EXPENDITURE HELPING YOU MANAGE
FINANCES.
 LIMITS THE STAFF LOAD AND ADMINISTRATIVE OVERHEADS
 NO NEED FOR MANUAL SECURITY CONFIGURATIONS
 IT IS SCALABLE AS YOU ARE WELCOME TO ADD ADDITIONAL
FEATURES AND OFFERING ACCESS TO AS MANY USERS AS YOU
WANT WITHOUT BREACHING YOUR SECURITY
WHY DO WE NEED CLOUD SECURITY
????????????
 THE CLOUDS ARE ACCESSIBLE BY THE TEAM AND DEVICES OUTSIDE
THE CORPORATE NETWORK THAT ARE NOT SUPERVISED BY IT
COMPROMISING THE ALL-TIME AND EXTENSIVE MONITORING. THIS
LOOPHOLE CAN LEAD TO CYBER-ATTACKS OR INFORMATION LEAKS.
 AN EMPLOYEE WITH ACCESS TO THE CLOUD CAN GO ROGUE
EXPOSING OR EXPLOITING THE ORGANIZATION IN A THIRD-PARTY
CLOUD SERVICE PROVIDER’S SITUATION
 HUMAN ERRORS CAN CAUSE MISCONFIGURATION OF USER ACCESS
CONTROLS.
 THE CHIEF RISK OF USING THE CLOUD IS THAT THERE IS NO
PERIMETER AS ALL CLOUD ENVIRONMENTS SEEM EXCEEDINGLY
CONNECTED AND ACCOUNT HIJACKS CAN GET YOU INTO SERIOUS
PROBLEMS
CLOUD SECURITY CHALLENGES
cloud security.pptx

More Related Content

Similar to cloud security.pptx

The Art of Cloud Auditing - ISACA ID
The Art of Cloud Auditing - ISACA IDThe Art of Cloud Auditing - ISACA ID
The Art of Cloud Auditing - ISACA IDEryk Budi Pratama
 
NIS-CH 1-PART 1 (1).pptx
NIS-CH 1-PART 1 (1).pptxNIS-CH 1-PART 1 (1).pptx
NIS-CH 1-PART 1 (1).pptxchandutidake
 
Why CCSK with InfosecTrain (1).pdf
Why CCSK with InfosecTrain (1).pdfWhy CCSK with InfosecTrain (1).pdf
Why CCSK with InfosecTrain (1).pdfinfosec train
 
TrustBuilder IBM TAMeb sales presentation v2.3
TrustBuilder IBM TAMeb sales presentation v2.3TrustBuilder IBM TAMeb sales presentation v2.3
TrustBuilder IBM TAMeb sales presentation v2.3Pieter Noorlander
 
Insurance Innovation Award - Metlife Innovation Centre
Insurance Innovation Award - Metlife Innovation CentreInsurance Innovation Award - Metlife Innovation Centre
Insurance Innovation Award - Metlife Innovation CentreThe Digital Insurer
 
AWS Cloud Governance & Security through Automation - Atlanta AWS Builders
AWS Cloud Governance & Security through Automation - Atlanta AWS BuildersAWS Cloud Governance & Security through Automation - Atlanta AWS Builders
AWS Cloud Governance & Security through Automation - Atlanta AWS BuildersJames Strong
 
Cloud-Based Customer Experience Management Solutions For Government Agencies
Cloud-Based Customer Experience Management Solutions For Government AgenciesCloud-Based Customer Experience Management Solutions For Government Agencies
Cloud-Based Customer Experience Management Solutions For Government AgenciesRightNow Technologies
 
ISO 27017 – What are the Business Advantages of Cloud Security?
ISO 27017 – What are the Business Advantages of Cloud Security?ISO 27017 – What are the Business Advantages of Cloud Security?
ISO 27017 – What are the Business Advantages of Cloud Security?Alvin Integrated Services [AIS]
 
Let's Get Start Your Preparation for CSA Certificate of Cloud Security Knowle...
Let's Get Start Your Preparation for CSA Certificate of Cloud Security Knowle...Let's Get Start Your Preparation for CSA Certificate of Cloud Security Knowle...
Let's Get Start Your Preparation for CSA Certificate of Cloud Security Knowle...Amaaira Johns
 
Insurance Innovation Award-Metlife Innovation Centre
Insurance Innovation Award-Metlife Innovation CentreInsurance Innovation Award-Metlife Innovation Centre
Insurance Innovation Award-Metlife Innovation CentreThe Digital Insurer
 
Twin Cities IAM Meet Up - May 2014 - The latest in authorization trends and s...
Twin Cities IAM Meet Up - May 2014 - The latest in authorization trends and s...Twin Cities IAM Meet Up - May 2014 - The latest in authorization trends and s...
Twin Cities IAM Meet Up - May 2014 - The latest in authorization trends and s...ggebel
 
Whitepaper: Moving to Clouds? Simplify your approach to understand the risks ...
Whitepaper: Moving to Clouds? Simplify your approach to understand the risks ...Whitepaper: Moving to Clouds? Simplify your approach to understand the risks ...
Whitepaper: Moving to Clouds? Simplify your approach to understand the risks ...Happiest Minds Technologies
 
Everything Practice Management - June 16 2015 CCLA Conference
Everything Practice Management -  June 16 2015 CCLA ConferenceEverything Practice Management -  June 16 2015 CCLA Conference
Everything Practice Management - June 16 2015 CCLA ConferenceuLawPractice Jillian Lim
 
Building security from scratch
Building security from scratchBuilding security from scratch
Building security from scratchRoman Zelenko
 
The Cloud Crossover
The Cloud CrossoverThe Cloud Crossover
The Cloud CrossoverArmor
 
Simplify Your Approach To_Assess The Risks Of Moving Into The Cloud
Simplify Your Approach To_Assess The Risks Of Moving Into The CloudSimplify Your Approach To_Assess The Risks Of Moving Into The Cloud
Simplify Your Approach To_Assess The Risks Of Moving Into The CloudHappiest Minds Technologies
 

Similar to cloud security.pptx (20)

Issa 042711
Issa 042711Issa 042711
Issa 042711
 
The Art of Cloud Auditing - ISACA ID
The Art of Cloud Auditing - ISACA IDThe Art of Cloud Auditing - ISACA ID
The Art of Cloud Auditing - ISACA ID
 
NIS-CH 1-PART 1 (1).pptx
NIS-CH 1-PART 1 (1).pptxNIS-CH 1-PART 1 (1).pptx
NIS-CH 1-PART 1 (1).pptx
 
Why CCSK with InfosecTrain (1).pdf
Why CCSK with InfosecTrain (1).pdfWhy CCSK with InfosecTrain (1).pdf
Why CCSK with InfosecTrain (1).pdf
 
TrustBuilder IBM TAMeb sales presentation v2.3
TrustBuilder IBM TAMeb sales presentation v2.3TrustBuilder IBM TAMeb sales presentation v2.3
TrustBuilder IBM TAMeb sales presentation v2.3
 
Patrick armstrong athens
Patrick armstrong athensPatrick armstrong athens
Patrick armstrong athens
 
HPE SPACE Poster
HPE SPACE PosterHPE SPACE Poster
HPE SPACE Poster
 
Insurance Innovation Award - Metlife Innovation Centre
Insurance Innovation Award - Metlife Innovation CentreInsurance Innovation Award - Metlife Innovation Centre
Insurance Innovation Award - Metlife Innovation Centre
 
AWS Cloud Governance & Security through Automation - Atlanta AWS Builders
AWS Cloud Governance & Security through Automation - Atlanta AWS BuildersAWS Cloud Governance & Security through Automation - Atlanta AWS Builders
AWS Cloud Governance & Security through Automation - Atlanta AWS Builders
 
Cloud-Based Customer Experience Management Solutions For Government Agencies
Cloud-Based Customer Experience Management Solutions For Government AgenciesCloud-Based Customer Experience Management Solutions For Government Agencies
Cloud-Based Customer Experience Management Solutions For Government Agencies
 
ISO 27017 – What are the Business Advantages of Cloud Security?
ISO 27017 – What are the Business Advantages of Cloud Security?ISO 27017 – What are the Business Advantages of Cloud Security?
ISO 27017 – What are the Business Advantages of Cloud Security?
 
Let's Get Start Your Preparation for CSA Certificate of Cloud Security Knowle...
Let's Get Start Your Preparation for CSA Certificate of Cloud Security Knowle...Let's Get Start Your Preparation for CSA Certificate of Cloud Security Knowle...
Let's Get Start Your Preparation for CSA Certificate of Cloud Security Knowle...
 
Insurance Innovation Award-Metlife Innovation Centre
Insurance Innovation Award-Metlife Innovation CentreInsurance Innovation Award-Metlife Innovation Centre
Insurance Innovation Award-Metlife Innovation Centre
 
Twin Cities IAM Meet Up - May 2014 - The latest in authorization trends and s...
Twin Cities IAM Meet Up - May 2014 - The latest in authorization trends and s...Twin Cities IAM Meet Up - May 2014 - The latest in authorization trends and s...
Twin Cities IAM Meet Up - May 2014 - The latest in authorization trends and s...
 
Whitepaper: Moving to Clouds? Simplify your approach to understand the risks ...
Whitepaper: Moving to Clouds? Simplify your approach to understand the risks ...Whitepaper: Moving to Clouds? Simplify your approach to understand the risks ...
Whitepaper: Moving to Clouds? Simplify your approach to understand the risks ...
 
Everything Practice Management - June 16 2015 CCLA Conference
Everything Practice Management -  June 16 2015 CCLA ConferenceEverything Practice Management -  June 16 2015 CCLA Conference
Everything Practice Management - June 16 2015 CCLA Conference
 
Building security from scratch
Building security from scratchBuilding security from scratch
Building security from scratch
 
The Cloud Crossover
The Cloud CrossoverThe Cloud Crossover
The Cloud Crossover
 
Silicon Valley IDSA Meetup October 2018
Silicon Valley IDSA Meetup October 2018 Silicon Valley IDSA Meetup October 2018
Silicon Valley IDSA Meetup October 2018
 
Simplify Your Approach To_Assess The Risks Of Moving Into The Cloud
Simplify Your Approach To_Assess The Risks Of Moving Into The CloudSimplify Your Approach To_Assess The Risks Of Moving Into The Cloud
Simplify Your Approach To_Assess The Risks Of Moving Into The Cloud
 

More from SourodeepChakraborty3

More from SourodeepChakraborty3 (7)

types of cloud.pptx
types of cloud.pptxtypes of cloud.pptx
types of cloud.pptx
 
scaling.pptx
scaling.pptxscaling.pptx
scaling.pptx
 
Deployment Model.pptx
Deployment Model.pptxDeployment Model.pptx
Deployment Model.pptx
 
cloud computing advantages.pptx
cloud computing advantages.pptxcloud computing advantages.pptx
cloud computing advantages.pptx
 
cloud computing architecture.pptx
cloud computing architecture.pptxcloud computing architecture.pptx
cloud computing architecture.pptx
 
Service level agreement.pptx
Service level agreement.pptxService level agreement.pptx
Service level agreement.pptx
 
CLOUD SECURITY_CIA (1).pptx
CLOUD SECURITY_CIA (1).pptxCLOUD SECURITY_CIA (1).pptx
CLOUD SECURITY_CIA (1).pptx
 

Recently uploaded

Call Girls Service Nagpur Tanvi Call 7001035870 Meet With Nagpur Escorts
Call Girls Service Nagpur Tanvi Call 7001035870 Meet With Nagpur EscortsCall Girls Service Nagpur Tanvi Call 7001035870 Meet With Nagpur Escorts
Call Girls Service Nagpur Tanvi Call 7001035870 Meet With Nagpur EscortsCall Girls in Nagpur High Profile
 
IMPLICATIONS OF THE ABOVE HOLISTIC UNDERSTANDING OF HARMONY ON PROFESSIONAL E...
IMPLICATIONS OF THE ABOVE HOLISTIC UNDERSTANDING OF HARMONY ON PROFESSIONAL E...IMPLICATIONS OF THE ABOVE HOLISTIC UNDERSTANDING OF HARMONY ON PROFESSIONAL E...
IMPLICATIONS OF THE ABOVE HOLISTIC UNDERSTANDING OF HARMONY ON PROFESSIONAL E...RajaP95
 
UNIT-III FMM. DIMENSIONAL ANALYSIS
UNIT-III FMM.        DIMENSIONAL ANALYSISUNIT-III FMM.        DIMENSIONAL ANALYSIS
UNIT-III FMM. DIMENSIONAL ANALYSISrknatarajan
 
Introduction to IEEE STANDARDS and its different types.pptx
Introduction to IEEE STANDARDS and its different types.pptxIntroduction to IEEE STANDARDS and its different types.pptx
Introduction to IEEE STANDARDS and its different types.pptxupamatechverse
 
Sheet Pile Wall Design and Construction: A Practical Guide for Civil Engineer...
Sheet Pile Wall Design and Construction: A Practical Guide for Civil Engineer...Sheet Pile Wall Design and Construction: A Practical Guide for Civil Engineer...
Sheet Pile Wall Design and Construction: A Practical Guide for Civil Engineer...Dr.Costas Sachpazis
 
MANUFACTURING PROCESS-II UNIT-5 NC MACHINE TOOLS
MANUFACTURING PROCESS-II UNIT-5 NC MACHINE TOOLSMANUFACTURING PROCESS-II UNIT-5 NC MACHINE TOOLS
MANUFACTURING PROCESS-II UNIT-5 NC MACHINE TOOLSSIVASHANKAR N
 
(PRIYA) Rajgurunagar Call Girls Just Call 7001035870 [ Cash on Delivery ] Pun...
(PRIYA) Rajgurunagar Call Girls Just Call 7001035870 [ Cash on Delivery ] Pun...(PRIYA) Rajgurunagar Call Girls Just Call 7001035870 [ Cash on Delivery ] Pun...
(PRIYA) Rajgurunagar Call Girls Just Call 7001035870 [ Cash on Delivery ] Pun...ranjana rawat
 
UNIT-V FMM.HYDRAULIC TURBINE - Construction and working
UNIT-V FMM.HYDRAULIC TURBINE - Construction and workingUNIT-V FMM.HYDRAULIC TURBINE - Construction and working
UNIT-V FMM.HYDRAULIC TURBINE - Construction and workingrknatarajan
 
The Most Attractive Pune Call Girls Budhwar Peth 8250192130 Will You Miss Thi...
The Most Attractive Pune Call Girls Budhwar Peth 8250192130 Will You Miss Thi...The Most Attractive Pune Call Girls Budhwar Peth 8250192130 Will You Miss Thi...
The Most Attractive Pune Call Girls Budhwar Peth 8250192130 Will You Miss Thi...ranjana rawat
 
result management system report for college project
result management system report for college projectresult management system report for college project
result management system report for college projectTonystark477637
 
HARDNESS, FRACTURE TOUGHNESS AND STRENGTH OF CERAMICS
HARDNESS, FRACTURE TOUGHNESS AND STRENGTH OF CERAMICSHARDNESS, FRACTURE TOUGHNESS AND STRENGTH OF CERAMICS
HARDNESS, FRACTURE TOUGHNESS AND STRENGTH OF CERAMICSRajkumarAkumalla
 
KubeKraft presentation @CloudNativeHooghly
KubeKraft presentation @CloudNativeHooghlyKubeKraft presentation @CloudNativeHooghly
KubeKraft presentation @CloudNativeHooghlysanyuktamishra911
 
MANUFACTURING PROCESS-II UNIT-2 LATHE MACHINE
MANUFACTURING PROCESS-II UNIT-2 LATHE MACHINEMANUFACTURING PROCESS-II UNIT-2 LATHE MACHINE
MANUFACTURING PROCESS-II UNIT-2 LATHE MACHINESIVASHANKAR N
 
SPICE PARK APR2024 ( 6,793 SPICE Models )
SPICE PARK APR2024 ( 6,793 SPICE Models )SPICE PARK APR2024 ( 6,793 SPICE Models )
SPICE PARK APR2024 ( 6,793 SPICE Models )Tsuyoshi Horigome
 
UNIT-II FMM-Flow Through Circular Conduits
UNIT-II FMM-Flow Through Circular ConduitsUNIT-II FMM-Flow Through Circular Conduits
UNIT-II FMM-Flow Through Circular Conduitsrknatarajan
 
Software Development Life Cycle By Team Orange (Dept. of Pharmacy)
Software Development Life Cycle By  Team Orange (Dept. of Pharmacy)Software Development Life Cycle By  Team Orange (Dept. of Pharmacy)
Software Development Life Cycle By Team Orange (Dept. of Pharmacy)Suman Mia
 
Microscopic Analysis of Ceramic Materials.pptx
Microscopic Analysis of Ceramic Materials.pptxMicroscopic Analysis of Ceramic Materials.pptx
Microscopic Analysis of Ceramic Materials.pptxpurnimasatapathy1234
 
Call Girls in Nagpur Suman Call 7001035870 Meet With Nagpur Escorts
Call Girls in Nagpur Suman Call 7001035870 Meet With Nagpur EscortsCall Girls in Nagpur Suman Call 7001035870 Meet With Nagpur Escorts
Call Girls in Nagpur Suman Call 7001035870 Meet With Nagpur EscortsCall Girls in Nagpur High Profile
 

Recently uploaded (20)

Call Girls Service Nagpur Tanvi Call 7001035870 Meet With Nagpur Escorts
Call Girls Service Nagpur Tanvi Call 7001035870 Meet With Nagpur EscortsCall Girls Service Nagpur Tanvi Call 7001035870 Meet With Nagpur Escorts
Call Girls Service Nagpur Tanvi Call 7001035870 Meet With Nagpur Escorts
 
IMPLICATIONS OF THE ABOVE HOLISTIC UNDERSTANDING OF HARMONY ON PROFESSIONAL E...
IMPLICATIONS OF THE ABOVE HOLISTIC UNDERSTANDING OF HARMONY ON PROFESSIONAL E...IMPLICATIONS OF THE ABOVE HOLISTIC UNDERSTANDING OF HARMONY ON PROFESSIONAL E...
IMPLICATIONS OF THE ABOVE HOLISTIC UNDERSTANDING OF HARMONY ON PROFESSIONAL E...
 
UNIT-III FMM. DIMENSIONAL ANALYSIS
UNIT-III FMM.        DIMENSIONAL ANALYSISUNIT-III FMM.        DIMENSIONAL ANALYSIS
UNIT-III FMM. DIMENSIONAL ANALYSIS
 
Introduction to IEEE STANDARDS and its different types.pptx
Introduction to IEEE STANDARDS and its different types.pptxIntroduction to IEEE STANDARDS and its different types.pptx
Introduction to IEEE STANDARDS and its different types.pptx
 
Sheet Pile Wall Design and Construction: A Practical Guide for Civil Engineer...
Sheet Pile Wall Design and Construction: A Practical Guide for Civil Engineer...Sheet Pile Wall Design and Construction: A Practical Guide for Civil Engineer...
Sheet Pile Wall Design and Construction: A Practical Guide for Civil Engineer...
 
MANUFACTURING PROCESS-II UNIT-5 NC MACHINE TOOLS
MANUFACTURING PROCESS-II UNIT-5 NC MACHINE TOOLSMANUFACTURING PROCESS-II UNIT-5 NC MACHINE TOOLS
MANUFACTURING PROCESS-II UNIT-5 NC MACHINE TOOLS
 
★ CALL US 9953330565 ( HOT Young Call Girls In Badarpur delhi NCR
★ CALL US 9953330565 ( HOT Young Call Girls In Badarpur delhi NCR★ CALL US 9953330565 ( HOT Young Call Girls In Badarpur delhi NCR
★ CALL US 9953330565 ( HOT Young Call Girls In Badarpur delhi NCR
 
(PRIYA) Rajgurunagar Call Girls Just Call 7001035870 [ Cash on Delivery ] Pun...
(PRIYA) Rajgurunagar Call Girls Just Call 7001035870 [ Cash on Delivery ] Pun...(PRIYA) Rajgurunagar Call Girls Just Call 7001035870 [ Cash on Delivery ] Pun...
(PRIYA) Rajgurunagar Call Girls Just Call 7001035870 [ Cash on Delivery ] Pun...
 
UNIT-V FMM.HYDRAULIC TURBINE - Construction and working
UNIT-V FMM.HYDRAULIC TURBINE - Construction and workingUNIT-V FMM.HYDRAULIC TURBINE - Construction and working
UNIT-V FMM.HYDRAULIC TURBINE - Construction and working
 
Roadmap to Membership of RICS - Pathways and Routes
Roadmap to Membership of RICS - Pathways and RoutesRoadmap to Membership of RICS - Pathways and Routes
Roadmap to Membership of RICS - Pathways and Routes
 
The Most Attractive Pune Call Girls Budhwar Peth 8250192130 Will You Miss Thi...
The Most Attractive Pune Call Girls Budhwar Peth 8250192130 Will You Miss Thi...The Most Attractive Pune Call Girls Budhwar Peth 8250192130 Will You Miss Thi...
The Most Attractive Pune Call Girls Budhwar Peth 8250192130 Will You Miss Thi...
 
result management system report for college project
result management system report for college projectresult management system report for college project
result management system report for college project
 
HARDNESS, FRACTURE TOUGHNESS AND STRENGTH OF CERAMICS
HARDNESS, FRACTURE TOUGHNESS AND STRENGTH OF CERAMICSHARDNESS, FRACTURE TOUGHNESS AND STRENGTH OF CERAMICS
HARDNESS, FRACTURE TOUGHNESS AND STRENGTH OF CERAMICS
 
KubeKraft presentation @CloudNativeHooghly
KubeKraft presentation @CloudNativeHooghlyKubeKraft presentation @CloudNativeHooghly
KubeKraft presentation @CloudNativeHooghly
 
MANUFACTURING PROCESS-II UNIT-2 LATHE MACHINE
MANUFACTURING PROCESS-II UNIT-2 LATHE MACHINEMANUFACTURING PROCESS-II UNIT-2 LATHE MACHINE
MANUFACTURING PROCESS-II UNIT-2 LATHE MACHINE
 
SPICE PARK APR2024 ( 6,793 SPICE Models )
SPICE PARK APR2024 ( 6,793 SPICE Models )SPICE PARK APR2024 ( 6,793 SPICE Models )
SPICE PARK APR2024 ( 6,793 SPICE Models )
 
UNIT-II FMM-Flow Through Circular Conduits
UNIT-II FMM-Flow Through Circular ConduitsUNIT-II FMM-Flow Through Circular Conduits
UNIT-II FMM-Flow Through Circular Conduits
 
Software Development Life Cycle By Team Orange (Dept. of Pharmacy)
Software Development Life Cycle By  Team Orange (Dept. of Pharmacy)Software Development Life Cycle By  Team Orange (Dept. of Pharmacy)
Software Development Life Cycle By Team Orange (Dept. of Pharmacy)
 
Microscopic Analysis of Ceramic Materials.pptx
Microscopic Analysis of Ceramic Materials.pptxMicroscopic Analysis of Ceramic Materials.pptx
Microscopic Analysis of Ceramic Materials.pptx
 
Call Girls in Nagpur Suman Call 7001035870 Meet With Nagpur Escorts
Call Girls in Nagpur Suman Call 7001035870 Meet With Nagpur EscortsCall Girls in Nagpur Suman Call 7001035870 Meet With Nagpur Escorts
Call Girls in Nagpur Suman Call 7001035870 Meet With Nagpur Escorts
 

cloud security.pptx

  • 1. NAME - SOURODEEP CHAKRABORTY ROLL - 9210 SEMESTER – V STUDENT ID – BGC201120 REGISTRATION NO - 1072011400167 CLOUD COMPUTING
  • 2.  CLOUD SECURITY SERVICES  AUTHENTICATION  AUTHORIZATON  AUDITING  ACCOUNTABILITY  CONCLUSION GLANCE
  • 3. CLOUD SECURITY, ALSO KNOWN AS CLOUD COMPUTING SECURITY, IS A COLLECTION OF SECURITY MEASURES DESIGNED TO PROTECT CLOUD-BASED INFRASTRUCTURE, APPLICATIONS, AND DATA. THESE MEASURES ENSURE USER AND DEVICE AUTHENTICATION, DATA AND RESOURCE ACCESS CONTROL, AND DATA PRIVACY PROTECTION. CLOUD SECURITY SERVICES
  • 4. CLOUD SOFTWARE ASSURANCE INCLUDE……. 4A AUTHENTICATION AUTHORIZATION AUDITING ACCOUNTABILITY CLOUD SECURITY SERVICES
  • 5. AUTHENTICATION HOW DO YOU PROVE TO SOMEONE THAT YOU ARE WHO YOU CLAIM TO BE ?????
  • 6. AUTHENTICATION CAN BE DEFINED AS DETERMINING AN IDENTITY TO THE REQUIRED LEVEL OF ASSURANCE…… AUTHENTICATION IS THE FIRST STEP IN ANY CRYPTOGRAPHIC SOLUTION - BECAUSE UNLESS WE KNOW WHO IS COMMUNICATING, THERE IS NO POINT IN ENCRYPTION WHAT IS BEING COMMUNICATED. AUTHENTICATION
  • 7.  AUTHENTICATION IS ANY PROCESS BY WHICH A SYSTEM VERIFIES THE IDENTITY OF A USER WHO WISHES TO ACCESS IT…  AUTHENTICATION MAY BE IMPLEMENTED USING CREDENTIAL, EACH OF WHICH IS COMPOSED OF AN USER-ID AND PASSWORD. ALTERNATELY AUTHENTICATION MAY BE IMPLEMENTED WITH SMARD CARD, AN AUTHENTICATION SERVER OR EVEN A PUBLIC KEY INFRASTRUCTURE….. AUTHENTICATION
  • 8. MANY WAYS TO PROVE WHO YOU ARE:  WHAT YOU KNOW --PASSWORD / SECRET KEY  WHERE YOU ARE -- IP ADDRESS < INTERNET PROTOCOL >  WHAT YOU ARE BIOMETRICS IS AN AUTHENTICATION METHOD THAT IDENTIFIES AND RECOGNIZES PEOPLE. AUTHENTICATION
  • 9. BIOMETRICS PHYSIOLOGICAL BEHAVIOURAL FACE FINGER VOICE SIGNATURE IRIS DNA HAND AUTHENTICATION
  • 10. PASSWORD A PASSWORD IS A STRING OF ALPHABET, NUMBERS AND SPECIAL CHARACTERS WHICH IS SUPPOSED TO BE KNOWN ONLY TO BE ENTITY THAT IS BEING AUTHENTICATE… AUTHENTICATION
  • 11.  GIVEN WHO YOU ARE, WHAT CAN YOU DO???  HOW DO WE CONTROL PRIVILEGE??? AUTHORIZATION
  • 12. THE PROCESS OF GIVING THE USER PERMISSON TO ACCESS A SPECIFIC RESOURCE OR FUNCTIONS….. AUTHORIZATION
  • 13. ACCESS CONTROL TYPES ROLE BASED ACCESS CONTROL (RBAC) CONTEXT BASED ACCESS CONTROL (CBAC) CONTEXT AWARE ACCESS CONTROL (CAAC) AUTHORIZATION
  • 14. ROLE BASED ACCESS CONTROL(RBAC)  SANDHU ETAL FORMALIZED RBAC IN 1996. USER U ACTING IN ROLE R IS GRANTED PERMISSON P.  ADVANTAGES: GREATLY IMPROVED EFFICIENCY DISADVANTAGES: CAN’T SPECIFY FINEGRAINED RULE AUTHORIZATION
  • 15. CONTEXT BASED ACCESS CONTROL(CBAC) WHAT IS CONTEXT? CIRCUMSTANCES IN WHICH AN EVENT OCCURS. SUBJECT OBJECT SYSTEM NAME TYPE TIME AGE OWNER DATE ID CPU SPEED LOCATION AUTHORIZATION
  • 16. CONTEXT BASED ACCESS CONTROL(CBAC)  ADVANTAGES: ACCESS CONTROL IN CONTEXT-AWARE.  DISADVANTAGE: THIS IS STILL A STATIC MODEL. AUTHORIZATION
  • 17. CONTEXT AWARE ACCESS CONTROL(CAAC)  DYNAMIC SPECIFICATION & ENFORCEMENT OF ARBITARY ACCESS RULES…  SEPARATION OF OBJECT AND THE MAIN BUISNESS LOGIC OF TARGET APPLICATION AUTHORIZATION
  • 18. Auditing is essentially the action of making sure someone complies with a rule or follows safety procedures... AUDITING
  • 19.  WHY DO WE NEED A CLOUD COMPUTING AUDIT????? The primary goal of a Cloud Audit Checklist is to assure that all data requests, access, processing and storage are properly documented for regulatory compliance. A secondary goal of this Cloud Audit Checklist is to establish a process which will allow an auditor to document compliance with the security standards required by law or regulation. AUDITING
  • 20.  TYPES OF AUDIT SYSTEM AUDIT A SYSTEM AUDIT IS A ONE-TIME OR PERIODIC EVENT TO EVALUATE SECURITY. MONITORING MONITORING IS AN ONGOING ACTIVITY THAT EXAMINES THE EITHER THE SYSTEM OR THE USERS AUDITING
  • 21. CLOUD AUDITOR ∆ A cloud auditor is a third party who examines controls of cloud computing service providers. ∆ Cloud auditor performs an audit to verify compliance with the standards and expressed his opinion through a report. AUDITING
  • 22. INFORMATION TECHNOLOGY AUDITORS TYPICALLY AUDIT THE FOLLOWING FUNCTIONS :-----  SYSTEM CONTROLS  SYSTEM DEVELOPMENT STANDARDS  BACKUP CONTROL  DATA DISPLAY PROCEDURES  DATA CENTER SECURITY  CONTINGENCY PLANS AUDITING
  • 23. ACCOUNTABILITY IS ALL ABOUT DEVELOPING A HOLISTIC APPROACH TO ACHIEVING TRUST AND SECURITY IN THE CLOUD, ENCOMPASSING LEGAL REGULATORY TECHNICAL MECHANISMS ACCOUNTABILITY
  • 25. RESPONSIBILITY YOU ARE RESPONSIBLE FOR PROTECTING THE SECURITY OF YOUR DATA AND IDENTITIES, ON-PREMISES RESOURCES, AND THE CLOUD COMPONENTS YOU CONTROL (WHICH VARIES BY SERVICE TYPE). ACCOUNTABILITY
  • 26. REMEDIATION  The ability to detail the origin of policy violations in order to provide appropriate responses.  The ability to suggest response actions to ease the process for customers responding to the event. ACCOUNTABILITY
  • 27. ASSURANCE THE CONTROLS INSIDE OF CLOUD ASSURANCE ARE BUILT TO HELP BUILD STRONGER VALUE IN YOUR BUSINESS SYSTEMS. ACCOUNTABILITY
  • 28.  WITH THE HELP OF CLOUD SECURITY, YOU CAN CENTRALIZE THE COMPANY’S SECURITY INFRASTRUCTURE FOR ENHANCED PROTECTION.  TIME TO SAY GOODBYE TO HARDWARE  MINIMIZED CAPITAL EXPENDITURE HELPING YOU MANAGE FINANCES.  LIMITS THE STAFF LOAD AND ADMINISTRATIVE OVERHEADS  NO NEED FOR MANUAL SECURITY CONFIGURATIONS  IT IS SCALABLE AS YOU ARE WELCOME TO ADD ADDITIONAL FEATURES AND OFFERING ACCESS TO AS MANY USERS AS YOU WANT WITHOUT BREACHING YOUR SECURITY WHY DO WE NEED CLOUD SECURITY ????????????
  • 29.  THE CLOUDS ARE ACCESSIBLE BY THE TEAM AND DEVICES OUTSIDE THE CORPORATE NETWORK THAT ARE NOT SUPERVISED BY IT COMPROMISING THE ALL-TIME AND EXTENSIVE MONITORING. THIS LOOPHOLE CAN LEAD TO CYBER-ATTACKS OR INFORMATION LEAKS.  AN EMPLOYEE WITH ACCESS TO THE CLOUD CAN GO ROGUE EXPOSING OR EXPLOITING THE ORGANIZATION IN A THIRD-PARTY CLOUD SERVICE PROVIDER’S SITUATION  HUMAN ERRORS CAN CAUSE MISCONFIGURATION OF USER ACCESS CONTROLS.  THE CHIEF RISK OF USING THE CLOUD IS THAT THERE IS NO PERIMETER AS ALL CLOUD ENVIRONMENTS SEEM EXCEEDINGLY CONNECTED AND ACCOUNT HIJACKS CAN GET YOU INTO SERIOUS PROBLEMS CLOUD SECURITY CHALLENGES