SlideShare a Scribd company logo
HOW SECURE IS CLOUD?
1
WHAT IS CLOUD
Cloud computing is a general term for the delivery of hosted
services over the Internet
2
3
Common Cloud Services
• Microsoft OneDrive, Office Online
• Google Drive
• Apple icloud
• Amazon Cloud Services
• Dropbox
• Mega
4
Cloud Hardware
Google Chrome: Web browser into an operating system.
ChromeBits: a smaller-than-a-candy-bar drivesthat turn any
display with an HDMI port into a usable computer running
Chrome OS.
5
The Security and Control Problems
Unknown Data Location
 Unauthorized Activity
 Storage
 Protection
6
The Security and Control Problems (Cont’d)
Vulnerability
Unfulfilled requirements
 Availability of the service
Lack of Liability
7
Factors contribute to Security problems
Lack of Security Management Ability
Weakness in Quality Maintenance
Unprotected and Backdated Use of Software andTechnology
8
How Secure is today’s cloud computing
Cloud computing is considered as one of the secure platform
to perform the online activity if the correct vendor is selected.
9
The Risks and Recent Security Breaching
Issues in Cloud Computing:
Key loss or Data
Encrypted
Data integrity
Data and Power
Loss
Denial of
Service
(DOS)
10
The Risks and Recent Security Breaching
Issues in Cloud Computing
General Server Risks
Service and Account Hijacking
PRISM Scandal
11
The Existing Security Functions of Cloud
Computing
More Clear andTransparent
Possible Defense
More Expensive Security
12
The issues want to clarify with prospective
vendors
Types of Company. (Public or Private)
Encryption
Data Center Storage
Minimum Security Requirements
13
Opinion for Entrust corporate systems to a
cloud computing provider
• Should be 100% Secure
• Able to Detect Unauthorized Access or Misuses (eg. Cracking)
• Less Expensive but Better Service
14
Conclusion
• The blackings of the cloud computing is figured out.
• Positive measures to protect the cloud storage are
implementing
• Smart IT companies are giving most priority of the security
today.
• Problems will be resolved soon by the new entrepreneurs
• Cloud will be the safest home for the future data’s. 15
Recommendation
• It is better to chose public company
• User should be concerned about the storage policy and the
place
• The user should be confirmed about the access in the cloud by
verify the login.
16
17
18
THANKYOU ALL

More Related Content

What's hot

Reasons why accountants should switch to cloud computing
Reasons why accountants should switch to cloud computingReasons why accountants should switch to cloud computing
Reasons why accountants should switch to cloud computingLily Smith
 
Cloud Computing
Cloud ComputingCloud Computing
Cloud Computingrajesh626
 
Why deploy private cloud in the hybrid cloud era?
Why deploy private cloud in the hybrid cloud era?Why deploy private cloud in the hybrid cloud era?
Why deploy private cloud in the hybrid cloud era?IBM Services
 
IT Series: Cloud Computing Done Right CISOA 2011
IT Series: Cloud Computing Done Right CISOA 2011IT Series: Cloud Computing Done Right CISOA 2011
IT Series: Cloud Computing Done Right CISOA 2011Donald E. Hester
 
LuminrDRPresentation_AITP_October2014.pptx
LuminrDRPresentation_AITP_October2014.pptxLuminrDRPresentation_AITP_October2014.pptx
LuminrDRPresentation_AITP_October2014.pptxTimothy Krupinski
 
Cloud computing: 5 myths
Cloud computing: 5 mythsCloud computing: 5 myths
Cloud computing: 5 mythsDot Net IT
 
Cloud computing web 2.0 By Joanna Hendricks BMT 580
Cloud computing web 2.0  By Joanna Hendricks BMT 580Cloud computing web 2.0  By Joanna Hendricks BMT 580
Cloud computing web 2.0 By Joanna Hendricks BMT 580Joanna Hendricks
 
Codestone Cloud in a Box Overview
Codestone Cloud in a Box OverviewCodestone Cloud in a Box Overview
Codestone Cloud in a Box OverviewSimonFenech
 
What is cloud computing and why should I use it?
What is cloud computing and why should I use it?What is cloud computing and why should I use it?
What is cloud computing and why should I use it?DARRIN SALT
 
It resource us signal cloud presentation itr - final
It resource   us signal cloud presentation itr - finalIt resource   us signal cloud presentation itr - final
It resource us signal cloud presentation itr - finalsvanelderen
 
An introduction of cloud storage
An introduction of cloud storage An introduction of cloud storage
An introduction of cloud storage Wenbin Zhao
 
Cloud presentatie bug 2011 v2
Cloud presentatie bug 2011 v2Cloud presentatie bug 2011 v2
Cloud presentatie bug 2011 v2Frank de Jong
 

What's hot (17)

Cloud computing
Cloud computingCloud computing
Cloud computing
 
Reasons why accountants should switch to cloud computing
Reasons why accountants should switch to cloud computingReasons why accountants should switch to cloud computing
Reasons why accountants should switch to cloud computing
 
Cloud Computing
Cloud ComputingCloud Computing
Cloud Computing
 
Why deploy private cloud in the hybrid cloud era?
Why deploy private cloud in the hybrid cloud era?Why deploy private cloud in the hybrid cloud era?
Why deploy private cloud in the hybrid cloud era?
 
IT Series: Cloud Computing Done Right CISOA 2011
IT Series: Cloud Computing Done Right CISOA 2011IT Series: Cloud Computing Done Right CISOA 2011
IT Series: Cloud Computing Done Right CISOA 2011
 
LuminrDRPresentation_AITP_October2014.pptx
LuminrDRPresentation_AITP_October2014.pptxLuminrDRPresentation_AITP_October2014.pptx
LuminrDRPresentation_AITP_October2014.pptx
 
To Preserve or Collect
To Preserve or CollectTo Preserve or Collect
To Preserve or Collect
 
Cloud computing: 5 myths
Cloud computing: 5 mythsCloud computing: 5 myths
Cloud computing: 5 myths
 
Connections Cloud Talk
Connections Cloud TalkConnections Cloud Talk
Connections Cloud Talk
 
Cloud computing web 2.0 By Joanna Hendricks BMT 580
Cloud computing web 2.0  By Joanna Hendricks BMT 580Cloud computing web 2.0  By Joanna Hendricks BMT 580
Cloud computing web 2.0 By Joanna Hendricks BMT 580
 
Presentation ppm ppt
Presentation ppm pptPresentation ppm ppt
Presentation ppm ppt
 
Codestone Cloud in a Box Overview
Codestone Cloud in a Box OverviewCodestone Cloud in a Box Overview
Codestone Cloud in a Box Overview
 
What is cloud computing and why should I use it?
What is cloud computing and why should I use it?What is cloud computing and why should I use it?
What is cloud computing and why should I use it?
 
Data Segregation
Data SegregationData Segregation
Data Segregation
 
It resource us signal cloud presentation itr - final
It resource   us signal cloud presentation itr - finalIt resource   us signal cloud presentation itr - final
It resource us signal cloud presentation itr - final
 
An introduction of cloud storage
An introduction of cloud storage An introduction of cloud storage
An introduction of cloud storage
 
Cloud presentatie bug 2011 v2
Cloud presentatie bug 2011 v2Cloud presentatie bug 2011 v2
Cloud presentatie bug 2011 v2
 

Viewers also liked

Next Generation Engineering Education White Paper (2)
Next Generation Engineering Education White Paper (2)Next Generation Engineering Education White Paper (2)
Next Generation Engineering Education White Paper (2)Andy Lau
 
Curriculum Vitae Patricia Cook 1
Curriculum Vitae Patricia Cook 1Curriculum Vitae Patricia Cook 1
Curriculum Vitae Patricia Cook 1Patricia Cook
 
William Stark Resume 08_24_2015.doc
William Stark Resume 08_24_2015.docWilliam Stark Resume 08_24_2015.doc
William Stark Resume 08_24_2015.docWilliam Stark
 
Final_Resume_01.02.2016
Final_Resume_01.02.2016Final_Resume_01.02.2016
Final_Resume_01.02.2016Nadine Jarjur
 
Stunning Shipping Container Homes
Stunning Shipping Container HomesStunning Shipping Container Homes
Stunning Shipping Container HomestheMinimalistMan
 
Lambert–Eaton myasthenic syndrome ( lems)
Lambert–Eaton myasthenic syndrome  ( lems)Lambert–Eaton myasthenic syndrome  ( lems)
Lambert–Eaton myasthenic syndrome ( lems)Samit Islam Rudra
 
콩콩(CongKong) 소개서_행사주최자용_20161025
콩콩(CongKong) 소개서_행사주최자용_20161025콩콩(CongKong) 소개서_행사주최자용_20161025
콩콩(CongKong) 소개서_행사주최자용_20161025REVIVAL LABS
 
NAZIA AMIN CV PHARMACIST 1 JAN 2016
NAZIA AMIN CV PHARMACIST 1 JAN 2016NAZIA AMIN CV PHARMACIST 1 JAN 2016
NAZIA AMIN CV PHARMACIST 1 JAN 2016Nazia Amin
 

Viewers also liked (11)

Camara-Annual-Report-2014
Camara-Annual-Report-2014Camara-Annual-Report-2014
Camara-Annual-Report-2014
 
Next Generation Engineering Education White Paper (2)
Next Generation Engineering Education White Paper (2)Next Generation Engineering Education White Paper (2)
Next Generation Engineering Education White Paper (2)
 
New Email
New EmailNew Email
New Email
 
Curriculum Vitae Patricia Cook 1
Curriculum Vitae Patricia Cook 1Curriculum Vitae Patricia Cook 1
Curriculum Vitae Patricia Cook 1
 
William Stark Resume 08_24_2015.doc
William Stark Resume 08_24_2015.docWilliam Stark Resume 08_24_2015.doc
William Stark Resume 08_24_2015.doc
 
Final_Resume_01.02.2016
Final_Resume_01.02.2016Final_Resume_01.02.2016
Final_Resume_01.02.2016
 
Glycolysis
GlycolysisGlycolysis
Glycolysis
 
Stunning Shipping Container Homes
Stunning Shipping Container HomesStunning Shipping Container Homes
Stunning Shipping Container Homes
 
Lambert–Eaton myasthenic syndrome ( lems)
Lambert–Eaton myasthenic syndrome  ( lems)Lambert–Eaton myasthenic syndrome  ( lems)
Lambert–Eaton myasthenic syndrome ( lems)
 
콩콩(CongKong) 소개서_행사주최자용_20161025
콩콩(CongKong) 소개서_행사주최자용_20161025콩콩(CongKong) 소개서_행사주최자용_20161025
콩콩(CongKong) 소개서_행사주최자용_20161025
 
NAZIA AMIN CV PHARMACIST 1 JAN 2016
NAZIA AMIN CV PHARMACIST 1 JAN 2016NAZIA AMIN CV PHARMACIST 1 JAN 2016
NAZIA AMIN CV PHARMACIST 1 JAN 2016
 

Similar to How Secure is Cloud

Cloud Computing in Africa
Cloud Computing in AfricaCloud Computing in Africa
Cloud Computing in Africatechzimslides
 
MPMA 2013 - Leveraging the Cloud for Museum Collections
MPMA 2013  - Leveraging the Cloud for Museum CollectionsMPMA 2013  - Leveraging the Cloud for Museum Collections
MPMA 2013 - Leveraging the Cloud for Museum CollectionsKacy Clarke
 
Cloud-Computing_CSE311_Computer-Networking CSE GUB BD - Shahidul.pptx
Cloud-Computing_CSE311_Computer-Networking CSE GUB BD - Shahidul.pptxCloud-Computing_CSE311_Computer-Networking CSE GUB BD - Shahidul.pptx
Cloud-Computing_CSE311_Computer-Networking CSE GUB BD - Shahidul.pptxMd. Shahidul Islam Prodhan
 
Cloud Computing Introduction
Cloud Computing IntroductionCloud Computing Introduction
Cloud Computing IntroductionMzos Pune
 
chapter 3 Selected Topics in computer.pptx
chapter 3 Selected Topics in computer.pptxchapter 3 Selected Topics in computer.pptx
chapter 3 Selected Topics in computer.pptxAschalewAyele2
 
Openstack & why cloud for enterprise ppt
Openstack & why cloud for enterprise pptOpenstack & why cloud for enterprise ppt
Openstack & why cloud for enterprise pptAsmaa Ibrahim
 
The Cloud: Background & Best Practices for Small Law Firms
The Cloud: Background & Best Practices for Small Law FirmsThe Cloud: Background & Best Practices for Small Law Firms
The Cloud: Background & Best Practices for Small Law FirmsNetwork 1 Consulting
 
Cloud Computing
Cloud ComputingCloud Computing
Cloud ComputingAllwyn24
 
4.1 Introduction to cloud storage.pdf
4.1 Introduction to cloud storage.pdf4.1 Introduction to cloud storage.pdf
4.1 Introduction to cloud storage.pdfyasothamohankumar
 
cloud storage ppt
cloud storage pptcloud storage ppt
cloud storage pptNaga Dinesh
 
Christoph Streit - Reasons to use a Private Cloud
Christoph Streit - Reasons to use a Private CloudChristoph Streit - Reasons to use a Private Cloud
Christoph Streit - Reasons to use a Private CloudSymposia Media
 
Navigating through the Cloud - 7 feb 2012 at Institute for Information Manage...
Navigating through the Cloud - 7 feb 2012 at Institute for Information Manage...Navigating through the Cloud - 7 feb 2012 at Institute for Information Manage...
Navigating through the Cloud - 7 feb 2012 at Institute for Information Manage...Livingstone Advisory
 
Benefits to using private cloud storage providers
Benefits to using private  cloud storage providersBenefits to using private  cloud storage providers
Benefits to using private cloud storage providersRonit Sharma
 
Cloud-Storage-PPT - Copy.pptx
Cloud-Storage-PPT - Copy.pptxCloud-Storage-PPT - Copy.pptx
Cloud-Storage-PPT - Copy.pptxDeveshKhandare
 
Tech equity - Cloud presentation
Tech equity - Cloud presentationTech equity - Cloud presentation
Tech equity - Cloud presentationAdrian Hall
 

Similar to How Secure is Cloud (20)

Cloud Computing in Africa
Cloud Computing in AfricaCloud Computing in Africa
Cloud Computing in Africa
 
MPMA 2013 - Leveraging the Cloud for Museum Collections
MPMA 2013  - Leveraging the Cloud for Museum CollectionsMPMA 2013  - Leveraging the Cloud for Museum Collections
MPMA 2013 - Leveraging the Cloud for Museum Collections
 
Cloud-Computing_CSE311_Computer-Networking CSE GUB BD - Shahidul.pptx
Cloud-Computing_CSE311_Computer-Networking CSE GUB BD - Shahidul.pptxCloud-Computing_CSE311_Computer-Networking CSE GUB BD - Shahidul.pptx
Cloud-Computing_CSE311_Computer-Networking CSE GUB BD - Shahidul.pptx
 
Cloud Computing Introduction
Cloud Computing IntroductionCloud Computing Introduction
Cloud Computing Introduction
 
chapter 3 Selected Topics in computer.pptx
chapter 3 Selected Topics in computer.pptxchapter 3 Selected Topics in computer.pptx
chapter 3 Selected Topics in computer.pptx
 
cc ppt
cc pptcc ppt
cc ppt
 
Openstack & why cloud for enterprise ppt
Openstack & why cloud for enterprise pptOpenstack & why cloud for enterprise ppt
Openstack & why cloud for enterprise ppt
 
Cloud computing
Cloud computingCloud computing
Cloud computing
 
somee.pptx
somee.pptxsomee.pptx
somee.pptx
 
The Cloud: Background & Best Practices for Small Law Firms
The Cloud: Background & Best Practices for Small Law FirmsThe Cloud: Background & Best Practices for Small Law Firms
The Cloud: Background & Best Practices for Small Law Firms
 
4.2.cloud storage
4.2.cloud storage4.2.cloud storage
4.2.cloud storage
 
Cloud Computing
Cloud ComputingCloud Computing
Cloud Computing
 
4.1 Introduction to cloud storage.pdf
4.1 Introduction to cloud storage.pdf4.1 Introduction to cloud storage.pdf
4.1 Introduction to cloud storage.pdf
 
cloud storage ppt
cloud storage pptcloud storage ppt
cloud storage ppt
 
Christoph Streit - Reasons to use a Private Cloud
Christoph Streit - Reasons to use a Private CloudChristoph Streit - Reasons to use a Private Cloud
Christoph Streit - Reasons to use a Private Cloud
 
Navigating through the Cloud - 7 feb 2012 at Institute for Information Manage...
Navigating through the Cloud - 7 feb 2012 at Institute for Information Manage...Navigating through the Cloud - 7 feb 2012 at Institute for Information Manage...
Navigating through the Cloud - 7 feb 2012 at Institute for Information Manage...
 
Benefits to using private cloud storage providers
Benefits to using private  cloud storage providersBenefits to using private  cloud storage providers
Benefits to using private cloud storage providers
 
ECI OVUM Webinar-Cloud Revenue Opportunities-Feb 2016
ECI OVUM Webinar-Cloud Revenue Opportunities-Feb 2016ECI OVUM Webinar-Cloud Revenue Opportunities-Feb 2016
ECI OVUM Webinar-Cloud Revenue Opportunities-Feb 2016
 
Cloud-Storage-PPT - Copy.pptx
Cloud-Storage-PPT - Copy.pptxCloud-Storage-PPT - Copy.pptx
Cloud-Storage-PPT - Copy.pptx
 
Tech equity - Cloud presentation
Tech equity - Cloud presentationTech equity - Cloud presentation
Tech equity - Cloud presentation
 

Recently uploaded

Behind the Scenes From the Manager's Chair: Decoding the Secrets of Successfu...
Behind the Scenes From the Manager's Chair: Decoding the Secrets of Successfu...Behind the Scenes From the Manager's Chair: Decoding the Secrets of Successfu...
Behind the Scenes From the Manager's Chair: Decoding the Secrets of Successfu...CzechDreamin
 
Software Delivery At the Speed of AI: Inflectra Invests In AI-Powered Quality
Software Delivery At the Speed of AI: Inflectra Invests In AI-Powered QualitySoftware Delivery At the Speed of AI: Inflectra Invests In AI-Powered Quality
Software Delivery At the Speed of AI: Inflectra Invests In AI-Powered QualityInflectra
 
Future Visions: Predictions to Guide and Time Tech Innovation, Peter Udo Diehl
Future Visions: Predictions to Guide and Time Tech Innovation, Peter Udo DiehlFuture Visions: Predictions to Guide and Time Tech Innovation, Peter Udo Diehl
Future Visions: Predictions to Guide and Time Tech Innovation, Peter Udo DiehlPeter Udo Diehl
 
Mission to Decommission: Importance of Decommissioning Products to Increase E...
Mission to Decommission: Importance of Decommissioning Products to Increase E...Mission to Decommission: Importance of Decommissioning Products to Increase E...
Mission to Decommission: Importance of Decommissioning Products to Increase E...Product School
 
From Siloed Products to Connected Ecosystem: Building a Sustainable and Scala...
From Siloed Products to Connected Ecosystem: Building a Sustainable and Scala...From Siloed Products to Connected Ecosystem: Building a Sustainable and Scala...
From Siloed Products to Connected Ecosystem: Building a Sustainable and Scala...Product School
 
Slack (or Teams) Automation for Bonterra Impact Management (fka Social Soluti...
Slack (or Teams) Automation for Bonterra Impact Management (fka Social Soluti...Slack (or Teams) Automation for Bonterra Impact Management (fka Social Soluti...
Slack (or Teams) Automation for Bonterra Impact Management (fka Social Soluti...Jeffrey Haguewood
 
Assuring Contact Center Experiences for Your Customers With ThousandEyes
Assuring Contact Center Experiences for Your Customers With ThousandEyesAssuring Contact Center Experiences for Your Customers With ThousandEyes
Assuring Contact Center Experiences for Your Customers With ThousandEyesThousandEyes
 
Measures in SQL (a talk at SF Distributed Systems meetup, 2024-05-22)
Measures in SQL (a talk at SF Distributed Systems meetup, 2024-05-22)Measures in SQL (a talk at SF Distributed Systems meetup, 2024-05-22)
Measures in SQL (a talk at SF Distributed Systems meetup, 2024-05-22)Julian Hyde
 
UiPath Test Automation using UiPath Test Suite series, part 3
UiPath Test Automation using UiPath Test Suite series, part 3UiPath Test Automation using UiPath Test Suite series, part 3
UiPath Test Automation using UiPath Test Suite series, part 3DianaGray10
 
IESVE for Early Stage Design and Planning
IESVE for Early Stage Design and PlanningIESVE for Early Stage Design and Planning
IESVE for Early Stage Design and PlanningIES VE
 
In-Depth Performance Testing Guide for IT Professionals
In-Depth Performance Testing Guide for IT ProfessionalsIn-Depth Performance Testing Guide for IT Professionals
In-Depth Performance Testing Guide for IT ProfessionalsExpeed Software
 
When stars align: studies in data quality, knowledge graphs, and machine lear...
When stars align: studies in data quality, knowledge graphs, and machine lear...When stars align: studies in data quality, knowledge graphs, and machine lear...
When stars align: studies in data quality, knowledge graphs, and machine lear...Elena Simperl
 
Introduction to Open Source RAG and RAG Evaluation
Introduction to Open Source RAG and RAG EvaluationIntroduction to Open Source RAG and RAG Evaluation
Introduction to Open Source RAG and RAG EvaluationZilliz
 
AI for Every Business: Unlocking Your Product's Universal Potential by VP of ...
AI for Every Business: Unlocking Your Product's Universal Potential by VP of ...AI for Every Business: Unlocking Your Product's Universal Potential by VP of ...
AI for Every Business: Unlocking Your Product's Universal Potential by VP of ...Product School
 
How world-class product teams are winning in the AI era by CEO and Founder, P...
How world-class product teams are winning in the AI era by CEO and Founder, P...How world-class product teams are winning in the AI era by CEO and Founder, P...
How world-class product teams are winning in the AI era by CEO and Founder, P...Product School
 
IOS-PENTESTING-BEGINNERS-PRACTICAL-GUIDE-.pptx
IOS-PENTESTING-BEGINNERS-PRACTICAL-GUIDE-.pptxIOS-PENTESTING-BEGINNERS-PRACTICAL-GUIDE-.pptx
IOS-PENTESTING-BEGINNERS-PRACTICAL-GUIDE-.pptxAbida Shariff
 
IoT Analytics Company Presentation May 2024
IoT Analytics Company Presentation May 2024IoT Analytics Company Presentation May 2024
IoT Analytics Company Presentation May 2024IoTAnalytics
 
Knowledge engineering: from people to machines and back
Knowledge engineering: from people to machines and backKnowledge engineering: from people to machines and back
Knowledge engineering: from people to machines and backElena Simperl
 
Key Trends Shaping the Future of Infrastructure.pdf
Key Trends Shaping the Future of Infrastructure.pdfKey Trends Shaping the Future of Infrastructure.pdf
Key Trends Shaping the Future of Infrastructure.pdfCheryl Hung
 
Powerful Start- the Key to Project Success, Barbara Laskowska
Powerful Start- the Key to Project Success, Barbara LaskowskaPowerful Start- the Key to Project Success, Barbara Laskowska
Powerful Start- the Key to Project Success, Barbara LaskowskaCzechDreamin
 

Recently uploaded (20)

Behind the Scenes From the Manager's Chair: Decoding the Secrets of Successfu...
Behind the Scenes From the Manager's Chair: Decoding the Secrets of Successfu...Behind the Scenes From the Manager's Chair: Decoding the Secrets of Successfu...
Behind the Scenes From the Manager's Chair: Decoding the Secrets of Successfu...
 
Software Delivery At the Speed of AI: Inflectra Invests In AI-Powered Quality
Software Delivery At the Speed of AI: Inflectra Invests In AI-Powered QualitySoftware Delivery At the Speed of AI: Inflectra Invests In AI-Powered Quality
Software Delivery At the Speed of AI: Inflectra Invests In AI-Powered Quality
 
Future Visions: Predictions to Guide and Time Tech Innovation, Peter Udo Diehl
Future Visions: Predictions to Guide and Time Tech Innovation, Peter Udo DiehlFuture Visions: Predictions to Guide and Time Tech Innovation, Peter Udo Diehl
Future Visions: Predictions to Guide and Time Tech Innovation, Peter Udo Diehl
 
Mission to Decommission: Importance of Decommissioning Products to Increase E...
Mission to Decommission: Importance of Decommissioning Products to Increase E...Mission to Decommission: Importance of Decommissioning Products to Increase E...
Mission to Decommission: Importance of Decommissioning Products to Increase E...
 
From Siloed Products to Connected Ecosystem: Building a Sustainable and Scala...
From Siloed Products to Connected Ecosystem: Building a Sustainable and Scala...From Siloed Products to Connected Ecosystem: Building a Sustainable and Scala...
From Siloed Products to Connected Ecosystem: Building a Sustainable and Scala...
 
Slack (or Teams) Automation for Bonterra Impact Management (fka Social Soluti...
Slack (or Teams) Automation for Bonterra Impact Management (fka Social Soluti...Slack (or Teams) Automation for Bonterra Impact Management (fka Social Soluti...
Slack (or Teams) Automation for Bonterra Impact Management (fka Social Soluti...
 
Assuring Contact Center Experiences for Your Customers With ThousandEyes
Assuring Contact Center Experiences for Your Customers With ThousandEyesAssuring Contact Center Experiences for Your Customers With ThousandEyes
Assuring Contact Center Experiences for Your Customers With ThousandEyes
 
Measures in SQL (a talk at SF Distributed Systems meetup, 2024-05-22)
Measures in SQL (a talk at SF Distributed Systems meetup, 2024-05-22)Measures in SQL (a talk at SF Distributed Systems meetup, 2024-05-22)
Measures in SQL (a talk at SF Distributed Systems meetup, 2024-05-22)
 
UiPath Test Automation using UiPath Test Suite series, part 3
UiPath Test Automation using UiPath Test Suite series, part 3UiPath Test Automation using UiPath Test Suite series, part 3
UiPath Test Automation using UiPath Test Suite series, part 3
 
IESVE for Early Stage Design and Planning
IESVE for Early Stage Design and PlanningIESVE for Early Stage Design and Planning
IESVE for Early Stage Design and Planning
 
In-Depth Performance Testing Guide for IT Professionals
In-Depth Performance Testing Guide for IT ProfessionalsIn-Depth Performance Testing Guide for IT Professionals
In-Depth Performance Testing Guide for IT Professionals
 
When stars align: studies in data quality, knowledge graphs, and machine lear...
When stars align: studies in data quality, knowledge graphs, and machine lear...When stars align: studies in data quality, knowledge graphs, and machine lear...
When stars align: studies in data quality, knowledge graphs, and machine lear...
 
Introduction to Open Source RAG and RAG Evaluation
Introduction to Open Source RAG and RAG EvaluationIntroduction to Open Source RAG and RAG Evaluation
Introduction to Open Source RAG and RAG Evaluation
 
AI for Every Business: Unlocking Your Product's Universal Potential by VP of ...
AI for Every Business: Unlocking Your Product's Universal Potential by VP of ...AI for Every Business: Unlocking Your Product's Universal Potential by VP of ...
AI for Every Business: Unlocking Your Product's Universal Potential by VP of ...
 
How world-class product teams are winning in the AI era by CEO and Founder, P...
How world-class product teams are winning in the AI era by CEO and Founder, P...How world-class product teams are winning in the AI era by CEO and Founder, P...
How world-class product teams are winning in the AI era by CEO and Founder, P...
 
IOS-PENTESTING-BEGINNERS-PRACTICAL-GUIDE-.pptx
IOS-PENTESTING-BEGINNERS-PRACTICAL-GUIDE-.pptxIOS-PENTESTING-BEGINNERS-PRACTICAL-GUIDE-.pptx
IOS-PENTESTING-BEGINNERS-PRACTICAL-GUIDE-.pptx
 
IoT Analytics Company Presentation May 2024
IoT Analytics Company Presentation May 2024IoT Analytics Company Presentation May 2024
IoT Analytics Company Presentation May 2024
 
Knowledge engineering: from people to machines and back
Knowledge engineering: from people to machines and backKnowledge engineering: from people to machines and back
Knowledge engineering: from people to machines and back
 
Key Trends Shaping the Future of Infrastructure.pdf
Key Trends Shaping the Future of Infrastructure.pdfKey Trends Shaping the Future of Infrastructure.pdf
Key Trends Shaping the Future of Infrastructure.pdf
 
Powerful Start- the Key to Project Success, Barbara Laskowska
Powerful Start- the Key to Project Success, Barbara LaskowskaPowerful Start- the Key to Project Success, Barbara Laskowska
Powerful Start- the Key to Project Success, Barbara Laskowska
 

How Secure is Cloud

  • 1. HOW SECURE IS CLOUD? 1
  • 2. WHAT IS CLOUD Cloud computing is a general term for the delivery of hosted services over the Internet 2
  • 3. 3
  • 4. Common Cloud Services • Microsoft OneDrive, Office Online • Google Drive • Apple icloud • Amazon Cloud Services • Dropbox • Mega 4
  • 5. Cloud Hardware Google Chrome: Web browser into an operating system. ChromeBits: a smaller-than-a-candy-bar drivesthat turn any display with an HDMI port into a usable computer running Chrome OS. 5
  • 6. The Security and Control Problems Unknown Data Location  Unauthorized Activity  Storage  Protection 6
  • 7. The Security and Control Problems (Cont’d) Vulnerability Unfulfilled requirements  Availability of the service Lack of Liability 7
  • 8. Factors contribute to Security problems Lack of Security Management Ability Weakness in Quality Maintenance Unprotected and Backdated Use of Software andTechnology 8
  • 9. How Secure is today’s cloud computing Cloud computing is considered as one of the secure platform to perform the online activity if the correct vendor is selected. 9
  • 10. The Risks and Recent Security Breaching Issues in Cloud Computing: Key loss or Data Encrypted Data integrity Data and Power Loss Denial of Service (DOS) 10
  • 11. The Risks and Recent Security Breaching Issues in Cloud Computing General Server Risks Service and Account Hijacking PRISM Scandal 11
  • 12. The Existing Security Functions of Cloud Computing More Clear andTransparent Possible Defense More Expensive Security 12
  • 13. The issues want to clarify with prospective vendors Types of Company. (Public or Private) Encryption Data Center Storage Minimum Security Requirements 13
  • 14. Opinion for Entrust corporate systems to a cloud computing provider • Should be 100% Secure • Able to Detect Unauthorized Access or Misuses (eg. Cracking) • Less Expensive but Better Service 14
  • 15. Conclusion • The blackings of the cloud computing is figured out. • Positive measures to protect the cloud storage are implementing • Smart IT companies are giving most priority of the security today. • Problems will be resolved soon by the new entrepreneurs • Cloud will be the safest home for the future data’s. 15
  • 16. Recommendation • It is better to chose public company • User should be concerned about the storage policy and the place • The user should be confirmed about the access in the cloud by verify the login. 16
  • 17. 17

Editor's Notes

  1. Drew Huston, founder and CEO of Dropbox, has been given the title of Internet entrepreneur for his achievements in his field. The creation story of the company, Huston claims, was based upon an idea that came to him after having had to deal with constantly forgetting his USB flash drive during his studies at MIT. While he was a student he found an abundance of problems with already existing storage services and set out to solve this problem for himself before realizing that his solution could benefit others as well. In 2007, he and his co-founder Arash Ferdowsi were able to secure funding to begin the development of the program, and by 2008 they were ready to launch. Dropbox had an enormous success rate, and, after officially being introduced at TechCrunch50, broke records gaining 50 million users in just under three years. By the end of 2013 Dropbox had gained over 200 million users.
  2. Common Cloud Examples  The lines between local computing and cloud computing sometimes get very, very blurry. That's because the cloud is part of almost everything on our computers these days. You can easily have a local piece of software (for instance, Microsoft Office 365) that utilizes a form of cloud computing for storage (Microsoft OneDrive). That said, Microsoft also offers a set of Web apps, now called Office Online, that are online-only versions of Word, Excel, PowerPoint, and OneNote accessed via your Web browser without installing anything. That makes them a version of cloud computing (Web-based=cloud). Some other major examples of cloud computing you're probably using: Google Drive: This is a pure cloud computing service, with all the storage found online so it can work with the cloud apps: Google Docs, Google Sheets, and Google Slides. Drive is also available on more than just desktop computers; you can use it on tablets like the iPad$228.00 at Gazelle Store or on smartphones, and there are separate apps for Docs and Sheets, as well. In fact, most of Google's services could be considered cloud computing: Gmail, Google Calendar, Google Maps, and so on. Apple iCloud: Apple's cloud service is primarily used for online storage, backup, and synchronization of your mail, contacts, calendar, and more. All the data you need is available to you on your iOS, Mac OS, or Windows device (Windows users have to install the iCloud control panel). Naturally, Apple won't be outdone by rivals: it offers cloud-based versions of its word processor (Pages), spreadsheet (Numbers), and presentations (Keynote) for use by any iCloud subscriber. iCloud is also the place iPhone users go to utilze the Find My iPhone feature that's all important when the phone goes missing. Amazon Cloud Drive: Storage at the big retailer is mainly for music, preferably MP3s that you purchase from Amazon, and images—if you have Amazon Prime, you get unlimited image storage. The Cloud Drive also holds anything you buy for the Kindle. It's essentially storage for anything digital you'd buy from Amazon, baked into all its products and services. Hybrid services like Box, Dropbox, and SugarSync all say they work in the cloud because they store a synced version of your files online, but most also sync those files with local storage. Synchronization to allow all your devices to access the same data is a cornerstone of the cloud computing experience, even if you do access the file locally. Likewise, it's considered cloud computing if you have a community of people with separate devices that need the same data synched, be it for work collaboration projects or just to keep the family in sync. For more, check out the The Best Cloud Storage Services for 2015.
  3. Google Chrome Web browser into an operating system. With a Chromebook, most everything you do is online: apps, media, and storage are all in the cloud.  ChromeBits, smaller-than-a-candy-bar drives (pictured) that turn any display with an HDMI port into a usable computer running Chrome OS. Of course, you may be wondering what happens if you're somewhere without a connection and you need to access your data. This is currently one of the biggest complaints about Chrome OS, although its offline functionality is expanding. The Chromebook isn't the first product to try this approach. So-called "dumb-terminals" that lack local storage and connect to a local server or mainframe go back decades. The first Internet-only product attempts included the old NIC (New Internet Computer), the Netpliance iOpener, and the disastrous 3Com Audrey. You could argue they all debuted well before their time—dial-up speeds of the 1990s had training wheels compared to the accelerated broadband Internet connections of today. That's why many would argue that cloud computing works at all: the connection to the Internet is as fast as the connection to the hard drive. Or is it?
  4. Management: They should to some test on their updates whether these update are working or not. No further testing is done these updates making them unable to detect problems on their updates. Organizations quality department: The problem is the sign that this department are not working properly. Their main task is to ensure the entire company products are high in quality or at least in a shape. Technology: They should keep the technology used up to date. New viruses always had undergone evolution in order to become undetectable and more harmful.
  5. Cloud computing is considered as one of the secure platform to perform the online activity if the correct vendor is selected. Although there are some limitation and the security weakness has been identified in last few years but the technology experts are predicting that it is going to be a most reliable platform in the future.
  6. General Server Risks: Denial of Service (DoS) Being of the latter is obviously always an issue for servers Service and Account Hijacking: At this point in its development, the cloud is seriously at risk for service and account hijacking PRISM Scandal: In June 2013 Edward Snowden revealed that the National Security Agency (NSA) has been collecting enormous amounts of communication and search data from internet companies such as Microsoft, Yahoo, Google
  7. More Clear and Transparent: The cloud provider’s facility, their rules and regulations, the safety issues are clearer than previous. So it is become a matter of trust for the users. Possible Defense: Cloud security alliance (CSA) is used to prevent organizations to disallow users and services from sharing account credentials between themselves. So it is now more reliable. More Expensive Security: Although one of the objective of the cloud computing is to provide the services at cheaper price so that user are more encouraged to use the cloud but the vendors identified that with cheap security system there are some possibility of data theft so they built more expensive security system because sometime data are more valuable than vendors profit
  8. I would want to know if they were a public company, what kind of encrypt software is being used, can I choose the center were my data would be stored, and if they meet current compliance requirement. Issues of privacy would be the main topic to consider. Any and all date being stored on the cloud is sensitive and should be well take care of. Additionally, overall security of the information should be provided. I would want to know how they plan on providing the utmost security and also locations of their servers. Having the servers based in the United States would be more appealing than having them based outside of the nation.
  9. If my company data storage needs were so huge and it was clear that using this service provided large economical savings and provided as good if not better security protection than was already in place, then yes I would use the service. However if the company data was highly sensitive (like the federal government top secret Intel then I would not be apt to use this service. I believe there will never be a %100 secure information system as long as people are alive. Evil exist and people possess it and are driven by it for self-serving needs and will always figure out ways to crack any system to do damage. I would only entrust my corporate systems to a cloud computing provider if the company data was not highly sensitive. There can never be a 100% secure cloud computing service regardless of the encryption software used. If my corporate had a huge need for data storage and cloud computing service meant large economical savings, then I would go for it.