SlideShare a Scribd company logo
INFORMATION SECURITY
 WELCOME TO THE GROUP PRESENTATION
1
Topic Name and details
Mitigations to ensure the confidentiality, integrity and
availability of the data stored on these providers? Discuss
mitigations for both the cloud providers and also the end
users.
 Vaishal Shah(30129756)
 Kawalpreet Kaur(30116373)
 Vidit Darji(30309034)
 Gagandeep Kaur(30129485)
2
Introduction of Cloud Providers
 It is a firm which delivers cloud computing that relies
on services and solution to individuals and business. It
is also known as utility computing provider.
 Based on the business model. There are many
solutions
 Infrastructure as a Service(IAAS)
 Software as service(SAAS)
 Platform as service(PAAS)
3
What is Confidentiality, integrity,
availability
 is also known as CIA triad
 structure made to guide policies for information
security within an organization.
 Are considered to be crucial elements components of
society.
4
Confidentiality, integrity,
availability
 Confidentiality is a set of rules or procedures that
restricts the boundary to use or access to information.
 Integrity is the assurance that the information
gathered is trustworthy and reliable.
 Availability is a guarantee of accurate access to the
information by authorized people.
5
Dropbox, Google docs
 Dropbox is a cloud storage service, sometimes
referred to as an online backup service, that is
frequently used for file sharing and collaboration. It is
increasingly being used in enterprises.
 This service is as a warehouse used by government
organizations, banks, post offices, video stores and
libraries to allow people to drop items.
6
Diagrammatical representation of
Dropbox, Google Drive
7
Figures about Dropbox, Google
Drive
8
Problems or Issues related to ensure Confidentiality,
Availability, Integrity by cloud providers
 Malicious behaviour of insiders.
 Incomplete or insecure data completion.
 Management interface vulnerability.
9
Issues contd.
 Loss of Governance.
 Isolation of failure.
 Compliance and legal risks.
10
Mitigations to ensure confidentiality, integrity and
availability of cloud providers
 The cloud is still new so
the push for effective
controls over the
protection of information
in the cloud is also
nascent. But every
problem comes with a
solution so there are
fewer security solutions
for the cloud providers
than there are for securing
physical devices in a
traditional infrastructure.
 CIA Triad
11
Confidentiality
 Data encryption
 User IDs and passwords
 Biometric verification and security tokens, key fobs
and soft tokens.
 Data confidentiality may involve special training for
those privy to such documents
 Storing Information only on air gapped computers,
disconnected storage devices or, for highly sensitive
information, in hard copy form only
12
Integrity
 Maintaining consistency, accuracy and trustworthiness
 Ensuring data from unauthorized access
 EMP(electromagnetic pulse) or server crash.
 Some data might include checksums,
even cryptographic checksums for verification of
integrity.
 Back ups or redundancies must be available to restore
the affected data to its correct state.
13
Availability
 Maintaining all hardware, performing hardware
repairs
 Providing adequate communication bandwidth
 Preventing occurrence of bottlenecks
 Back up copy must be stored in a geographically
isolated location
 Use of firewalls and proxy servers
 Fast and adaptive disaster recovery
14
Mitigations Cont..
 Cloud Access Security Brokers(CASBs) : Niche
market has been trying to reduce the severity of
information shared on cloud providers so this market
came up with Cloud Access Security
Brokers(CASBs) defined as a strategy to mitigate this
problem.
 Context Awareness also allows the CASB providers to
employ heuristic analysis on Cloud bound traffic, to do
some form of anomaly detection to identify malicious
or erroneous traffic. This is an area that they are all
investing heavily in today.
15
Problems for cloud providers
 Data integrity
 Data theft
 Privacy issue
 Data loss
 Data location
16
Data integrity
 User can access the data from any where
 Lack of data integrity in cloud
Data Theft
 Cost affective and flexible for operation
 High possibility of data stolen from other user
17
Privacy issue
 Make sure that customer’s private information secure
 Keep watching who is access the data
Data Loss
 Due to financial problem when vendor closes,
customer will loss data
 Customer can not be able to access the data because
vendor shut down
18
Data location
 Anyone don’t know the location of data
 Vendor not reveal the location of data
19
Mitigation of cloud providers
 Identify the assets
 Analyze the risk
 Apple security countermeasure
 Conduct post-run
20
Problems faced by users of cloud
services
 Privacy
 Security
 Data breaches
 Data protection
21
Mitigations for users of cloud services
• Privileged user Access
• Regulatory Compliance
• Data Location
22
Mitigations Cont..
• Data Segregation
• Recovery
• Investigative support/Search ability
• Long-term viability
23
References
 https://www.techopedia.com/definition/133/cloud-provider
 http://www.cloud-
council.org/Security_for_Cloud_Computing-
Final_080912.pdf
 https://www.google.com.au/search?q=image+of+dropbox,+go
ogle+docs
 http://www.slideshare.net/pcalcada/apresentao-cm-1524115
 http://www.cloudcouncil.org/Security_for_Cloud_Computing
-Final_080912.pdf
 http://whatis.techtarget.com/definition/Confidentiality-
integrity-and-availability-CIA
24
ANY QUESTIONS
??????
25
THANK YOU
26

More Related Content

What's hot

Enterprise Risk Analysis PowerPoint Presentation Slides
Enterprise Risk Analysis PowerPoint Presentation SlidesEnterprise Risk Analysis PowerPoint Presentation Slides
Enterprise Risk Analysis PowerPoint Presentation Slides
SlideTeam
 
Data Protection: Transformation Ahead
Data Protection: Transformation AheadData Protection: Transformation Ahead
Data Protection: Transformation Ahead
NetApp Australia & New Zealand
 
DataOps @ Scale: A Modern Framework for Data Management in the Public Sector
DataOps @ Scale: A Modern Framework for Data Management in the Public SectorDataOps @ Scale: A Modern Framework for Data Management in the Public Sector
DataOps @ Scale: A Modern Framework for Data Management in the Public Sector
TamrMarketing
 
Partner Experience Overview- East Region
Partner Experience Overview- East RegionPartner Experience Overview- East Region
Partner Experience Overview- East Region
RapidScale
 
Cloud Computing Stats - Security and Recovery
Cloud Computing Stats - Security and RecoveryCloud Computing Stats - Security and Recovery
Cloud Computing Stats - Security and Recovery
RapidScale
 
In Cloud We Trust
In Cloud We TrustIn Cloud We Trust
In Cloud We Trust
RapidScale
 

What's hot (6)

Enterprise Risk Analysis PowerPoint Presentation Slides
Enterprise Risk Analysis PowerPoint Presentation SlidesEnterprise Risk Analysis PowerPoint Presentation Slides
Enterprise Risk Analysis PowerPoint Presentation Slides
 
Data Protection: Transformation Ahead
Data Protection: Transformation AheadData Protection: Transformation Ahead
Data Protection: Transformation Ahead
 
DataOps @ Scale: A Modern Framework for Data Management in the Public Sector
DataOps @ Scale: A Modern Framework for Data Management in the Public SectorDataOps @ Scale: A Modern Framework for Data Management in the Public Sector
DataOps @ Scale: A Modern Framework for Data Management in the Public Sector
 
Partner Experience Overview- East Region
Partner Experience Overview- East RegionPartner Experience Overview- East Region
Partner Experience Overview- East Region
 
Cloud Computing Stats - Security and Recovery
Cloud Computing Stats - Security and RecoveryCloud Computing Stats - Security and Recovery
Cloud Computing Stats - Security and Recovery
 
In Cloud We Trust
In Cloud We TrustIn Cloud We Trust
In Cloud We Trust
 

Similar to Information security group presentation

Information security group presentation ppt
Information security group presentation   pptInformation security group presentation   ppt
Information security group presentation ppt
vaishalshah01
 
Practical advice for cloud data protection ulf mattsson - oracle nyoug sep ...
Practical advice for cloud data protection   ulf mattsson - oracle nyoug sep ...Practical advice for cloud data protection   ulf mattsson - oracle nyoug sep ...
Practical advice for cloud data protection ulf mattsson - oracle nyoug sep ...
Ulf Mattsson
 
A proposed Solution: Data Availability and Error Correction in Cloud Computing
A proposed Solution: Data Availability and Error Correction in Cloud ComputingA proposed Solution: Data Availability and Error Correction in Cloud Computing
A proposed Solution: Data Availability and Error Correction in Cloud Computing
CSCJournals
 
Cloud Auditing With Zero Knowledge Privacy
Cloud Auditing With Zero Knowledge PrivacyCloud Auditing With Zero Knowledge Privacy
Cloud Auditing With Zero Knowledge Privacy
IJERA Editor
 
Cloud data governance, risk management and compliance ny metro joint cyber...
Cloud data governance, risk management and compliance    ny metro joint cyber...Cloud data governance, risk management and compliance    ny metro joint cyber...
Cloud data governance, risk management and compliance ny metro joint cyber...
Ulf Mattsson
 
Turtles, Trust and The Future of Cybersecurity
Turtles, Trust and The Future of Cybersecurity Turtles, Trust and The Future of Cybersecurity
Turtles, Trust and The Future of Cybersecurity
Digital Transformation EXPO Event Series
 
A Survey on Different Techniques Used in Decentralized Cloud Computing
A Survey on Different Techniques Used in Decentralized Cloud ComputingA Survey on Different Techniques Used in Decentralized Cloud Computing
A Survey on Different Techniques Used in Decentralized Cloud Computing
Editor IJCATR
 
Altourage presents: Cloud Security
Altourage presents: Cloud SecurityAltourage presents: Cloud Security
Altourage presents: Cloud Security
Altourage
 
Data Privacy And Security Issues In Cloud Computing.pdf
Data Privacy And Security Issues In Cloud Computing.pdfData Privacy And Security Issues In Cloud Computing.pdf
Data Privacy And Security Issues In Cloud Computing.pdf
Ciente
 
Module 5-cloud computing-SECURITY IN THE CLOUD
Module 5-cloud computing-SECURITY IN THE CLOUDModule 5-cloud computing-SECURITY IN THE CLOUD
Module 5-cloud computing-SECURITY IN THE CLOUD
Sweta Kumari Barnwal
 
Data security in the cloud
Data security in the cloud Data security in the cloud
Data security in the cloud
IBM Security
 
Research Report on Preserving Data Confidentiality & Data Integrity in ...
Research Report on Preserving  Data  Confidentiality  &  Data  Integrity  in ...Research Report on Preserving  Data  Confidentiality  &  Data  Integrity  in ...
Research Report on Preserving Data Confidentiality & Data Integrity in ...
Manish Sahani
 
Encryption Technique for a Trusted Cloud Computing Environment
Encryption Technique for a Trusted Cloud Computing EnvironmentEncryption Technique for a Trusted Cloud Computing Environment
Encryption Technique for a Trusted Cloud Computing Environment
IOSR Journals
 
Encryption Technique for a Trusted Cloud Computing Environment
Encryption Technique for a Trusted Cloud Computing EnvironmentEncryption Technique for a Trusted Cloud Computing Environment
Encryption Technique for a Trusted Cloud Computing Environment
IOSR Journals
 
H017155360
H017155360H017155360
H017155360
IOSR Journals
 
Encryption Technique for a Trusted Cloud Computing Environment
Encryption Technique for a Trusted Cloud Computing EnvironmentEncryption Technique for a Trusted Cloud Computing Environment
Encryption Technique for a Trusted Cloud Computing Environment
IOSR Journals
 
Security and privacy in cloud computing.pptx
Security and privacy in cloud computing.pptxSecurity and privacy in cloud computing.pptx
Security and privacy in cloud computing.pptx
TRSrinidi
 
Securing sensitive data for the health care industry
Securing sensitive data for the health care industrySecuring sensitive data for the health care industry
Securing sensitive data for the health care industry
CloudMask inc.
 
Top 3 Hot Data Security And Privacy Technologies
Top 3 Hot Data Security And Privacy TechnologiesTop 3 Hot Data Security And Privacy Technologies
Top 3 Hot Data Security And Privacy Technologies
Tyrone Systems
 
SECURING THE CLOUD DATA LAKES
SECURING THE CLOUD DATA LAKESSECURING THE CLOUD DATA LAKES
SECURING THE CLOUD DATA LAKES
Happiest Minds Technologies
 

Similar to Information security group presentation (20)

Information security group presentation ppt
Information security group presentation   pptInformation security group presentation   ppt
Information security group presentation ppt
 
Practical advice for cloud data protection ulf mattsson - oracle nyoug sep ...
Practical advice for cloud data protection   ulf mattsson - oracle nyoug sep ...Practical advice for cloud data protection   ulf mattsson - oracle nyoug sep ...
Practical advice for cloud data protection ulf mattsson - oracle nyoug sep ...
 
A proposed Solution: Data Availability and Error Correction in Cloud Computing
A proposed Solution: Data Availability and Error Correction in Cloud ComputingA proposed Solution: Data Availability and Error Correction in Cloud Computing
A proposed Solution: Data Availability and Error Correction in Cloud Computing
 
Cloud Auditing With Zero Knowledge Privacy
Cloud Auditing With Zero Knowledge PrivacyCloud Auditing With Zero Knowledge Privacy
Cloud Auditing With Zero Knowledge Privacy
 
Cloud data governance, risk management and compliance ny metro joint cyber...
Cloud data governance, risk management and compliance    ny metro joint cyber...Cloud data governance, risk management and compliance    ny metro joint cyber...
Cloud data governance, risk management and compliance ny metro joint cyber...
 
Turtles, Trust and The Future of Cybersecurity
Turtles, Trust and The Future of Cybersecurity Turtles, Trust and The Future of Cybersecurity
Turtles, Trust and The Future of Cybersecurity
 
A Survey on Different Techniques Used in Decentralized Cloud Computing
A Survey on Different Techniques Used in Decentralized Cloud ComputingA Survey on Different Techniques Used in Decentralized Cloud Computing
A Survey on Different Techniques Used in Decentralized Cloud Computing
 
Altourage presents: Cloud Security
Altourage presents: Cloud SecurityAltourage presents: Cloud Security
Altourage presents: Cloud Security
 
Data Privacy And Security Issues In Cloud Computing.pdf
Data Privacy And Security Issues In Cloud Computing.pdfData Privacy And Security Issues In Cloud Computing.pdf
Data Privacy And Security Issues In Cloud Computing.pdf
 
Module 5-cloud computing-SECURITY IN THE CLOUD
Module 5-cloud computing-SECURITY IN THE CLOUDModule 5-cloud computing-SECURITY IN THE CLOUD
Module 5-cloud computing-SECURITY IN THE CLOUD
 
Data security in the cloud
Data security in the cloud Data security in the cloud
Data security in the cloud
 
Research Report on Preserving Data Confidentiality & Data Integrity in ...
Research Report on Preserving  Data  Confidentiality  &  Data  Integrity  in ...Research Report on Preserving  Data  Confidentiality  &  Data  Integrity  in ...
Research Report on Preserving Data Confidentiality & Data Integrity in ...
 
Encryption Technique for a Trusted Cloud Computing Environment
Encryption Technique for a Trusted Cloud Computing EnvironmentEncryption Technique for a Trusted Cloud Computing Environment
Encryption Technique for a Trusted Cloud Computing Environment
 
Encryption Technique for a Trusted Cloud Computing Environment
Encryption Technique for a Trusted Cloud Computing EnvironmentEncryption Technique for a Trusted Cloud Computing Environment
Encryption Technique for a Trusted Cloud Computing Environment
 
H017155360
H017155360H017155360
H017155360
 
Encryption Technique for a Trusted Cloud Computing Environment
Encryption Technique for a Trusted Cloud Computing EnvironmentEncryption Technique for a Trusted Cloud Computing Environment
Encryption Technique for a Trusted Cloud Computing Environment
 
Security and privacy in cloud computing.pptx
Security and privacy in cloud computing.pptxSecurity and privacy in cloud computing.pptx
Security and privacy in cloud computing.pptx
 
Securing sensitive data for the health care industry
Securing sensitive data for the health care industrySecuring sensitive data for the health care industry
Securing sensitive data for the health care industry
 
Top 3 Hot Data Security And Privacy Technologies
Top 3 Hot Data Security And Privacy TechnologiesTop 3 Hot Data Security And Privacy Technologies
Top 3 Hot Data Security And Privacy Technologies
 
SECURING THE CLOUD DATA LAKES
SECURING THE CLOUD DATA LAKESSECURING THE CLOUD DATA LAKES
SECURING THE CLOUD DATA LAKES
 

More from vaishalshah01

Cloud computing ppt
Cloud computing pptCloud computing ppt
Cloud computing ppt
vaishalshah01
 
Cloud computing ppt
Cloud computing pptCloud computing ppt
Cloud computing ppt
vaishalshah01
 
Cloud computing ppt
Cloud computing pptCloud computing ppt
Cloud computing ppt
vaishalshah01
 
Cloud computing ppt
Cloud computing pptCloud computing ppt
Cloud computing ppt
vaishalshah01
 
Cloud computing report
Cloud computing reportCloud computing report
Cloud computing report
vaishalshah01
 

More from vaishalshah01 (8)

Healthcare industry
Healthcare industryHealthcare industry
Healthcare industry
 
Supi ppt
Supi pptSupi ppt
Supi ppt
 
Cloud computing ppt
Cloud computing pptCloud computing ppt
Cloud computing ppt
 
Cloud computing ppt
Cloud computing pptCloud computing ppt
Cloud computing ppt
 
Cloud computing ppt
Cloud computing pptCloud computing ppt
Cloud computing ppt
 
Cloud computing ppt
Cloud computing pptCloud computing ppt
Cloud computing ppt
 
Cloud computing ppt
Cloud computing pptCloud computing ppt
Cloud computing ppt
 
Cloud computing report
Cloud computing reportCloud computing report
Cloud computing report
 

Recently uploaded

Sectors of the Indian Economy - Class 10 Study Notes pdf
Sectors of the Indian Economy - Class 10 Study Notes pdfSectors of the Indian Economy - Class 10 Study Notes pdf
Sectors of the Indian Economy - Class 10 Study Notes pdf
Vivekanand Anglo Vedic Academy
 
The geography of Taylor Swift - some ideas
The geography of Taylor Swift - some ideasThe geography of Taylor Swift - some ideas
The geography of Taylor Swift - some ideas
GeoBlogs
 
Students, digital devices and success - Andreas Schleicher - 27 May 2024..pptx
Students, digital devices and success - Andreas Schleicher - 27 May 2024..pptxStudents, digital devices and success - Andreas Schleicher - 27 May 2024..pptx
Students, digital devices and success - Andreas Schleicher - 27 May 2024..pptx
EduSkills OECD
 
Basic phrases for greeting and assisting costumers
Basic phrases for greeting and assisting costumersBasic phrases for greeting and assisting costumers
Basic phrases for greeting and assisting costumers
PedroFerreira53928
 
special B.ed 2nd year old paper_20240531.pdf
special B.ed 2nd year old paper_20240531.pdfspecial B.ed 2nd year old paper_20240531.pdf
special B.ed 2nd year old paper_20240531.pdf
Special education needs
 
The Roman Empire A Historical Colossus.pdf
The Roman Empire A Historical Colossus.pdfThe Roman Empire A Historical Colossus.pdf
The Roman Empire A Historical Colossus.pdf
kaushalkr1407
 
Polish students' mobility in the Czech Republic
Polish students' mobility in the Czech RepublicPolish students' mobility in the Czech Republic
Polish students' mobility in the Czech Republic
Anna Sz.
 
Sha'Carri Richardson Presentation 202345
Sha'Carri Richardson Presentation 202345Sha'Carri Richardson Presentation 202345
Sha'Carri Richardson Presentation 202345
beazzy04
 
Chapter 3 - Islamic Banking Products and Services.pptx
Chapter 3 - Islamic Banking Products and Services.pptxChapter 3 - Islamic Banking Products and Services.pptx
Chapter 3 - Islamic Banking Products and Services.pptx
Mohd Adib Abd Muin, Senior Lecturer at Universiti Utara Malaysia
 
How to Split Bills in the Odoo 17 POS Module
How to Split Bills in the Odoo 17 POS ModuleHow to Split Bills in the Odoo 17 POS Module
How to Split Bills in the Odoo 17 POS Module
Celine George
 
The Challenger.pdf DNHS Official Publication
The Challenger.pdf DNHS Official PublicationThe Challenger.pdf DNHS Official Publication
The Challenger.pdf DNHS Official Publication
Delapenabediema
 
aaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaa
aaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaa
aaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaa
siemaillard
 
Digital Tools and AI for Teaching Learning and Research
Digital Tools and AI for Teaching Learning and ResearchDigital Tools and AI for Teaching Learning and Research
Digital Tools and AI for Teaching Learning and Research
Vikramjit Singh
 
TESDA TM1 REVIEWER FOR NATIONAL ASSESSMENT WRITTEN AND ORAL QUESTIONS WITH A...
TESDA TM1 REVIEWER  FOR NATIONAL ASSESSMENT WRITTEN AND ORAL QUESTIONS WITH A...TESDA TM1 REVIEWER  FOR NATIONAL ASSESSMENT WRITTEN AND ORAL QUESTIONS WITH A...
TESDA TM1 REVIEWER FOR NATIONAL ASSESSMENT WRITTEN AND ORAL QUESTIONS WITH A...
EugeneSaldivar
 
aaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaa
aaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaa
aaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaa
siemaillard
 
How to Break the cycle of negative Thoughts
How to Break the cycle of negative ThoughtsHow to Break the cycle of negative Thoughts
How to Break the cycle of negative Thoughts
Col Mukteshwar Prasad
 
MARUTI SUZUKI- A Successful Joint Venture in India.pptx
MARUTI SUZUKI- A Successful Joint Venture in India.pptxMARUTI SUZUKI- A Successful Joint Venture in India.pptx
MARUTI SUZUKI- A Successful Joint Venture in India.pptx
bennyroshan06
 
Synthetic Fiber Construction in lab .pptx
Synthetic Fiber Construction in lab .pptxSynthetic Fiber Construction in lab .pptx
Synthetic Fiber Construction in lab .pptx
Pavel ( NSTU)
 
2024.06.01 Introducing a competency framework for languag learning materials ...
2024.06.01 Introducing a competency framework for languag learning materials ...2024.06.01 Introducing a competency framework for languag learning materials ...
2024.06.01 Introducing a competency framework for languag learning materials ...
Sandy Millin
 
Phrasal Verbs.XXXXXXXXXXXXXXXXXXXXXXXXXX
Phrasal Verbs.XXXXXXXXXXXXXXXXXXXXXXXXXXPhrasal Verbs.XXXXXXXXXXXXXXXXXXXXXXXXXX
Phrasal Verbs.XXXXXXXXXXXXXXXXXXXXXXXXXX
MIRIAMSALINAS13
 

Recently uploaded (20)

Sectors of the Indian Economy - Class 10 Study Notes pdf
Sectors of the Indian Economy - Class 10 Study Notes pdfSectors of the Indian Economy - Class 10 Study Notes pdf
Sectors of the Indian Economy - Class 10 Study Notes pdf
 
The geography of Taylor Swift - some ideas
The geography of Taylor Swift - some ideasThe geography of Taylor Swift - some ideas
The geography of Taylor Swift - some ideas
 
Students, digital devices and success - Andreas Schleicher - 27 May 2024..pptx
Students, digital devices and success - Andreas Schleicher - 27 May 2024..pptxStudents, digital devices and success - Andreas Schleicher - 27 May 2024..pptx
Students, digital devices and success - Andreas Schleicher - 27 May 2024..pptx
 
Basic phrases for greeting and assisting costumers
Basic phrases for greeting and assisting costumersBasic phrases for greeting and assisting costumers
Basic phrases for greeting and assisting costumers
 
special B.ed 2nd year old paper_20240531.pdf
special B.ed 2nd year old paper_20240531.pdfspecial B.ed 2nd year old paper_20240531.pdf
special B.ed 2nd year old paper_20240531.pdf
 
The Roman Empire A Historical Colossus.pdf
The Roman Empire A Historical Colossus.pdfThe Roman Empire A Historical Colossus.pdf
The Roman Empire A Historical Colossus.pdf
 
Polish students' mobility in the Czech Republic
Polish students' mobility in the Czech RepublicPolish students' mobility in the Czech Republic
Polish students' mobility in the Czech Republic
 
Sha'Carri Richardson Presentation 202345
Sha'Carri Richardson Presentation 202345Sha'Carri Richardson Presentation 202345
Sha'Carri Richardson Presentation 202345
 
Chapter 3 - Islamic Banking Products and Services.pptx
Chapter 3 - Islamic Banking Products and Services.pptxChapter 3 - Islamic Banking Products and Services.pptx
Chapter 3 - Islamic Banking Products and Services.pptx
 
How to Split Bills in the Odoo 17 POS Module
How to Split Bills in the Odoo 17 POS ModuleHow to Split Bills in the Odoo 17 POS Module
How to Split Bills in the Odoo 17 POS Module
 
The Challenger.pdf DNHS Official Publication
The Challenger.pdf DNHS Official PublicationThe Challenger.pdf DNHS Official Publication
The Challenger.pdf DNHS Official Publication
 
aaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaa
aaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaa
aaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaa
 
Digital Tools and AI for Teaching Learning and Research
Digital Tools and AI for Teaching Learning and ResearchDigital Tools and AI for Teaching Learning and Research
Digital Tools and AI for Teaching Learning and Research
 
TESDA TM1 REVIEWER FOR NATIONAL ASSESSMENT WRITTEN AND ORAL QUESTIONS WITH A...
TESDA TM1 REVIEWER  FOR NATIONAL ASSESSMENT WRITTEN AND ORAL QUESTIONS WITH A...TESDA TM1 REVIEWER  FOR NATIONAL ASSESSMENT WRITTEN AND ORAL QUESTIONS WITH A...
TESDA TM1 REVIEWER FOR NATIONAL ASSESSMENT WRITTEN AND ORAL QUESTIONS WITH A...
 
aaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaa
aaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaa
aaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaa
 
How to Break the cycle of negative Thoughts
How to Break the cycle of negative ThoughtsHow to Break the cycle of negative Thoughts
How to Break the cycle of negative Thoughts
 
MARUTI SUZUKI- A Successful Joint Venture in India.pptx
MARUTI SUZUKI- A Successful Joint Venture in India.pptxMARUTI SUZUKI- A Successful Joint Venture in India.pptx
MARUTI SUZUKI- A Successful Joint Venture in India.pptx
 
Synthetic Fiber Construction in lab .pptx
Synthetic Fiber Construction in lab .pptxSynthetic Fiber Construction in lab .pptx
Synthetic Fiber Construction in lab .pptx
 
2024.06.01 Introducing a competency framework for languag learning materials ...
2024.06.01 Introducing a competency framework for languag learning materials ...2024.06.01 Introducing a competency framework for languag learning materials ...
2024.06.01 Introducing a competency framework for languag learning materials ...
 
Phrasal Verbs.XXXXXXXXXXXXXXXXXXXXXXXXXX
Phrasal Verbs.XXXXXXXXXXXXXXXXXXXXXXXXXXPhrasal Verbs.XXXXXXXXXXXXXXXXXXXXXXXXXX
Phrasal Verbs.XXXXXXXXXXXXXXXXXXXXXXXXXX
 

Information security group presentation

  • 1. INFORMATION SECURITY  WELCOME TO THE GROUP PRESENTATION 1
  • 2. Topic Name and details Mitigations to ensure the confidentiality, integrity and availability of the data stored on these providers? Discuss mitigations for both the cloud providers and also the end users.  Vaishal Shah(30129756)  Kawalpreet Kaur(30116373)  Vidit Darji(30309034)  Gagandeep Kaur(30129485) 2
  • 3. Introduction of Cloud Providers  It is a firm which delivers cloud computing that relies on services and solution to individuals and business. It is also known as utility computing provider.  Based on the business model. There are many solutions  Infrastructure as a Service(IAAS)  Software as service(SAAS)  Platform as service(PAAS) 3
  • 4. What is Confidentiality, integrity, availability  is also known as CIA triad  structure made to guide policies for information security within an organization.  Are considered to be crucial elements components of society. 4
  • 5. Confidentiality, integrity, availability  Confidentiality is a set of rules or procedures that restricts the boundary to use or access to information.  Integrity is the assurance that the information gathered is trustworthy and reliable.  Availability is a guarantee of accurate access to the information by authorized people. 5
  • 6. Dropbox, Google docs  Dropbox is a cloud storage service, sometimes referred to as an online backup service, that is frequently used for file sharing and collaboration. It is increasingly being used in enterprises.  This service is as a warehouse used by government organizations, banks, post offices, video stores and libraries to allow people to drop items. 6
  • 8. Figures about Dropbox, Google Drive 8
  • 9. Problems or Issues related to ensure Confidentiality, Availability, Integrity by cloud providers  Malicious behaviour of insiders.  Incomplete or insecure data completion.  Management interface vulnerability. 9
  • 10. Issues contd.  Loss of Governance.  Isolation of failure.  Compliance and legal risks. 10
  • 11. Mitigations to ensure confidentiality, integrity and availability of cloud providers  The cloud is still new so the push for effective controls over the protection of information in the cloud is also nascent. But every problem comes with a solution so there are fewer security solutions for the cloud providers than there are for securing physical devices in a traditional infrastructure.  CIA Triad 11
  • 12. Confidentiality  Data encryption  User IDs and passwords  Biometric verification and security tokens, key fobs and soft tokens.  Data confidentiality may involve special training for those privy to such documents  Storing Information only on air gapped computers, disconnected storage devices or, for highly sensitive information, in hard copy form only 12
  • 13. Integrity  Maintaining consistency, accuracy and trustworthiness  Ensuring data from unauthorized access  EMP(electromagnetic pulse) or server crash.  Some data might include checksums, even cryptographic checksums for verification of integrity.  Back ups or redundancies must be available to restore the affected data to its correct state. 13
  • 14. Availability  Maintaining all hardware, performing hardware repairs  Providing adequate communication bandwidth  Preventing occurrence of bottlenecks  Back up copy must be stored in a geographically isolated location  Use of firewalls and proxy servers  Fast and adaptive disaster recovery 14
  • 15. Mitigations Cont..  Cloud Access Security Brokers(CASBs) : Niche market has been trying to reduce the severity of information shared on cloud providers so this market came up with Cloud Access Security Brokers(CASBs) defined as a strategy to mitigate this problem.  Context Awareness also allows the CASB providers to employ heuristic analysis on Cloud bound traffic, to do some form of anomaly detection to identify malicious or erroneous traffic. This is an area that they are all investing heavily in today. 15
  • 16. Problems for cloud providers  Data integrity  Data theft  Privacy issue  Data loss  Data location 16
  • 17. Data integrity  User can access the data from any where  Lack of data integrity in cloud Data Theft  Cost affective and flexible for operation  High possibility of data stolen from other user 17
  • 18. Privacy issue  Make sure that customer’s private information secure  Keep watching who is access the data Data Loss  Due to financial problem when vendor closes, customer will loss data  Customer can not be able to access the data because vendor shut down 18
  • 19. Data location  Anyone don’t know the location of data  Vendor not reveal the location of data 19
  • 20. Mitigation of cloud providers  Identify the assets  Analyze the risk  Apple security countermeasure  Conduct post-run 20
  • 21. Problems faced by users of cloud services  Privacy  Security  Data breaches  Data protection 21
  • 22. Mitigations for users of cloud services • Privileged user Access • Regulatory Compliance • Data Location 22
  • 23. Mitigations Cont.. • Data Segregation • Recovery • Investigative support/Search ability • Long-term viability 23
  • 24. References  https://www.techopedia.com/definition/133/cloud-provider  http://www.cloud- council.org/Security_for_Cloud_Computing- Final_080912.pdf  https://www.google.com.au/search?q=image+of+dropbox,+go ogle+docs  http://www.slideshare.net/pcalcada/apresentao-cm-1524115  http://www.cloudcouncil.org/Security_for_Cloud_Computing -Final_080912.pdf  http://whatis.techtarget.com/definition/Confidentiality- integrity-and-availability-CIA 24

Editor's Notes

  1. CASBs are either on-premise, or cloud-based (or both) security policy enforcement points. Placed between your end users and the various cloud service providers, they can inspect traffic, manage and enforce policy, alert on anomalous behavior, and in most cases provide some level of DLP enforcement. These Cloud Access Security Brokers can identify individuals' access into Cloud Service Providers that are affiliated with the broker. Currently these number in the  hundreds if not thousands. For “Sanctioned” Cloud Applications (those services for which your enterprise has procured directly) end user access can be strictly enforced by context: Who you are (Role based access) Where you are coming from (corporate network, public Internet, Wi-Fi, geographic region) What device you are using (Corporate laptop, Home PC, Tablet or phone) What time of day you're working (Are you authorized to work during this time?)