SlideShare a Scribd company logo
CLOUD
COMPUTING
Lecture
Dr. Alshaimaa Abo-alian
a_alian@cis.asu.edu.eg
Lecture Outline
■ Overview
■ Main Security Factors
Overview
■ Cloud is a target-rich environment for malicious individuals and
criminal organizations.
■ Outsourcing to a cloud generates new security and privacy
concerns.
■ Many issues related to privacy, security, and trust in cloud
computing are far from being settled.
■ Service Level Agreements (SLAs) do not provide adequate legal
protection for cloud computer users
 Remote data security refers to the protection process for the
outsourced data from malicious access or modifications by
unauthorized users.
Main Security Factors
■ Confidentiality, integrity and availability (CIA) are the main
security factors
■ Confidentiality means ensuring that only authorized users
with the appropriate privileges can access the data.
■ Remote data integrity is ensuring the completeness, accuracy
and consistency of the outsourced data.
■ Availability refers to ensuring that the stored data/service is
always available to be delivered to the users.
What is Privacy?
■ Assuring that users control what information related to them
may be collected and stored and by whom and to whom that
information may be disclosed.
Major Cloud User’s Security
Concerns
■ Multi-tenancy (The shared infrastructure) is the root cause of
many user concerns
■ Users no longer physically possess the storage of their data
 The unauthorized access to confidential information and the
data theft
 A dishonest CSP may sell the confidential information to the
competitors
 the CSP might reclaim storage for monetary reasons by
discarding data that has not been or is rarely accessed or even
hide data loss incidents to maintain a reputation
Major Cloud User’s Security
Concerns
■ The user control over the lifecycle of data: It is virtually
impossible for a user to determine if data that should have
been deleted was actually deleted or the next user can recover
confidential data
■ Lack of standardization: there are no inter-operability
standards.What can be done when service provided by the
CSP is interrupted?
■ The legal framework for enforcing cloud security:The data
centers of a CSP may be located in several countries and it is
unclear what laws apply, the laws of the country where
information is stored and processed, the laws of the countries
the information crossed when sent by the user, or the laws of
the user’s country.
Cloud Security Risks
There are three broad classes:
1. Traditional security threats,
2. Threats related to system availability
3. Threats related to third-party data control.
Traditional SecurityThreats
■ Impact amplified due to:
– The vast amount of cloud resources
– The large user population that can be affected.
– The fuzzy bounds of responsibility between the providers of
cloud services and users
– The difficulties to accurately identify the cause.
■ The traditional threats begin at the user site.
 The user must protect the infrastructure used to connect to the
cloud
 This task is more difficult because some components of this
infrastructure are outside the firewall protecting the user.
Traditional SecurityThreats
■ Authentication and authorization:
– User authentication is the process of verifying the
identity of a user.
– Authorization: Granting access to specific
services and/or resources based on the
authentication.
– Different individuals should be assigned distinct
levels of privilege based on their role in the
organization.
– It is also nontrivial to merge or adapt the internal
policies and security metrics of an organization
with the ones of the cloud.
Traditional SecurityThreats
Most common attacks
■ Distributed Denial of Service (DDoS): prevents
legitimate users to access cloud services
■ SQL injection: An SQL command entered in a web form
causes the contents of a database used by the web site to
be either dumped to the attacker or altered
■ Cross-site scripting: permits the attacker to insert client-
scripts into the web pages and thus, bypass the access
controls at the web site.
■ Phishing aims to gain information from a database by
masquerading as a trustworthy entity. Such information
could be SSN and credit card numbers.
New Cloud SecurityThreats
■ Cloud servers host multipleVMs
■ Multiple applications may run under eachVM.
■ Multi-tenancy and vm vulnerabilities open new attack
channels for malicious users.
■ Identifying the path followed by an attacker is more
difficult in a cloud environment
Availability of cloud services
■ System failures, power outages, and other catastrophic
events could shutdown services for extended periods of
time.
■ Data lock-in and lack of interoperability could prevent a
large organization whose business model depends on
these data to function properly,
Third-party control
■ It generates a spectrum of concerns caused by the lack of
transparency and limited user control.
■ For example, a cloud provider may subcontract some
resources from a third party whose level of trust is
questionable.
Top threats to cloud computing
■ Identified by a 2016 Cloud Security Alliance (CSA) report
1. Data breaches.
2. Compromised credentials and broken authentication.
3. Hacked interfaces and APIs.
4. Exploited system vulnerabilities.
5. Account hijacking
6. Malicious insiders
7. advanced persistent threats (APTs)
8. permanent data loss
9. inadequate diligence,
10. cloud service abuse,
11. DoS attacks
Top threats to cloud
computing
■ Identified by a 2022 Cloud SecurityAlliance (CSA) report
1. Insufficient identity, credential, access and key management (#4)
2. Insecure interfaces and APIs (#7)
3. Misconfiguration and inadequate change control (#2)
4. Lack of cloud security architecture and strategy (#3)
5. Insecure software development
6. Unsecure third-party resources
7. System vulnerabilities
8. Accidental cloud data disclosure/disclosure
9. Misconfiguration and exploitation of serverless and container
workloads
10. Organized crime/hackers/APT
11. Cloud storage data exfiltration
Legal protection of cloud users
The contract between the user and the Cloud Service
Provider (CSP) should spell out explicitly:
■ CSP obligations to handle securely sensitive information
and its obligation to comply to privacy laws.
■ CSP liabilities for mishandling sensitive information.
■ CSP liabilities for data loss.
■ The rules governing ownership of the data.
■ The geographical regions where information and backups
can be stored.

More Related Content

Similar to Lecture Cloud Security.pptx

The Top Cloud Security Issues
The Top Cloud Security IssuesThe Top Cloud Security Issues
The Top Cloud Security Issues
HTS Hosting
 
chapitre1-cloud security basics-23 (1).pptx
chapitre1-cloud security basics-23 (1).pptxchapitre1-cloud security basics-23 (1).pptx
chapitre1-cloud security basics-23 (1).pptx
GhofraneFerchichi2
 
Proposed Model for Enhancing Data Storage Security in Cloud Computing Systems
Proposed Model for Enhancing Data Storage Security in Cloud Computing SystemsProposed Model for Enhancing Data Storage Security in Cloud Computing Systems
Proposed Model for Enhancing Data Storage Security in Cloud Computing Systems
Hossam Al-Ansary
 
ICRTITCS-2012 Conference Publication
ICRTITCS-2012 Conference PublicationICRTITCS-2012 Conference Publication
ICRTITCS-2012 Conference Publication
Tejaswi Agarwal
 
Network security
Network securityNetwork security
Cloud security
Cloud securityCloud security
Cloud security
Niharika Varshney
 
FOGCOMPUTING
FOGCOMPUTINGFOGCOMPUTING
FOGCOMPUTING
Anvesh Kolluri
 
Week-09-10-11-12 Fundamentals of Cybersecurity.pptx
Week-09-10-11-12 Fundamentals of Cybersecurity.pptxWeek-09-10-11-12 Fundamentals of Cybersecurity.pptx
Week-09-10-11-12 Fundamentals of Cybersecurity.pptx
yasirkhokhar7
 
attack vectors by chimwemwe.pptx
attack vectors  by chimwemwe.pptxattack vectors  by chimwemwe.pptx
attack vectors by chimwemwe.pptx
JenetSilence
 
CLOUD COMPUTING.pdf
CLOUD COMPUTING.pdfCLOUD COMPUTING.pdf
CLOUD COMPUTING.pdf
Protelion
 
CLOUD COMPUTING.pdf
CLOUD COMPUTING.pdfCLOUD COMPUTING.pdf
CLOUD COMPUTING.pdf
Protelion
 
Cloud Computing Security
Cloud Computing SecurityCloud Computing Security
Cloud Computing Security
Nithin Raj
 
Cloud Security Challenges, Types, and Best Practises.pdf
Cloud Security Challenges, Types, and Best Practises.pdfCloud Security Challenges, Types, and Best Practises.pdf
Cloud Security Challenges, Types, and Best Practises.pdf
manoharparakh
 
Cloud Security and their classifications
Cloud Security and their classificationsCloud Security and their classifications
Cloud Security and their classifications
KENNEDYDONATO1
 
Practical Security for the Cloud
Practical Security for the CloudPractical Security for the Cloud
Practical Security for the Cloud
Chirag Joshi, CISA, CISM, CRISC
 
International journal of computer science and innovation vol 2015-n2-paper4
International journal of computer science and innovation  vol 2015-n2-paper4International journal of computer science and innovation  vol 2015-n2-paper4
International journal of computer science and innovation vol 2015-n2-paper4
sophiabelthome
 
12-cloud-security.ppt
12-cloud-security.ppt12-cloud-security.ppt
12-cloud-security.ppt
chelsi33
 
Cloud computing
Cloud computingCloud computing
Cloud computing
Ganesh Pasnurwar
 
Guide to security patterns for cloud systems and data security in aws and azure
Guide to security patterns for cloud systems and data security in aws and azureGuide to security patterns for cloud systems and data security in aws and azure
Guide to security patterns for cloud systems and data security in aws and azure
Abdul Khan
 
SEMINAR ON CYBER SECURITY.pptx
SEMINAR ON CYBER SECURITY.pptxSEMINAR ON CYBER SECURITY.pptx
SEMINAR ON CYBER SECURITY.pptx
GauravWankar2
 

Similar to Lecture Cloud Security.pptx (20)

The Top Cloud Security Issues
The Top Cloud Security IssuesThe Top Cloud Security Issues
The Top Cloud Security Issues
 
chapitre1-cloud security basics-23 (1).pptx
chapitre1-cloud security basics-23 (1).pptxchapitre1-cloud security basics-23 (1).pptx
chapitre1-cloud security basics-23 (1).pptx
 
Proposed Model for Enhancing Data Storage Security in Cloud Computing Systems
Proposed Model for Enhancing Data Storage Security in Cloud Computing SystemsProposed Model for Enhancing Data Storage Security in Cloud Computing Systems
Proposed Model for Enhancing Data Storage Security in Cloud Computing Systems
 
ICRTITCS-2012 Conference Publication
ICRTITCS-2012 Conference PublicationICRTITCS-2012 Conference Publication
ICRTITCS-2012 Conference Publication
 
Network security
Network securityNetwork security
Network security
 
Cloud security
Cloud securityCloud security
Cloud security
 
FOGCOMPUTING
FOGCOMPUTINGFOGCOMPUTING
FOGCOMPUTING
 
Week-09-10-11-12 Fundamentals of Cybersecurity.pptx
Week-09-10-11-12 Fundamentals of Cybersecurity.pptxWeek-09-10-11-12 Fundamentals of Cybersecurity.pptx
Week-09-10-11-12 Fundamentals of Cybersecurity.pptx
 
attack vectors by chimwemwe.pptx
attack vectors  by chimwemwe.pptxattack vectors  by chimwemwe.pptx
attack vectors by chimwemwe.pptx
 
CLOUD COMPUTING.pdf
CLOUD COMPUTING.pdfCLOUD COMPUTING.pdf
CLOUD COMPUTING.pdf
 
CLOUD COMPUTING.pdf
CLOUD COMPUTING.pdfCLOUD COMPUTING.pdf
CLOUD COMPUTING.pdf
 
Cloud Computing Security
Cloud Computing SecurityCloud Computing Security
Cloud Computing Security
 
Cloud Security Challenges, Types, and Best Practises.pdf
Cloud Security Challenges, Types, and Best Practises.pdfCloud Security Challenges, Types, and Best Practises.pdf
Cloud Security Challenges, Types, and Best Practises.pdf
 
Cloud Security and their classifications
Cloud Security and their classificationsCloud Security and their classifications
Cloud Security and their classifications
 
Practical Security for the Cloud
Practical Security for the CloudPractical Security for the Cloud
Practical Security for the Cloud
 
International journal of computer science and innovation vol 2015-n2-paper4
International journal of computer science and innovation  vol 2015-n2-paper4International journal of computer science and innovation  vol 2015-n2-paper4
International journal of computer science and innovation vol 2015-n2-paper4
 
12-cloud-security.ppt
12-cloud-security.ppt12-cloud-security.ppt
12-cloud-security.ppt
 
Cloud computing
Cloud computingCloud computing
Cloud computing
 
Guide to security patterns for cloud systems and data security in aws and azure
Guide to security patterns for cloud systems and data security in aws and azureGuide to security patterns for cloud systems and data security in aws and azure
Guide to security patterns for cloud systems and data security in aws and azure
 
SEMINAR ON CYBER SECURITY.pptx
SEMINAR ON CYBER SECURITY.pptxSEMINAR ON CYBER SECURITY.pptx
SEMINAR ON CYBER SECURITY.pptx
 

More from ShimoFcis

Motif Finding.pdf
Motif Finding.pdfMotif Finding.pdf
Motif Finding.pdf
ShimoFcis
 
05_SQA_Overview.ppt
05_SQA_Overview.ppt05_SQA_Overview.ppt
05_SQA_Overview.ppt
ShimoFcis
 
Topic21 Elect. Codebook, Cipher Block Chaining.pptx
Topic21 Elect. Codebook, Cipher Block Chaining.pptxTopic21 Elect. Codebook, Cipher Block Chaining.pptx
Topic21 Elect. Codebook, Cipher Block Chaining.pptx
ShimoFcis
 
4-DES.pdf
4-DES.pdf4-DES.pdf
4-DES.pdf
ShimoFcis
 
lab-8 (1).pptx
lab-8 (1).pptxlab-8 (1).pptx
lab-8 (1).pptx
ShimoFcis
 
Lab-11-C-Problems.pptx
Lab-11-C-Problems.pptxLab-11-C-Problems.pptx
Lab-11-C-Problems.pptx
ShimoFcis
 
Mid-Term Problem Solving Part.pptx
Mid-Term Problem Solving Part.pptxMid-Term Problem Solving Part.pptx
Mid-Term Problem Solving Part.pptx
ShimoFcis
 
Lecture 6.pptx
Lecture 6.pptxLecture 6.pptx
Lecture 6.pptx
ShimoFcis
 
mapreduce.pptx
mapreduce.pptxmapreduce.pptx
mapreduce.pptx
ShimoFcis
 
storage-systems.pptx
storage-systems.pptxstorage-systems.pptx
storage-systems.pptx
ShimoFcis
 
mapreduce-advanced.pptx
mapreduce-advanced.pptxmapreduce-advanced.pptx
mapreduce-advanced.pptx
ShimoFcis
 

More from ShimoFcis (11)

Motif Finding.pdf
Motif Finding.pdfMotif Finding.pdf
Motif Finding.pdf
 
05_SQA_Overview.ppt
05_SQA_Overview.ppt05_SQA_Overview.ppt
05_SQA_Overview.ppt
 
Topic21 Elect. Codebook, Cipher Block Chaining.pptx
Topic21 Elect. Codebook, Cipher Block Chaining.pptxTopic21 Elect. Codebook, Cipher Block Chaining.pptx
Topic21 Elect. Codebook, Cipher Block Chaining.pptx
 
4-DES.pdf
4-DES.pdf4-DES.pdf
4-DES.pdf
 
lab-8 (1).pptx
lab-8 (1).pptxlab-8 (1).pptx
lab-8 (1).pptx
 
Lab-11-C-Problems.pptx
Lab-11-C-Problems.pptxLab-11-C-Problems.pptx
Lab-11-C-Problems.pptx
 
Mid-Term Problem Solving Part.pptx
Mid-Term Problem Solving Part.pptxMid-Term Problem Solving Part.pptx
Mid-Term Problem Solving Part.pptx
 
Lecture 6.pptx
Lecture 6.pptxLecture 6.pptx
Lecture 6.pptx
 
mapreduce.pptx
mapreduce.pptxmapreduce.pptx
mapreduce.pptx
 
storage-systems.pptx
storage-systems.pptxstorage-systems.pptx
storage-systems.pptx
 
mapreduce-advanced.pptx
mapreduce-advanced.pptxmapreduce-advanced.pptx
mapreduce-advanced.pptx
 

Recently uploaded

一比一原版(爱大毕业证书)爱丁堡大学毕业证如何办理
一比一原版(爱大毕业证书)爱丁堡大学毕业证如何办理一比一原版(爱大毕业证书)爱丁堡大学毕业证如何办理
一比一原版(爱大毕业证书)爱丁堡大学毕业证如何办理
g4dpvqap0
 
Natural Language Processing (NLP), RAG and its applications .pptx
Natural Language Processing (NLP), RAG and its applications .pptxNatural Language Processing (NLP), RAG and its applications .pptx
Natural Language Processing (NLP), RAG and its applications .pptx
fkyes25
 
University of New South Wales degree offer diploma Transcript
University of New South Wales degree offer diploma TranscriptUniversity of New South Wales degree offer diploma Transcript
University of New South Wales degree offer diploma Transcript
soxrziqu
 
STATATHON: Unleashing the Power of Statistics in a 48-Hour Knowledge Extravag...
STATATHON: Unleashing the Power of Statistics in a 48-Hour Knowledge Extravag...STATATHON: Unleashing the Power of Statistics in a 48-Hour Knowledge Extravag...
STATATHON: Unleashing the Power of Statistics in a 48-Hour Knowledge Extravag...
sameer shah
 
End-to-end pipeline agility - Berlin Buzzwords 2024
End-to-end pipeline agility - Berlin Buzzwords 2024End-to-end pipeline agility - Berlin Buzzwords 2024
End-to-end pipeline agility - Berlin Buzzwords 2024
Lars Albertsson
 
4th Modern Marketing Reckoner by MMA Global India & Group M: 60+ experts on W...
4th Modern Marketing Reckoner by MMA Global India & Group M: 60+ experts on W...4th Modern Marketing Reckoner by MMA Global India & Group M: 60+ experts on W...
4th Modern Marketing Reckoner by MMA Global India & Group M: 60+ experts on W...
Social Samosa
 
一比一原版(Glasgow毕业证书)格拉斯哥大学毕业证如何办理
一比一原版(Glasgow毕业证书)格拉斯哥大学毕业证如何办理一比一原版(Glasgow毕业证书)格拉斯哥大学毕业证如何办理
一比一原版(Glasgow毕业证书)格拉斯哥大学毕业证如何办理
g4dpvqap0
 
State of Artificial intelligence Report 2023
State of Artificial intelligence Report 2023State of Artificial intelligence Report 2023
State of Artificial intelligence Report 2023
kuntobimo2016
 
The Building Blocks of QuestDB, a Time Series Database
The Building Blocks of QuestDB, a Time Series DatabaseThe Building Blocks of QuestDB, a Time Series Database
The Building Blocks of QuestDB, a Time Series Database
javier ramirez
 
06-04-2024 - NYC Tech Week - Discussion on Vector Databases, Unstructured Dat...
06-04-2024 - NYC Tech Week - Discussion on Vector Databases, Unstructured Dat...06-04-2024 - NYC Tech Week - Discussion on Vector Databases, Unstructured Dat...
06-04-2024 - NYC Tech Week - Discussion on Vector Databases, Unstructured Dat...
Timothy Spann
 
一比一原版(Adelaide毕业证书)阿德莱德大学毕业证如何办理
一比一原版(Adelaide毕业证书)阿德莱德大学毕业证如何办理一比一原版(Adelaide毕业证书)阿德莱德大学毕业证如何办理
一比一原版(Adelaide毕业证书)阿德莱德大学毕业证如何办理
slg6lamcq
 
Enhanced Enterprise Intelligence with your personal AI Data Copilot.pdf
Enhanced Enterprise Intelligence with your personal AI Data Copilot.pdfEnhanced Enterprise Intelligence with your personal AI Data Copilot.pdf
Enhanced Enterprise Intelligence with your personal AI Data Copilot.pdf
GetInData
 
一比一原版(牛布毕业证书)牛津布鲁克斯大学毕业证如何办理
一比一原版(牛布毕业证书)牛津布鲁克斯大学毕业证如何办理一比一原版(牛布毕业证书)牛津布鲁克斯大学毕业证如何办理
一比一原版(牛布毕业证书)牛津布鲁克斯大学毕业证如何办理
74nqk8xf
 
原版制作(swinburne毕业证书)斯威本科技大学毕业证毕业完成信一模一样
原版制作(swinburne毕业证书)斯威本科技大学毕业证毕业完成信一模一样原版制作(swinburne毕业证书)斯威本科技大学毕业证毕业完成信一模一样
原版制作(swinburne毕业证书)斯威本科技大学毕业证毕业完成信一模一样
u86oixdj
 
一比一原版(UCSF文凭证书)旧金山分校毕业证如何办理
一比一原版(UCSF文凭证书)旧金山分校毕业证如何办理一比一原版(UCSF文凭证书)旧金山分校毕业证如何办理
一比一原版(UCSF文凭证书)旧金山分校毕业证如何办理
nuttdpt
 
一比一原版(Chester毕业证书)切斯特大学毕业证如何办理
一比一原版(Chester毕业证书)切斯特大学毕业证如何办理一比一原版(Chester毕业证书)切斯特大学毕业证如何办理
一比一原版(Chester毕业证书)切斯特大学毕业证如何办理
74nqk8xf
 
一比一原版(Dalhousie毕业证书)达尔豪斯大学毕业证如何办理
一比一原版(Dalhousie毕业证书)达尔豪斯大学毕业证如何办理一比一原版(Dalhousie毕业证书)达尔豪斯大学毕业证如何办理
一比一原版(Dalhousie毕业证书)达尔豪斯大学毕业证如何办理
mzpolocfi
 
一比一原版(Coventry毕业证书)考文垂大学毕业证如何办理
一比一原版(Coventry毕业证书)考文垂大学毕业证如何办理一比一原版(Coventry毕业证书)考文垂大学毕业证如何办理
一比一原版(Coventry毕业证书)考文垂大学毕业证如何办理
74nqk8xf
 
一比一原版(CBU毕业证)卡普顿大学毕业证如何办理
一比一原版(CBU毕业证)卡普顿大学毕业证如何办理一比一原版(CBU毕业证)卡普顿大学毕业证如何办理
一比一原版(CBU毕业证)卡普顿大学毕业证如何办理
ahzuo
 
Analysis insight about a Flyball dog competition team's performance
Analysis insight about a Flyball dog competition team's performanceAnalysis insight about a Flyball dog competition team's performance
Analysis insight about a Flyball dog competition team's performance
roli9797
 

Recently uploaded (20)

一比一原版(爱大毕业证书)爱丁堡大学毕业证如何办理
一比一原版(爱大毕业证书)爱丁堡大学毕业证如何办理一比一原版(爱大毕业证书)爱丁堡大学毕业证如何办理
一比一原版(爱大毕业证书)爱丁堡大学毕业证如何办理
 
Natural Language Processing (NLP), RAG and its applications .pptx
Natural Language Processing (NLP), RAG and its applications .pptxNatural Language Processing (NLP), RAG and its applications .pptx
Natural Language Processing (NLP), RAG and its applications .pptx
 
University of New South Wales degree offer diploma Transcript
University of New South Wales degree offer diploma TranscriptUniversity of New South Wales degree offer diploma Transcript
University of New South Wales degree offer diploma Transcript
 
STATATHON: Unleashing the Power of Statistics in a 48-Hour Knowledge Extravag...
STATATHON: Unleashing the Power of Statistics in a 48-Hour Knowledge Extravag...STATATHON: Unleashing the Power of Statistics in a 48-Hour Knowledge Extravag...
STATATHON: Unleashing the Power of Statistics in a 48-Hour Knowledge Extravag...
 
End-to-end pipeline agility - Berlin Buzzwords 2024
End-to-end pipeline agility - Berlin Buzzwords 2024End-to-end pipeline agility - Berlin Buzzwords 2024
End-to-end pipeline agility - Berlin Buzzwords 2024
 
4th Modern Marketing Reckoner by MMA Global India & Group M: 60+ experts on W...
4th Modern Marketing Reckoner by MMA Global India & Group M: 60+ experts on W...4th Modern Marketing Reckoner by MMA Global India & Group M: 60+ experts on W...
4th Modern Marketing Reckoner by MMA Global India & Group M: 60+ experts on W...
 
一比一原版(Glasgow毕业证书)格拉斯哥大学毕业证如何办理
一比一原版(Glasgow毕业证书)格拉斯哥大学毕业证如何办理一比一原版(Glasgow毕业证书)格拉斯哥大学毕业证如何办理
一比一原版(Glasgow毕业证书)格拉斯哥大学毕业证如何办理
 
State of Artificial intelligence Report 2023
State of Artificial intelligence Report 2023State of Artificial intelligence Report 2023
State of Artificial intelligence Report 2023
 
The Building Blocks of QuestDB, a Time Series Database
The Building Blocks of QuestDB, a Time Series DatabaseThe Building Blocks of QuestDB, a Time Series Database
The Building Blocks of QuestDB, a Time Series Database
 
06-04-2024 - NYC Tech Week - Discussion on Vector Databases, Unstructured Dat...
06-04-2024 - NYC Tech Week - Discussion on Vector Databases, Unstructured Dat...06-04-2024 - NYC Tech Week - Discussion on Vector Databases, Unstructured Dat...
06-04-2024 - NYC Tech Week - Discussion on Vector Databases, Unstructured Dat...
 
一比一原版(Adelaide毕业证书)阿德莱德大学毕业证如何办理
一比一原版(Adelaide毕业证书)阿德莱德大学毕业证如何办理一比一原版(Adelaide毕业证书)阿德莱德大学毕业证如何办理
一比一原版(Adelaide毕业证书)阿德莱德大学毕业证如何办理
 
Enhanced Enterprise Intelligence with your personal AI Data Copilot.pdf
Enhanced Enterprise Intelligence with your personal AI Data Copilot.pdfEnhanced Enterprise Intelligence with your personal AI Data Copilot.pdf
Enhanced Enterprise Intelligence with your personal AI Data Copilot.pdf
 
一比一原版(牛布毕业证书)牛津布鲁克斯大学毕业证如何办理
一比一原版(牛布毕业证书)牛津布鲁克斯大学毕业证如何办理一比一原版(牛布毕业证书)牛津布鲁克斯大学毕业证如何办理
一比一原版(牛布毕业证书)牛津布鲁克斯大学毕业证如何办理
 
原版制作(swinburne毕业证书)斯威本科技大学毕业证毕业完成信一模一样
原版制作(swinburne毕业证书)斯威本科技大学毕业证毕业完成信一模一样原版制作(swinburne毕业证书)斯威本科技大学毕业证毕业完成信一模一样
原版制作(swinburne毕业证书)斯威本科技大学毕业证毕业完成信一模一样
 
一比一原版(UCSF文凭证书)旧金山分校毕业证如何办理
一比一原版(UCSF文凭证书)旧金山分校毕业证如何办理一比一原版(UCSF文凭证书)旧金山分校毕业证如何办理
一比一原版(UCSF文凭证书)旧金山分校毕业证如何办理
 
一比一原版(Chester毕业证书)切斯特大学毕业证如何办理
一比一原版(Chester毕业证书)切斯特大学毕业证如何办理一比一原版(Chester毕业证书)切斯特大学毕业证如何办理
一比一原版(Chester毕业证书)切斯特大学毕业证如何办理
 
一比一原版(Dalhousie毕业证书)达尔豪斯大学毕业证如何办理
一比一原版(Dalhousie毕业证书)达尔豪斯大学毕业证如何办理一比一原版(Dalhousie毕业证书)达尔豪斯大学毕业证如何办理
一比一原版(Dalhousie毕业证书)达尔豪斯大学毕业证如何办理
 
一比一原版(Coventry毕业证书)考文垂大学毕业证如何办理
一比一原版(Coventry毕业证书)考文垂大学毕业证如何办理一比一原版(Coventry毕业证书)考文垂大学毕业证如何办理
一比一原版(Coventry毕业证书)考文垂大学毕业证如何办理
 
一比一原版(CBU毕业证)卡普顿大学毕业证如何办理
一比一原版(CBU毕业证)卡普顿大学毕业证如何办理一比一原版(CBU毕业证)卡普顿大学毕业证如何办理
一比一原版(CBU毕业证)卡普顿大学毕业证如何办理
 
Analysis insight about a Flyball dog competition team's performance
Analysis insight about a Flyball dog competition team's performanceAnalysis insight about a Flyball dog competition team's performance
Analysis insight about a Flyball dog competition team's performance
 

Lecture Cloud Security.pptx

  • 2. Lecture Outline ■ Overview ■ Main Security Factors
  • 3. Overview ■ Cloud is a target-rich environment for malicious individuals and criminal organizations. ■ Outsourcing to a cloud generates new security and privacy concerns. ■ Many issues related to privacy, security, and trust in cloud computing are far from being settled. ■ Service Level Agreements (SLAs) do not provide adequate legal protection for cloud computer users  Remote data security refers to the protection process for the outsourced data from malicious access or modifications by unauthorized users.
  • 4. Main Security Factors ■ Confidentiality, integrity and availability (CIA) are the main security factors ■ Confidentiality means ensuring that only authorized users with the appropriate privileges can access the data. ■ Remote data integrity is ensuring the completeness, accuracy and consistency of the outsourced data. ■ Availability refers to ensuring that the stored data/service is always available to be delivered to the users. What is Privacy? ■ Assuring that users control what information related to them may be collected and stored and by whom and to whom that information may be disclosed.
  • 5. Major Cloud User’s Security Concerns ■ Multi-tenancy (The shared infrastructure) is the root cause of many user concerns ■ Users no longer physically possess the storage of their data  The unauthorized access to confidential information and the data theft  A dishonest CSP may sell the confidential information to the competitors  the CSP might reclaim storage for monetary reasons by discarding data that has not been or is rarely accessed or even hide data loss incidents to maintain a reputation
  • 6. Major Cloud User’s Security Concerns ■ The user control over the lifecycle of data: It is virtually impossible for a user to determine if data that should have been deleted was actually deleted or the next user can recover confidential data ■ Lack of standardization: there are no inter-operability standards.What can be done when service provided by the CSP is interrupted? ■ The legal framework for enforcing cloud security:The data centers of a CSP may be located in several countries and it is unclear what laws apply, the laws of the country where information is stored and processed, the laws of the countries the information crossed when sent by the user, or the laws of the user’s country.
  • 7. Cloud Security Risks There are three broad classes: 1. Traditional security threats, 2. Threats related to system availability 3. Threats related to third-party data control.
  • 8. Traditional SecurityThreats ■ Impact amplified due to: – The vast amount of cloud resources – The large user population that can be affected. – The fuzzy bounds of responsibility between the providers of cloud services and users – The difficulties to accurately identify the cause. ■ The traditional threats begin at the user site.  The user must protect the infrastructure used to connect to the cloud  This task is more difficult because some components of this infrastructure are outside the firewall protecting the user.
  • 9. Traditional SecurityThreats ■ Authentication and authorization: – User authentication is the process of verifying the identity of a user. – Authorization: Granting access to specific services and/or resources based on the authentication. – Different individuals should be assigned distinct levels of privilege based on their role in the organization. – It is also nontrivial to merge or adapt the internal policies and security metrics of an organization with the ones of the cloud.
  • 10. Traditional SecurityThreats Most common attacks ■ Distributed Denial of Service (DDoS): prevents legitimate users to access cloud services ■ SQL injection: An SQL command entered in a web form causes the contents of a database used by the web site to be either dumped to the attacker or altered ■ Cross-site scripting: permits the attacker to insert client- scripts into the web pages and thus, bypass the access controls at the web site. ■ Phishing aims to gain information from a database by masquerading as a trustworthy entity. Such information could be SSN and credit card numbers.
  • 11. New Cloud SecurityThreats ■ Cloud servers host multipleVMs ■ Multiple applications may run under eachVM. ■ Multi-tenancy and vm vulnerabilities open new attack channels for malicious users. ■ Identifying the path followed by an attacker is more difficult in a cloud environment
  • 12. Availability of cloud services ■ System failures, power outages, and other catastrophic events could shutdown services for extended periods of time. ■ Data lock-in and lack of interoperability could prevent a large organization whose business model depends on these data to function properly,
  • 13. Third-party control ■ It generates a spectrum of concerns caused by the lack of transparency and limited user control. ■ For example, a cloud provider may subcontract some resources from a third party whose level of trust is questionable.
  • 14. Top threats to cloud computing ■ Identified by a 2016 Cloud Security Alliance (CSA) report 1. Data breaches. 2. Compromised credentials and broken authentication. 3. Hacked interfaces and APIs. 4. Exploited system vulnerabilities. 5. Account hijacking 6. Malicious insiders 7. advanced persistent threats (APTs) 8. permanent data loss 9. inadequate diligence, 10. cloud service abuse, 11. DoS attacks
  • 15. Top threats to cloud computing ■ Identified by a 2022 Cloud SecurityAlliance (CSA) report 1. Insufficient identity, credential, access and key management (#4) 2. Insecure interfaces and APIs (#7) 3. Misconfiguration and inadequate change control (#2) 4. Lack of cloud security architecture and strategy (#3) 5. Insecure software development 6. Unsecure third-party resources 7. System vulnerabilities 8. Accidental cloud data disclosure/disclosure 9. Misconfiguration and exploitation of serverless and container workloads 10. Organized crime/hackers/APT 11. Cloud storage data exfiltration
  • 16. Legal protection of cloud users The contract between the user and the Cloud Service Provider (CSP) should spell out explicitly: ■ CSP obligations to handle securely sensitive information and its obligation to comply to privacy laws. ■ CSP liabilities for mishandling sensitive information. ■ CSP liabilities for data loss. ■ The rules governing ownership of the data. ■ The geographical regions where information and backups can be stored.

Editor's Notes

  1. Security has been a concern since the early days of computing when a computer was isolated Once computers were able to communicate with one another the Pandora box of threats was wide opened.
  2. Cloud users are concerned about insider attacks (Employees of the CSP)
  3. Cloud users are concerned about insider attacks (Employees of the CSP)
  4. Users cannot properly transmit his data to another CSP/vendor