SlideShare a Scribd company logo
1 of 12
MARTIN BIOH RES-531 PROF. DOUGH EARHART ,[object Object]
SECURITY PROBLEM WITH CLOUD COMPUTING   ,[object Object],[object Object],[object Object]
Problems with Cloud Computing Storage ,[object Object],[object Object],[object Object]
Purpose of My Research ,[object Object]
What Companies needs to know Before saving in the Cloud ,[object Object],[object Object],[object Object],[object Object],[object Object]
Recommendations to Consider Before  any companies contract a Cloud provider   ,[object Object],[object Object]
CONT’ 5 ,[object Object],[object Object],[object Object],[object Object]
Privacy and Security ,[object Object],[object Object]
Compliance ,[object Object]
Compliance ,[object Object],[object Object]
Conclusion ,[object Object],[object Object]
Cont’ Conclusion ,[object Object]

More Related Content

What's hot

Capabilities Brief
Capabilities BriefCapabilities Brief
Capabilities Briefambrai5
 
Next Generation Managed Services KOX
Next Generation Managed Services KOXNext Generation Managed Services KOX
Next Generation Managed Services KOXJose A. Abril
 
Considerations for large scale aws migration
Considerations for large scale aws migrationConsiderations for large scale aws migration
Considerations for large scale aws migrationExpediuz Tech
 
Cloud adoption in the EU - and analyst's perspective (revised)
Cloud adoption in the EU - and analyst's perspective (revised)Cloud adoption in the EU - and analyst's perspective (revised)
Cloud adoption in the EU - and analyst's perspective (revised)Mike Davis
 
Presentation to Irish ISSA Conference 12-May-11
Presentation to Irish ISSA Conference 12-May-11Presentation to Irish ISSA Conference 12-May-11
Presentation to Irish ISSA Conference 12-May-11Michael Ofarrell
 
sales-sheet-Business-Continuity
sales-sheet-Business-Continuitysales-sheet-Business-Continuity
sales-sheet-Business-ContinuityGeorge Carroll
 
Cloud computing | Cloud Tally Services In Pune | PrismIT
Cloud computing | Cloud Tally Services In Pune | PrismITCloud computing | Cloud Tally Services In Pune | PrismIT
Cloud computing | Cloud Tally Services In Pune | PrismITPrismITsolutions
 
Legal ethics & cloud computing
Legal ethics & cloud computingLegal ethics & cloud computing
Legal ethics & cloud computingPatrick Fowler
 
Information security adds value
Information security adds valueInformation security adds value
Information security adds valueKMD
 
HC3 Kickoff presentations - June 19, 2014
HC3 Kickoff presentations - June 19, 2014HC3 Kickoff presentations - June 19, 2014
HC3 Kickoff presentations - June 19, 2014Ostendio, Inc.
 
Conférence - Les enjeux et la vision de Veritas sur la protection des donnée...
Conférence  - Les enjeux et la vision de Veritas sur la protection des donnée...Conférence  - Les enjeux et la vision de Veritas sur la protection des donnée...
Conférence - Les enjeux et la vision de Veritas sur la protection des donnée...African Cyber Security Summit
 

What's hot (14)

Capabilities Brief
Capabilities BriefCapabilities Brief
Capabilities Brief
 
Next Generation Managed Services KOX
Next Generation Managed Services KOXNext Generation Managed Services KOX
Next Generation Managed Services KOX
 
Considerations for large scale aws migration
Considerations for large scale aws migrationConsiderations for large scale aws migration
Considerations for large scale aws migration
 
Cloud adoption in the EU - and analyst's perspective (revised)
Cloud adoption in the EU - and analyst's perspective (revised)Cloud adoption in the EU - and analyst's perspective (revised)
Cloud adoption in the EU - and analyst's perspective (revised)
 
Presentation to Irish ISSA Conference 12-May-11
Presentation to Irish ISSA Conference 12-May-11Presentation to Irish ISSA Conference 12-May-11
Presentation to Irish ISSA Conference 12-May-11
 
sales-sheet-Business-Continuity
sales-sheet-Business-Continuitysales-sheet-Business-Continuity
sales-sheet-Business-Continuity
 
Cloud computing | Cloud Tally Services In Pune | PrismIT
Cloud computing | Cloud Tally Services In Pune | PrismITCloud computing | Cloud Tally Services In Pune | PrismIT
Cloud computing | Cloud Tally Services In Pune | PrismIT
 
Legal ethics & cloud computing
Legal ethics & cloud computingLegal ethics & cloud computing
Legal ethics & cloud computing
 
Information security adds value
Information security adds valueInformation security adds value
Information security adds value
 
Idea to Insight
Idea to InsightIdea to Insight
Idea to Insight
 
What the future holds for the hybrid cloud
What the future holds for the hybrid cloudWhat the future holds for the hybrid cloud
What the future holds for the hybrid cloud
 
HC3 Kickoff presentations - June 19, 2014
HC3 Kickoff presentations - June 19, 2014HC3 Kickoff presentations - June 19, 2014
HC3 Kickoff presentations - June 19, 2014
 
Optimize operations
Optimize operationsOptimize operations
Optimize operations
 
Conférence - Les enjeux et la vision de Veritas sur la protection des donnée...
Conférence  - Les enjeux et la vision de Veritas sur la protection des donnée...Conférence  - Les enjeux et la vision de Veritas sur la protection des donnée...
Conférence - Les enjeux et la vision de Veritas sur la protection des donnée...
 

Viewers also liked

Cloud computing big data
Cloud computing   big dataCloud computing   big data
Cloud computing big dataracsor
 
Future of cloud storage
Future of cloud storageFuture of cloud storage
Future of cloud storageGlusterFS
 
رایانش ابری
 رایانش ابری رایانش ابری
رایانش ابریAli Ghaeni
 
Privacy Preserving Public Auditing for Data Storage Security in Cloud.ppt
Privacy Preserving Public Auditing for Data Storage Security in Cloud.pptPrivacy Preserving Public Auditing for Data Storage Security in Cloud.ppt
Privacy Preserving Public Auditing for Data Storage Security in Cloud.pptGirish Chandra
 
PRIVACY-PRESERVING PUBLIC AUDITING FOR DATA STORAGE SECURITY IN CLOUD COMPUTING
PRIVACY-PRESERVING PUBLIC AUDITING FOR DATA STORAGESECURITY IN CLOUD COMPUTINGPRIVACY-PRESERVING PUBLIC AUDITING FOR DATA STORAGESECURITY IN CLOUD COMPUTING
PRIVACY-PRESERVING PUBLIC AUDITING FOR DATA STORAGE SECURITY IN CLOUD COMPUTINGKayalvizhi Selvaraj
 

Viewers also liked (6)

Cloud computing big data
Cloud computing   big dataCloud computing   big data
Cloud computing big data
 
Future of cloud storage
Future of cloud storageFuture of cloud storage
Future of cloud storage
 
Cloud computing
Cloud computingCloud computing
Cloud computing
 
رایانش ابری
 رایانش ابری رایانش ابری
رایانش ابری
 
Privacy Preserving Public Auditing for Data Storage Security in Cloud.ppt
Privacy Preserving Public Auditing for Data Storage Security in Cloud.pptPrivacy Preserving Public Auditing for Data Storage Security in Cloud.ppt
Privacy Preserving Public Auditing for Data Storage Security in Cloud.ppt
 
PRIVACY-PRESERVING PUBLIC AUDITING FOR DATA STORAGE SECURITY IN CLOUD COMPUTING
PRIVACY-PRESERVING PUBLIC AUDITING FOR DATA STORAGESECURITY IN CLOUD COMPUTINGPRIVACY-PRESERVING PUBLIC AUDITING FOR DATA STORAGESECURITY IN CLOUD COMPUTING
PRIVACY-PRESERVING PUBLIC AUDITING FOR DATA STORAGE SECURITY IN CLOUD COMPUTING
 

Similar to S E C U R I T Y P R O B L E M W I T H C L O U D C O M P U T I N G

Secure Computing in Enterprise Cloud Environments
Secure Computing in Enterprise Cloud EnvironmentsSecure Computing in Enterprise Cloud Environments
Secure Computing in Enterprise Cloud EnvironmentsShaun Thomas
 
Cloud computing - Assessing the Security Risks - Jared Carstensen
Cloud computing - Assessing the Security Risks - Jared CarstensenCloud computing - Assessing the Security Risks - Jared Carstensen
Cloud computing - Assessing the Security Risks - Jared Carstensenjaredcarst
 
10 Tips for CIOs - Data Security in the Cloud
10 Tips for CIOs - Data Security in the Cloud10 Tips for CIOs - Data Security in the Cloud
10 Tips for CIOs - Data Security in the CloudPeak 10
 
On premise vs cloud software
On premise vs cloud softwareOn premise vs cloud software
On premise vs cloud softwareTCM infosys
 
Legal And Regulatory Issues Cloud Computing...V2.0
Legal And Regulatory Issues Cloud Computing...V2.0Legal And Regulatory Issues Cloud Computing...V2.0
Legal And Regulatory Issues Cloud Computing...V2.0David Spinks
 
What is cloud computing report
What is cloud computing reportWhat is cloud computing report
What is cloud computing reportProduct Reviews
 
10 Tips for CIOS Data Security in the Cloud
10 Tips for CIOS Data Security in the Cloud10 Tips for CIOS Data Security in the Cloud
10 Tips for CIOS Data Security in the CloudIron Mountain
 
Understanding Minimizing And Mitigating Risk In Cloud Computing
Understanding Minimizing And Mitigating Risk In Cloud ComputingUnderstanding Minimizing And Mitigating Risk In Cloud Computing
Understanding Minimizing And Mitigating Risk In Cloud ComputingJanine Anthony Bowen, Esq.
 
Regulatory and compliance forum cloud computing for law firms
Regulatory and compliance forum   cloud computing for law firmsRegulatory and compliance forum   cloud computing for law firms
Regulatory and compliance forum cloud computing for law firmsDatabarracks
 
internal-cloud-audit-risk-guide
internal-cloud-audit-risk-guideinternal-cloud-audit-risk-guide
internal-cloud-audit-risk-guideSatchit Dokras
 
New Era in Insurance - Cloud Computing
New Era in Insurance - Cloud ComputingNew Era in Insurance - Cloud Computing
New Era in Insurance - Cloud ComputingNIIT Technologies
 
Security and Privacy Issues of Cloud Computing; Solutions and Secure Framework
Security and Privacy Issues of Cloud Computing; Solutions and Secure FrameworkSecurity and Privacy Issues of Cloud Computing; Solutions and Secure Framework
Security and Privacy Issues of Cloud Computing; Solutions and Secure FrameworkIOSR Journals
 
Cutting To The Chase: Cloud From A Customers Perspective
Cutting To The Chase: Cloud From A Customers PerspectiveCutting To The Chase: Cloud From A Customers Perspective
Cutting To The Chase: Cloud From A Customers PerspectiveJanine Anthony Bowen, Esq.
 
Whitepaper: Security of the Cloud
Whitepaper: Security of the CloudWhitepaper: Security of the Cloud
Whitepaper: Security of the CloudCloudSmartz
 
10-TOP-IT-INITIATIVES_6-6-16
10-TOP-IT-INITIATIVES_6-6-1610-TOP-IT-INITIATIVES_6-6-16
10-TOP-IT-INITIATIVES_6-6-16Peak 10
 
Cloud computing seminar report
Cloud computing seminar reportCloud computing seminar report
Cloud computing seminar reportshafzonly
 

Similar to S E C U R I T Y P R O B L E M W I T H C L O U D C O M P U T I N G (20)

Secure Computing in Enterprise Cloud Environments
Secure Computing in Enterprise Cloud EnvironmentsSecure Computing in Enterprise Cloud Environments
Secure Computing in Enterprise Cloud Environments
 
Cloud computing - Assessing the Security Risks - Jared Carstensen
Cloud computing - Assessing the Security Risks - Jared CarstensenCloud computing - Assessing the Security Risks - Jared Carstensen
Cloud computing - Assessing the Security Risks - Jared Carstensen
 
10 Tips for CIOs - Data Security in the Cloud
10 Tips for CIOs - Data Security in the Cloud10 Tips for CIOs - Data Security in the Cloud
10 Tips for CIOs - Data Security in the Cloud
 
On premise vs cloud software
On premise vs cloud softwareOn premise vs cloud software
On premise vs cloud software
 
Legal And Regulatory Issues Cloud Computing...V2.0
Legal And Regulatory Issues Cloud Computing...V2.0Legal And Regulatory Issues Cloud Computing...V2.0
Legal And Regulatory Issues Cloud Computing...V2.0
 
What is cloud computing report
What is cloud computing reportWhat is cloud computing report
What is cloud computing report
 
10 Tips for CIOS Data Security in the Cloud
10 Tips for CIOS Data Security in the Cloud10 Tips for CIOS Data Security in the Cloud
10 Tips for CIOS Data Security in the Cloud
 
Understanding Minimizing And Mitigating Risk In Cloud Computing
Understanding Minimizing And Mitigating Risk In Cloud ComputingUnderstanding Minimizing And Mitigating Risk In Cloud Computing
Understanding Minimizing And Mitigating Risk In Cloud Computing
 
Regulatory and compliance forum cloud computing for law firms
Regulatory and compliance forum   cloud computing for law firmsRegulatory and compliance forum   cloud computing for law firms
Regulatory and compliance forum cloud computing for law firms
 
Cloud Based Email
Cloud Based EmailCloud Based Email
Cloud Based Email
 
What to Look for in Cloud-based E-mail
What to Look for in Cloud-based E-mailWhat to Look for in Cloud-based E-mail
What to Look for in Cloud-based E-mail
 
internal-cloud-audit-risk-guide
internal-cloud-audit-risk-guideinternal-cloud-audit-risk-guide
internal-cloud-audit-risk-guide
 
Myths About Cloud Computing
Myths About Cloud ComputingMyths About Cloud Computing
Myths About Cloud Computing
 
New Era in Insurance - Cloud Computing
New Era in Insurance - Cloud ComputingNew Era in Insurance - Cloud Computing
New Era in Insurance - Cloud Computing
 
Security and Privacy Issues of Cloud Computing; Solutions and Secure Framework
Security and Privacy Issues of Cloud Computing; Solutions and Secure FrameworkSecurity and Privacy Issues of Cloud Computing; Solutions and Secure Framework
Security and Privacy Issues of Cloud Computing; Solutions and Secure Framework
 
Cutting To The Chase: Cloud From A Customers Perspective
Cutting To The Chase: Cloud From A Customers PerspectiveCutting To The Chase: Cloud From A Customers Perspective
Cutting To The Chase: Cloud From A Customers Perspective
 
Whitepaper: Security of the Cloud
Whitepaper: Security of the CloudWhitepaper: Security of the Cloud
Whitepaper: Security of the Cloud
 
Security of the Cloud
Security of the CloudSecurity of the Cloud
Security of the Cloud
 
10-TOP-IT-INITIATIVES_6-6-16
10-TOP-IT-INITIATIVES_6-6-1610-TOP-IT-INITIATIVES_6-6-16
10-TOP-IT-INITIATIVES_6-6-16
 
Cloud computing seminar report
Cloud computing seminar reportCloud computing seminar report
Cloud computing seminar report
 

More from Martin Bioh

Security Problem With Cloud Computing
Security Problem With Cloud ComputingSecurity Problem With Cloud Computing
Security Problem With Cloud ComputingMartin Bioh
 
Security Problem With Cloud Computing
Security Problem With Cloud ComputingSecurity Problem With Cloud Computing
Security Problem With Cloud ComputingMartin Bioh
 
Security Problem With Cloud Computing
Security Problem With Cloud ComputingSecurity Problem With Cloud Computing
Security Problem With Cloud ComputingMartin Bioh
 
Data issue affrecting Cloud computing
Data issue affrecting Cloud computingData issue affrecting Cloud computing
Data issue affrecting Cloud computingMartin Bioh
 
Security with Cloud Computing
Security with Cloud ComputingSecurity with Cloud Computing
Security with Cloud ComputingMartin Bioh
 
Security Problem With Cloud Computing
Security Problem With Cloud ComputingSecurity Problem With Cloud Computing
Security Problem With Cloud ComputingMartin Bioh
 
Security Problem With Cloud Computing
Security Problem With Cloud ComputingSecurity Problem With Cloud Computing
Security Problem With Cloud ComputingMartin Bioh
 
CIS- 512 Assignment 4
CIS- 512 Assignment 4CIS- 512 Assignment 4
CIS- 512 Assignment 4Martin Bioh
 

More from Martin Bioh (8)

Security Problem With Cloud Computing
Security Problem With Cloud ComputingSecurity Problem With Cloud Computing
Security Problem With Cloud Computing
 
Security Problem With Cloud Computing
Security Problem With Cloud ComputingSecurity Problem With Cloud Computing
Security Problem With Cloud Computing
 
Security Problem With Cloud Computing
Security Problem With Cloud ComputingSecurity Problem With Cloud Computing
Security Problem With Cloud Computing
 
Data issue affrecting Cloud computing
Data issue affrecting Cloud computingData issue affrecting Cloud computing
Data issue affrecting Cloud computing
 
Security with Cloud Computing
Security with Cloud ComputingSecurity with Cloud Computing
Security with Cloud Computing
 
Security Problem With Cloud Computing
Security Problem With Cloud ComputingSecurity Problem With Cloud Computing
Security Problem With Cloud Computing
 
Security Problem With Cloud Computing
Security Problem With Cloud ComputingSecurity Problem With Cloud Computing
Security Problem With Cloud Computing
 
CIS- 512 Assignment 4
CIS- 512 Assignment 4CIS- 512 Assignment 4
CIS- 512 Assignment 4
 

S E C U R I T Y P R O B L E M W I T H C L O U D C O M P U T I N G

  • 1.
  • 2.
  • 3.
  • 4.
  • 5.
  • 6.
  • 7.
  • 8.
  • 9.
  • 10.
  • 11.
  • 12.