SlideShare a Scribd company logo
Security overview of
cloud computing
What is Cloud Computing ?
Cloud computing refers to the on demand delivery of
computing services such as applications, computing resources,
storage, database, networking resources etc. through internet
and on a pay as per use basis. At the present time the demand
for cloud computing services are increasing with respect to that
demand for cloud computing skills is also increasing. It
provides three main types of service models i.e. SaaS
(Software as a Service), PaaS (Platform as a Service) and
IaaS (Infrastructure as a Service). With this as starting from
small to large organizations have started using cloud services
so depending upon their requirement they go for the different
types of cloud like Public cloud, Private cloud, Hybrid cloud,
Community cloud.
Security In Cloud Computing :
Cloud computing which is one of the most demanding
technology of the current time, starting from small to large
organizations have started using cloud computing services.
Where there are different types of cloud deployment models
are available and cloud services are provided as per
requirement like that internally and externally security is
maintained to keep the cloud system safe. Cloud computing
security or cloud security is an important concern which refers
to the act of protecting cloud environments, data, information
and applications against unauthorized access, DDOS attacks,
malwares, hackers and other similar attacks. Community Cloud
: These allow to a limited set of organizations or employees to
access a shared cloud computing service environment.
Planning of security in Cloud Computing :
As security is a major concern in cloud implementation, so
an organization have to plan for security based on some
factors like below represents the three main factors on
which planning of cloud security depends.
Resources that can be moved to the cloud and test its
sensitivity risk are picked.
The type of cloud is to be considered.
The risk in the deployment of the cloud depends on the
types of cloud and service models.
Types of Cloud Computing Security Controls :
There are 4 types of cloud computing security controls ,
Deterrent Controls : Deterrent controls are designed to block
nefarious attacks on a cloud system. These come in handy when
there are insider attackers.
Preventive Controls : Preventive controls make the system
resilient to attacks by eliminating vulnerabilities in it.
Detective Controls : It identifies and reacts to security threats
and control. Some examples of detective control software are
Intrusion detection software and network security monitoring tools.
Corrective Controls : In the event of a security attack these
controls are activated. They limit the damage caused by the
attack.
Importance of cloud security :
For the organizations making their transition to cloud, cloud
security is an essential factor while choosing a cloud provider.
The attacks are getting stronger day by day and so the security
needs to keep up with it. For this purpose it is essential to pick
a cloud provider who offers the best security and is customized
with the organization’s infrastructure. Cloud security has a lot of
benefits –
● Centralized security : Centralized security results in
centralizing protection. As managing all the devices and
endpoints is not an easy task cloud security helps in doing
so. This results in enhancing traffic analysis and web
filtering which means less policy and software updates.
● Reduced costs : Investing in cloud computing and cloud
security results in less expenditure in hardware and also
less manpower in administration
● Reduced Administration : It makes it easier to administer
the organization and does not have manual security
configuration and constant security updates.
● Reliability : These are very reliable and the cloud can be
accessed from anywhere with any device with proper
authorization.
When we are thinking about cloud security it includes various
types of security like access control for authorized access,
network segmentation for maintaining isolated data, encryption
for encoded data transfer, vulnerability check for patching
vulnerable areas, security monitoring for keeping eye on
various security attacks and disaster recovery for backup and
recovery during data loss.
There are different types of security techniques which are implemented to
make the cloud computing system more secure such as SSL (Secure
Socket Layer) Encryption, Multi Tenancy based Access Control, Intrusion
Detection System, firewalls, penetration testing, tokenization, VPN (Virtual
Private Networks), and avoiding public internet connections and many
more techniques.
But the thing is not so simple how we think, even implementation of number
of security techniques there is always security issues are involved for the
cloud system. As cloud system is managed and accessed over internet so
a lot of challenges arises during maintaining a secure cloud. Some cloud
security challenges are
● Control over cloud data
● Misconfiguration
● Ever changing workload
● Access Management
● Disaster recovery
Thank you

More Related Content

Similar to Security overview of cloud computing.pptx

Trust based Mechanism for Secure Cloud Computing Environment: A Survey
Trust based Mechanism for Secure Cloud Computing Environment: A SurveyTrust based Mechanism for Secure Cloud Computing Environment: A Survey
Trust based Mechanism for Secure Cloud Computing Environment: A Survey
inventionjournals
 
Module 5-cloud computing-SECURITY IN THE CLOUD
Module 5-cloud computing-SECURITY IN THE CLOUDModule 5-cloud computing-SECURITY IN THE CLOUD
Module 5-cloud computing-SECURITY IN THE CLOUD
Sweta Kumari Barnwal
 
What is the significance of cybersecurity in cloud.pptx
What is the significance of cybersecurity in cloud.pptxWhat is the significance of cybersecurity in cloud.pptx
What is the significance of cybersecurity in cloud.pptx
infosec train
 
Single Sign-on Authentication Model for Cloud Computing using Kerberos
Single Sign-on Authentication Model for Cloud Computing using KerberosSingle Sign-on Authentication Model for Cloud Computing using Kerberos
Single Sign-on Authentication Model for Cloud Computing using Kerberos
Deepak Bagga
 
What is the significance of cybersecurity in cloud.pptx
What is the significance of cybersecurity in cloud.pptxWhat is the significance of cybersecurity in cloud.pptx
What is the significance of cybersecurity in cloud.pptx
Infosectrain3
 
Cloud Security - Types, Common Threats & Tips To Mitigate.pdf
Cloud Security - Types, Common Threats & Tips To Mitigate.pdfCloud Security - Types, Common Threats & Tips To Mitigate.pdf
Cloud Security - Types, Common Threats & Tips To Mitigate.pdf
DataSpace Academy
 
the_role_of_resilience_data_in_ensuring_cloud_security.pdf
the_role_of_resilience_data_in_ensuring_cloud_security.pdfthe_role_of_resilience_data_in_ensuring_cloud_security.pdf
the_role_of_resilience_data_in_ensuring_cloud_security.pdf
sarah david
 
Security Issues in Cloud Computing by rahul abhishek
Security Issues in Cloud Computing  by rahul abhishekSecurity Issues in Cloud Computing  by rahul abhishek
Security Issues in Cloud Computing by rahul abhishek
Er. rahul abhishek
 
Infrastructure Security in Cloud Computing: Essential Tools and Techniques
Infrastructure Security in Cloud Computing: Essential Tools and TechniquesInfrastructure Security in Cloud Computing: Essential Tools and Techniques
Infrastructure Security in Cloud Computing: Essential Tools and Techniques
Qualysec Technologies - #1 Cybersecurity Company | Penetration Testing Services
 
the_role_of_resilience_data_in_ensuring_cloud_security.pptx
the_role_of_resilience_data_in_ensuring_cloud_security.pptxthe_role_of_resilience_data_in_ensuring_cloud_security.pptx
the_role_of_resilience_data_in_ensuring_cloud_security.pptx
sarah david
 
Cloud Security, Standards and Applications
Cloud Security, Standards and ApplicationsCloud Security, Standards and Applications
Cloud Security, Standards and Applications
Dr. Sunil Kr. Pandey
 
Security in cloud computing kashyap kunal
Security in cloud computing  kashyap kunalSecurity in cloud computing  kashyap kunal
Security in cloud computing kashyap kunal
Kashyap Kunal
 
Cloud Security_ Unit 4
Cloud Security_ Unit 4Cloud Security_ Unit 4
Cloud Security_ Unit 4
Integral university, India
 
R ramya devi cloud computing
R ramya devi cloud computingR ramya devi cloud computing
R ramya devi cloud computing
PriyadharshiniVS
 
The Zero Trust Security Model for Modern Businesses!
The Zero Trust Security Model for Modern Businesses!The Zero Trust Security Model for Modern Businesses!
The Zero Trust Security Model for Modern Businesses!
Caroline Johnson
 
Security Issues in Cloud Computing by rahul abhishek
Security Issues in Cloud Computing  by rahul abhishekSecurity Issues in Cloud Computing  by rahul abhishek
Security Issues in Cloud Computing by rahul abhishek
Er. rahul abhishek
 
Cloud security
Cloud securityCloud security
Cloud security
Niharika Varshney
 
Investigative analysis of security issues and challenges in cloud computing a...
Investigative analysis of security issues and challenges in cloud computing a...Investigative analysis of security issues and challenges in cloud computing a...
Investigative analysis of security issues and challenges in cloud computing a...
IAEME Publication
 
Cloud Security POV_Final (by KM)
Cloud Security POV_Final (by KM)Cloud Security POV_Final (by KM)
Cloud Security POV_Final (by KM)
Khiro Mishra
 
Why Cloud Security Matters in Today's Business World
Why Cloud Security Matters in Today's Business WorldWhy Cloud Security Matters in Today's Business World
Why Cloud Security Matters in Today's Business World
Ciente
 

Similar to Security overview of cloud computing.pptx (20)

Trust based Mechanism for Secure Cloud Computing Environment: A Survey
Trust based Mechanism for Secure Cloud Computing Environment: A SurveyTrust based Mechanism for Secure Cloud Computing Environment: A Survey
Trust based Mechanism for Secure Cloud Computing Environment: A Survey
 
Module 5-cloud computing-SECURITY IN THE CLOUD
Module 5-cloud computing-SECURITY IN THE CLOUDModule 5-cloud computing-SECURITY IN THE CLOUD
Module 5-cloud computing-SECURITY IN THE CLOUD
 
What is the significance of cybersecurity in cloud.pptx
What is the significance of cybersecurity in cloud.pptxWhat is the significance of cybersecurity in cloud.pptx
What is the significance of cybersecurity in cloud.pptx
 
Single Sign-on Authentication Model for Cloud Computing using Kerberos
Single Sign-on Authentication Model for Cloud Computing using KerberosSingle Sign-on Authentication Model for Cloud Computing using Kerberos
Single Sign-on Authentication Model for Cloud Computing using Kerberos
 
What is the significance of cybersecurity in cloud.pptx
What is the significance of cybersecurity in cloud.pptxWhat is the significance of cybersecurity in cloud.pptx
What is the significance of cybersecurity in cloud.pptx
 
Cloud Security - Types, Common Threats & Tips To Mitigate.pdf
Cloud Security - Types, Common Threats & Tips To Mitigate.pdfCloud Security - Types, Common Threats & Tips To Mitigate.pdf
Cloud Security - Types, Common Threats & Tips To Mitigate.pdf
 
the_role_of_resilience_data_in_ensuring_cloud_security.pdf
the_role_of_resilience_data_in_ensuring_cloud_security.pdfthe_role_of_resilience_data_in_ensuring_cloud_security.pdf
the_role_of_resilience_data_in_ensuring_cloud_security.pdf
 
Security Issues in Cloud Computing by rahul abhishek
Security Issues in Cloud Computing  by rahul abhishekSecurity Issues in Cloud Computing  by rahul abhishek
Security Issues in Cloud Computing by rahul abhishek
 
Infrastructure Security in Cloud Computing: Essential Tools and Techniques
Infrastructure Security in Cloud Computing: Essential Tools and TechniquesInfrastructure Security in Cloud Computing: Essential Tools and Techniques
Infrastructure Security in Cloud Computing: Essential Tools and Techniques
 
the_role_of_resilience_data_in_ensuring_cloud_security.pptx
the_role_of_resilience_data_in_ensuring_cloud_security.pptxthe_role_of_resilience_data_in_ensuring_cloud_security.pptx
the_role_of_resilience_data_in_ensuring_cloud_security.pptx
 
Cloud Security, Standards and Applications
Cloud Security, Standards and ApplicationsCloud Security, Standards and Applications
Cloud Security, Standards and Applications
 
Security in cloud computing kashyap kunal
Security in cloud computing  kashyap kunalSecurity in cloud computing  kashyap kunal
Security in cloud computing kashyap kunal
 
Cloud Security_ Unit 4
Cloud Security_ Unit 4Cloud Security_ Unit 4
Cloud Security_ Unit 4
 
R ramya devi cloud computing
R ramya devi cloud computingR ramya devi cloud computing
R ramya devi cloud computing
 
The Zero Trust Security Model for Modern Businesses!
The Zero Trust Security Model for Modern Businesses!The Zero Trust Security Model for Modern Businesses!
The Zero Trust Security Model for Modern Businesses!
 
Security Issues in Cloud Computing by rahul abhishek
Security Issues in Cloud Computing  by rahul abhishekSecurity Issues in Cloud Computing  by rahul abhishek
Security Issues in Cloud Computing by rahul abhishek
 
Cloud security
Cloud securityCloud security
Cloud security
 
Investigative analysis of security issues and challenges in cloud computing a...
Investigative analysis of security issues and challenges in cloud computing a...Investigative analysis of security issues and challenges in cloud computing a...
Investigative analysis of security issues and challenges in cloud computing a...
 
Cloud Security POV_Final (by KM)
Cloud Security POV_Final (by KM)Cloud Security POV_Final (by KM)
Cloud Security POV_Final (by KM)
 
Why Cloud Security Matters in Today's Business World
Why Cloud Security Matters in Today's Business WorldWhy Cloud Security Matters in Today's Business World
Why Cloud Security Matters in Today's Business World
 

More from NeyaShree1

WE PPT.pptx
WE PPT.pptxWE PPT.pptx
WE PPT.pptx
NeyaShree1
 
HDI vs GDI-1.pptx
HDI vs GDI-1.pptxHDI vs GDI-1.pptx
HDI vs GDI-1.pptx
NeyaShree1
 
AI and ML.pptx
AI and ML.pptxAI and ML.pptx
AI and ML.pptx
NeyaShree1
 
IOT.pptx
IOT.pptxIOT.pptx
IOT.pptx
NeyaShree1
 
Edge detection.pptx
Edge detection.pptxEdge detection.pptx
Edge detection.pptx
NeyaShree1
 
Nosql .pptx
Nosql .pptxNosql .pptx
Nosql .pptx
NeyaShree1
 
Cryptography .pptx
Cryptography .pptxCryptography .pptx
Cryptography .pptx
NeyaShree1
 
Dos.pptx
Dos.pptxDos.pptx
Dos.pptx
NeyaShree1
 
Python .pptx
Python .pptxPython .pptx
Python .pptx
NeyaShree1
 
Dsa .pdf
Dsa .pdfDsa .pdf
Dsa .pdf
NeyaShree1
 
Dsa .pdf
Dsa .pdfDsa .pdf
Dsa .pdf
NeyaShree1
 
CD.pptx
CD.pptxCD.pptx
CD.pptx
NeyaShree1
 

More from NeyaShree1 (12)

WE PPT.pptx
WE PPT.pptxWE PPT.pptx
WE PPT.pptx
 
HDI vs GDI-1.pptx
HDI vs GDI-1.pptxHDI vs GDI-1.pptx
HDI vs GDI-1.pptx
 
AI and ML.pptx
AI and ML.pptxAI and ML.pptx
AI and ML.pptx
 
IOT.pptx
IOT.pptxIOT.pptx
IOT.pptx
 
Edge detection.pptx
Edge detection.pptxEdge detection.pptx
Edge detection.pptx
 
Nosql .pptx
Nosql .pptxNosql .pptx
Nosql .pptx
 
Cryptography .pptx
Cryptography .pptxCryptography .pptx
Cryptography .pptx
 
Dos.pptx
Dos.pptxDos.pptx
Dos.pptx
 
Python .pptx
Python .pptxPython .pptx
Python .pptx
 
Dsa .pdf
Dsa .pdfDsa .pdf
Dsa .pdf
 
Dsa .pdf
Dsa .pdfDsa .pdf
Dsa .pdf
 
CD.pptx
CD.pptxCD.pptx
CD.pptx
 

Recently uploaded

Pride Month Slides 2024 David Douglas School District
Pride Month Slides 2024 David Douglas School DistrictPride Month Slides 2024 David Douglas School District
Pride Month Slides 2024 David Douglas School District
David Douglas School District
 
Top five deadliest dog breeds in America
Top five deadliest dog breeds in AmericaTop five deadliest dog breeds in America
Top five deadliest dog breeds in America
Bisnar Chase Personal Injury Attorneys
 
Executive Directors Chat Leveraging AI for Diversity, Equity, and Inclusion
Executive Directors Chat  Leveraging AI for Diversity, Equity, and InclusionExecutive Directors Chat  Leveraging AI for Diversity, Equity, and Inclusion
Executive Directors Chat Leveraging AI for Diversity, Equity, and Inclusion
TechSoup
 
Assignment_4_ArianaBusciglio Marvel(1).docx
Assignment_4_ArianaBusciglio Marvel(1).docxAssignment_4_ArianaBusciglio Marvel(1).docx
Assignment_4_ArianaBusciglio Marvel(1).docx
ArianaBusciglio
 
Thesis Statement for students diagnonsed withADHD.ppt
Thesis Statement for students diagnonsed withADHD.pptThesis Statement for students diagnonsed withADHD.ppt
Thesis Statement for students diagnonsed withADHD.ppt
EverAndrsGuerraGuerr
 
Chapter 4 - Islamic Financial Institutions in Malaysia.pptx
Chapter 4 - Islamic Financial Institutions in Malaysia.pptxChapter 4 - Islamic Financial Institutions in Malaysia.pptx
Chapter 4 - Islamic Financial Institutions in Malaysia.pptx
Mohd Adib Abd Muin, Senior Lecturer at Universiti Utara Malaysia
 
World environment day ppt For 5 June 2024
World environment day ppt For 5 June 2024World environment day ppt For 5 June 2024
World environment day ppt For 5 June 2024
ak6969907
 
How to Build a Module in Odoo 17 Using the Scaffold Method
How to Build a Module in Odoo 17 Using the Scaffold MethodHow to Build a Module in Odoo 17 Using the Scaffold Method
How to Build a Module in Odoo 17 Using the Scaffold Method
Celine George
 
PCOS corelations and management through Ayurveda.
PCOS corelations and management through Ayurveda.PCOS corelations and management through Ayurveda.
PCOS corelations and management through Ayurveda.
Dr. Shivangi Singh Parihar
 
PIMS Job Advertisement 2024.pdf Islamabad
PIMS Job Advertisement 2024.pdf IslamabadPIMS Job Advertisement 2024.pdf Islamabad
PIMS Job Advertisement 2024.pdf Islamabad
AyyanKhan40
 
ANATOMY AND BIOMECHANICS OF HIP JOINT.pdf
ANATOMY AND BIOMECHANICS OF HIP JOINT.pdfANATOMY AND BIOMECHANICS OF HIP JOINT.pdf
ANATOMY AND BIOMECHANICS OF HIP JOINT.pdf
Priyankaranawat4
 
Digital Artifact 1 - 10VCD Environments Unit
Digital Artifact 1 - 10VCD Environments UnitDigital Artifact 1 - 10VCD Environments Unit
Digital Artifact 1 - 10VCD Environments Unit
chanes7
 
The basics of sentences session 6pptx.pptx
The basics of sentences session 6pptx.pptxThe basics of sentences session 6pptx.pptx
The basics of sentences session 6pptx.pptx
heathfieldcps1
 
How to Add Chatter in the odoo 17 ERP Module
How to Add Chatter in the odoo 17 ERP ModuleHow to Add Chatter in the odoo 17 ERP Module
How to Add Chatter in the odoo 17 ERP Module
Celine George
 
The History of Stoke Newington Street Names
The History of Stoke Newington Street NamesThe History of Stoke Newington Street Names
The History of Stoke Newington Street Names
History of Stoke Newington
 
A Survey of Techniques for Maximizing LLM Performance.pptx
A Survey of Techniques for Maximizing LLM Performance.pptxA Survey of Techniques for Maximizing LLM Performance.pptx
A Survey of Techniques for Maximizing LLM Performance.pptx
thanhdowork
 
Your Skill Boost Masterclass: Strategies for Effective Upskilling
Your Skill Boost Masterclass: Strategies for Effective UpskillingYour Skill Boost Masterclass: Strategies for Effective Upskilling
Your Skill Boost Masterclass: Strategies for Effective Upskilling
Excellence Foundation for South Sudan
 
Aficamten in HCM (SEQUOIA HCM TRIAL 2024)
Aficamten in HCM (SEQUOIA HCM TRIAL 2024)Aficamten in HCM (SEQUOIA HCM TRIAL 2024)
Aficamten in HCM (SEQUOIA HCM TRIAL 2024)
Ashish Kohli
 
clinical examination of hip joint (1).pdf
clinical examination of hip joint (1).pdfclinical examination of hip joint (1).pdf
clinical examination of hip joint (1).pdf
Priyankaranawat4
 
writing about opinions about Australia the movie
writing about opinions about Australia the moviewriting about opinions about Australia the movie
writing about opinions about Australia the movie
Nicholas Montgomery
 

Recently uploaded (20)

Pride Month Slides 2024 David Douglas School District
Pride Month Slides 2024 David Douglas School DistrictPride Month Slides 2024 David Douglas School District
Pride Month Slides 2024 David Douglas School District
 
Top five deadliest dog breeds in America
Top five deadliest dog breeds in AmericaTop five deadliest dog breeds in America
Top five deadliest dog breeds in America
 
Executive Directors Chat Leveraging AI for Diversity, Equity, and Inclusion
Executive Directors Chat  Leveraging AI for Diversity, Equity, and InclusionExecutive Directors Chat  Leveraging AI for Diversity, Equity, and Inclusion
Executive Directors Chat Leveraging AI for Diversity, Equity, and Inclusion
 
Assignment_4_ArianaBusciglio Marvel(1).docx
Assignment_4_ArianaBusciglio Marvel(1).docxAssignment_4_ArianaBusciglio Marvel(1).docx
Assignment_4_ArianaBusciglio Marvel(1).docx
 
Thesis Statement for students diagnonsed withADHD.ppt
Thesis Statement for students diagnonsed withADHD.pptThesis Statement for students diagnonsed withADHD.ppt
Thesis Statement for students diagnonsed withADHD.ppt
 
Chapter 4 - Islamic Financial Institutions in Malaysia.pptx
Chapter 4 - Islamic Financial Institutions in Malaysia.pptxChapter 4 - Islamic Financial Institutions in Malaysia.pptx
Chapter 4 - Islamic Financial Institutions in Malaysia.pptx
 
World environment day ppt For 5 June 2024
World environment day ppt For 5 June 2024World environment day ppt For 5 June 2024
World environment day ppt For 5 June 2024
 
How to Build a Module in Odoo 17 Using the Scaffold Method
How to Build a Module in Odoo 17 Using the Scaffold MethodHow to Build a Module in Odoo 17 Using the Scaffold Method
How to Build a Module in Odoo 17 Using the Scaffold Method
 
PCOS corelations and management through Ayurveda.
PCOS corelations and management through Ayurveda.PCOS corelations and management through Ayurveda.
PCOS corelations and management through Ayurveda.
 
PIMS Job Advertisement 2024.pdf Islamabad
PIMS Job Advertisement 2024.pdf IslamabadPIMS Job Advertisement 2024.pdf Islamabad
PIMS Job Advertisement 2024.pdf Islamabad
 
ANATOMY AND BIOMECHANICS OF HIP JOINT.pdf
ANATOMY AND BIOMECHANICS OF HIP JOINT.pdfANATOMY AND BIOMECHANICS OF HIP JOINT.pdf
ANATOMY AND BIOMECHANICS OF HIP JOINT.pdf
 
Digital Artifact 1 - 10VCD Environments Unit
Digital Artifact 1 - 10VCD Environments UnitDigital Artifact 1 - 10VCD Environments Unit
Digital Artifact 1 - 10VCD Environments Unit
 
The basics of sentences session 6pptx.pptx
The basics of sentences session 6pptx.pptxThe basics of sentences session 6pptx.pptx
The basics of sentences session 6pptx.pptx
 
How to Add Chatter in the odoo 17 ERP Module
How to Add Chatter in the odoo 17 ERP ModuleHow to Add Chatter in the odoo 17 ERP Module
How to Add Chatter in the odoo 17 ERP Module
 
The History of Stoke Newington Street Names
The History of Stoke Newington Street NamesThe History of Stoke Newington Street Names
The History of Stoke Newington Street Names
 
A Survey of Techniques for Maximizing LLM Performance.pptx
A Survey of Techniques for Maximizing LLM Performance.pptxA Survey of Techniques for Maximizing LLM Performance.pptx
A Survey of Techniques for Maximizing LLM Performance.pptx
 
Your Skill Boost Masterclass: Strategies for Effective Upskilling
Your Skill Boost Masterclass: Strategies for Effective UpskillingYour Skill Boost Masterclass: Strategies for Effective Upskilling
Your Skill Boost Masterclass: Strategies for Effective Upskilling
 
Aficamten in HCM (SEQUOIA HCM TRIAL 2024)
Aficamten in HCM (SEQUOIA HCM TRIAL 2024)Aficamten in HCM (SEQUOIA HCM TRIAL 2024)
Aficamten in HCM (SEQUOIA HCM TRIAL 2024)
 
clinical examination of hip joint (1).pdf
clinical examination of hip joint (1).pdfclinical examination of hip joint (1).pdf
clinical examination of hip joint (1).pdf
 
writing about opinions about Australia the movie
writing about opinions about Australia the moviewriting about opinions about Australia the movie
writing about opinions about Australia the movie
 

Security overview of cloud computing.pptx

  • 2. What is Cloud Computing ? Cloud computing refers to the on demand delivery of computing services such as applications, computing resources, storage, database, networking resources etc. through internet and on a pay as per use basis. At the present time the demand for cloud computing services are increasing with respect to that demand for cloud computing skills is also increasing. It provides three main types of service models i.e. SaaS (Software as a Service), PaaS (Platform as a Service) and IaaS (Infrastructure as a Service). With this as starting from small to large organizations have started using cloud services so depending upon their requirement they go for the different types of cloud like Public cloud, Private cloud, Hybrid cloud, Community cloud.
  • 3. Security In Cloud Computing : Cloud computing which is one of the most demanding technology of the current time, starting from small to large organizations have started using cloud computing services. Where there are different types of cloud deployment models are available and cloud services are provided as per requirement like that internally and externally security is maintained to keep the cloud system safe. Cloud computing security or cloud security is an important concern which refers to the act of protecting cloud environments, data, information and applications against unauthorized access, DDOS attacks, malwares, hackers and other similar attacks. Community Cloud : These allow to a limited set of organizations or employees to access a shared cloud computing service environment.
  • 4. Planning of security in Cloud Computing : As security is a major concern in cloud implementation, so an organization have to plan for security based on some factors like below represents the three main factors on which planning of cloud security depends. Resources that can be moved to the cloud and test its sensitivity risk are picked. The type of cloud is to be considered. The risk in the deployment of the cloud depends on the types of cloud and service models.
  • 5. Types of Cloud Computing Security Controls : There are 4 types of cloud computing security controls , Deterrent Controls : Deterrent controls are designed to block nefarious attacks on a cloud system. These come in handy when there are insider attackers. Preventive Controls : Preventive controls make the system resilient to attacks by eliminating vulnerabilities in it. Detective Controls : It identifies and reacts to security threats and control. Some examples of detective control software are Intrusion detection software and network security monitoring tools. Corrective Controls : In the event of a security attack these controls are activated. They limit the damage caused by the attack.
  • 6. Importance of cloud security : For the organizations making their transition to cloud, cloud security is an essential factor while choosing a cloud provider. The attacks are getting stronger day by day and so the security needs to keep up with it. For this purpose it is essential to pick a cloud provider who offers the best security and is customized with the organization’s infrastructure. Cloud security has a lot of benefits – ● Centralized security : Centralized security results in centralizing protection. As managing all the devices and endpoints is not an easy task cloud security helps in doing so. This results in enhancing traffic analysis and web filtering which means less policy and software updates.
  • 7. ● Reduced costs : Investing in cloud computing and cloud security results in less expenditure in hardware and also less manpower in administration ● Reduced Administration : It makes it easier to administer the organization and does not have manual security configuration and constant security updates. ● Reliability : These are very reliable and the cloud can be accessed from anywhere with any device with proper authorization. When we are thinking about cloud security it includes various types of security like access control for authorized access, network segmentation for maintaining isolated data, encryption for encoded data transfer, vulnerability check for patching vulnerable areas, security monitoring for keeping eye on various security attacks and disaster recovery for backup and recovery during data loss.
  • 8. There are different types of security techniques which are implemented to make the cloud computing system more secure such as SSL (Secure Socket Layer) Encryption, Multi Tenancy based Access Control, Intrusion Detection System, firewalls, penetration testing, tokenization, VPN (Virtual Private Networks), and avoiding public internet connections and many more techniques. But the thing is not so simple how we think, even implementation of number of security techniques there is always security issues are involved for the cloud system. As cloud system is managed and accessed over internet so a lot of challenges arises during maintaining a secure cloud. Some cloud security challenges are ● Control over cloud data ● Misconfiguration ● Ever changing workload ● Access Management ● Disaster recovery