cloud security challenges and risk.pptx

NADAR SARASWATHI COLLEGE
OF ARTS AND SCIENCE , THENI.
CLOUD SECURITY CHALLENGE AND RISK
SUBMITTED BY:
B.POORANI
II-MSC(CS)
Cloud Computing :
• Cloud Computing is a type of technology that provides remote
services on the internet to manage, access, and store data rather
than storing it on Servers or local drives. This technology is also
known as Serverless technology
SECURITY ISSUES IN CLOUD COMPUTING
• There is no doubt that Cloud Computing provides various Advantages but
there are also some security issues in cloud computing.
• Cloud computing provides various advantages, such as improved
collaboration, excellent accessibility, Mobility, Storage capacity, etc.
Data Loss
• Data Loss is one of the issues faced in Cloud Computing. This is also known
as Data Leakage. As we know that our sensitive data is in the hands of
Somebody else, and we don’t have full control over our database.
• Data loss is the process in which data is being deleted, corrupted, and
unreadable by a user, software, or application.
Hacked Interfaces and Insecure APIs
• if we are talking about the cloud and its services it means we are talking
about the Internet. Also, we know that the easiest way to communicate with
Cloud is using API.
• So it is important to protect the Interface’s and API’s which are used by an
external user. But also in cloud computing, few services are available in the
public domain which are the vulnerable part of Cloud Computing because it
may be possible that these services are accessed by some third parties.
Account Hijacking
• Account Hijacking is the most serious security issue in Cloud Computing. If
somehow the Account of User or an Organization is hijacked by a hacker
then the hacker has full authority to perform Unauthorized Activities.
Changing Service Provider
• Vendor lock-In is also an important Security issue in Cloud Computing.
Many organizations will face different problems while shifting from one
vendor to another
Lack of Skill
• While working, shifting to another service provider, need an extra feature,
how to use a feature, etc. are the main problems caused in IT Company who
doesn’t have skilled Employees. So it requires a skilled person to work with
Cloud Computing.
Denial of Service (DoS) attack
• This type of attack occurs when the system receives too much traffic. Mostly
DoS attacks occur in large organizations such as the banking sector,
government sector, etc.
• When a DoS attack occurs, data is lost. So, in order to recover data, it
requires a great amount of money as well as time to handle it.
THANK YOU
1 of 9

Recommended

ICRTITCS-2012 Conference Publication by
ICRTITCS-2012 Conference PublicationICRTITCS-2012 Conference Publication
ICRTITCS-2012 Conference PublicationTejaswi Agarwal
625 views20 slides
UNIT -V.docx by
UNIT -V.docxUNIT -V.docx
UNIT -V.docxRevathiparamanathan
35 views49 slides
Cloud computing by
Cloud  computingCloud  computing
Cloud computingSonu Khanna
118 views15 slides
Cloud Computing Security Challenges by
Cloud Computing Security ChallengesCloud Computing Security Challenges
Cloud Computing Security ChallengesYateesh Yadav
11.8K views12 slides
10 security concerns cloud computing by
10 security concerns cloud computing10 security concerns cloud computing
10 security concerns cloud computingHossam Zein
734 views7 slides
Module 5-cloud computing-SECURITY IN THE CLOUD by
Module 5-cloud computing-SECURITY IN THE CLOUDModule 5-cloud computing-SECURITY IN THE CLOUD
Module 5-cloud computing-SECURITY IN THE CLOUDSweta Kumari Barnwal
522 views14 slides

More Related Content

Similar to cloud security challenges and risk.pptx

Cloud Computing by
Cloud ComputingCloud Computing
Cloud ComputingAzhar Hassan
77 views4 slides
How secured and safe is Cloud? by
How secured and safe is Cloud?How secured and safe is Cloud?
How secured and safe is Cloud?IRJET Journal
2 views3 slides
AFP 2016 - Why the cloud is good for treasury by
AFP 2016 - Why the cloud is good for treasuryAFP 2016 - Why the cloud is good for treasury
AFP 2016 - Why the cloud is good for treasuryCraig Gross, CFA, CTP
179 views22 slides
Cloude Computing by
Cloude ComputingCloude Computing
Cloude ComputingKimberly High
3 views41 slides
Risks and Benefits of Cloud Computing by
Risks and Benefits of Cloud ComputingRisks and Benefits of Cloud Computing
Risks and Benefits of Cloud ComputingDLA Piper (Canada) LLP
450 views30 slides
Introduction Of Cloud Computing by
Introduction Of Cloud Computing Introduction Of Cloud Computing
Introduction Of Cloud Computing Md Nazrul Islam Roxy
638 views28 slides

Similar to cloud security challenges and risk.pptx(20)

How secured and safe is Cloud? by IRJET Journal
How secured and safe is Cloud?How secured and safe is Cloud?
How secured and safe is Cloud?
IRJET Journal2 views
Security Issues in Cloud Computing Solution of DDOS and Introducing Two-Tier ... by ijccsa
Security Issues in Cloud Computing Solution of DDOS and Introducing Two-Tier ...Security Issues in Cloud Computing Solution of DDOS and Introducing Two-Tier ...
Security Issues in Cloud Computing Solution of DDOS and Introducing Two-Tier ...
ijccsa2.7K views
Cloud computing seminar report by shafzonly
Cloud computing seminar reportCloud computing seminar report
Cloud computing seminar report
shafzonly1.2K views
Introduction to Cloud computing by Kumayl Rajani
Introduction to Cloud computingIntroduction to Cloud computing
Introduction to Cloud computing
Kumayl Rajani222 views
Cloud Computing Risks by Ravi Namboori Cisco Evangelist by Ravi namboori
Cloud Computing Risks by Ravi Namboori Cisco EvangelistCloud Computing Risks by Ravi Namboori Cisco Evangelist
Cloud Computing Risks by Ravi Namboori Cisco Evangelist
Ravi namboori136 views
Cloud Computing Security Threats and Responses by shafzonly
Cloud Computing Security Threats and ResponsesCloud Computing Security Threats and Responses
Cloud Computing Security Threats and Responses
shafzonly2.3K views
Cloud Computing - True Vision Technologies by Scottperrone
Cloud Computing  - True Vision TechnologiesCloud Computing  - True Vision Technologies
Cloud Computing - True Vision Technologies
Scottperrone1.3K views
Security in cloud computing kashyap kunal by Kashyap Kunal
Security in cloud computing  kashyap kunalSecurity in cloud computing  kashyap kunal
Security in cloud computing kashyap kunal
Kashyap Kunal633 views
Cloud computing- Benefits,Future and Challenges by RohitKumar3153
Cloud computing- Benefits,Future and Challenges Cloud computing- Benefits,Future and Challenges
Cloud computing- Benefits,Future and Challenges
RohitKumar3153161 views
Unit 1.2 move to cloud computing by eShikshak
Unit 1.2   move to cloud computingUnit 1.2   move to cloud computing
Unit 1.2 move to cloud computing
eShikshak870 views
Unit 4 -Cloud Computing and security by MonishaNehkal
Unit 4 -Cloud Computing and securityUnit 4 -Cloud Computing and security
Unit 4 -Cloud Computing and security
MonishaNehkal358 views
Solutions of cloud computing security issues by Jahangeer Qadiree
Solutions of cloud computing security issuesSolutions of cloud computing security issues
Solutions of cloud computing security issues
Jahangeer Qadiree406 views

More from soundaryasellapandia

apache hadOop.pdf by
apache hadOop.pdfapache hadOop.pdf
apache hadOop.pdfsoundaryasellapandia
8 views10 slides
Microfinance and entrepreneur skill and competition by
Microfinance and entrepreneur skill and competitionMicrofinance and entrepreneur skill and competition
Microfinance and entrepreneur skill and competitionsoundaryasellapandia
12 views11 slides
Color quantization by
Color quantizationColor quantization
Color quantizationsoundaryasellapandia
13 views10 slides
artificial intelligence.pptx by
artificial intelligence.pptxartificial intelligence.pptx
artificial intelligence.pptxsoundaryasellapandia
7 views8 slides
cloud computing.pdf by
cloud computing.pdfcloud computing.pdf
cloud computing.pdfsoundaryasellapandia
6 views9 slides
ARTIFICIAL INTELIGENCE.pdf by
ARTIFICIAL INTELIGENCE.pdfARTIFICIAL INTELIGENCE.pdf
ARTIFICIAL INTELIGENCE.pdfsoundaryasellapandia
10 views9 slides

Recently uploaded

GDG Cloud Southlake 28 Brad Taylor and Shawn Augenstein Old Problems in the N... by
GDG Cloud Southlake 28 Brad Taylor and Shawn Augenstein Old Problems in the N...GDG Cloud Southlake 28 Brad Taylor and Shawn Augenstein Old Problems in the N...
GDG Cloud Southlake 28 Brad Taylor and Shawn Augenstein Old Problems in the N...James Anderson
126 views32 slides
"Node.js Development in 2024: trends and tools", Nikita Galkin by
"Node.js Development in 2024: trends and tools", Nikita Galkin "Node.js Development in 2024: trends and tools", Nikita Galkin
"Node.js Development in 2024: trends and tools", Nikita Galkin Fwdays
17 views38 slides
Mini-Track: Challenges to Network Automation Adoption by
Mini-Track: Challenges to Network Automation AdoptionMini-Track: Challenges to Network Automation Adoption
Mini-Track: Challenges to Network Automation AdoptionNetwork Automation Forum
17 views27 slides
Special_edition_innovator_2023.pdf by
Special_edition_innovator_2023.pdfSpecial_edition_innovator_2023.pdf
Special_edition_innovator_2023.pdfWillDavies22
18 views6 slides
SUPPLIER SOURCING.pptx by
SUPPLIER SOURCING.pptxSUPPLIER SOURCING.pptx
SUPPLIER SOURCING.pptxangelicacueva6
20 views1 slide
Microsoft Power Platform.pptx by
Microsoft Power Platform.pptxMicrosoft Power Platform.pptx
Microsoft Power Platform.pptxUni Systems S.M.S.A.
61 views38 slides

Recently uploaded(20)

GDG Cloud Southlake 28 Brad Taylor and Shawn Augenstein Old Problems in the N... by James Anderson
GDG Cloud Southlake 28 Brad Taylor and Shawn Augenstein Old Problems in the N...GDG Cloud Southlake 28 Brad Taylor and Shawn Augenstein Old Problems in the N...
GDG Cloud Southlake 28 Brad Taylor and Shawn Augenstein Old Problems in the N...
James Anderson126 views
"Node.js Development in 2024: trends and tools", Nikita Galkin by Fwdays
"Node.js Development in 2024: trends and tools", Nikita Galkin "Node.js Development in 2024: trends and tools", Nikita Galkin
"Node.js Development in 2024: trends and tools", Nikita Galkin
Fwdays17 views
Special_edition_innovator_2023.pdf by WillDavies22
Special_edition_innovator_2023.pdfSpecial_edition_innovator_2023.pdf
Special_edition_innovator_2023.pdf
WillDavies2218 views
Case Study Copenhagen Energy and Business Central.pdf by Aitana
Case Study Copenhagen Energy and Business Central.pdfCase Study Copenhagen Energy and Business Central.pdf
Case Study Copenhagen Energy and Business Central.pdf
Aitana17 views
"Running students' code in isolation. The hard way", Yurii Holiuk by Fwdays
"Running students' code in isolation. The hard way", Yurii Holiuk "Running students' code in isolation. The hard way", Yurii Holiuk
"Running students' code in isolation. The hard way", Yurii Holiuk
Fwdays24 views
Business Analyst Series 2023 - Week 3 Session 5 by DianaGray10
Business Analyst Series 2023 -  Week 3 Session 5Business Analyst Series 2023 -  Week 3 Session 5
Business Analyst Series 2023 - Week 3 Session 5
DianaGray10345 views
2024: A Travel Odyssey The Role of Generative AI in the Tourism Universe by Simone Puorto
2024: A Travel Odyssey The Role of Generative AI in the Tourism Universe2024: A Travel Odyssey The Role of Generative AI in the Tourism Universe
2024: A Travel Odyssey The Role of Generative AI in the Tourism Universe
Simone Puorto13 views
Automating a World-Class Technology Conference; Behind the Scenes of CiscoLive by Network Automation Forum
Automating a World-Class Technology Conference; Behind the Scenes of CiscoLiveAutomating a World-Class Technology Conference; Behind the Scenes of CiscoLive
Automating a World-Class Technology Conference; Behind the Scenes of CiscoLive
Webinar : Desperately Seeking Transformation - Part 2: Insights from leading... by The Digital Insurer
Webinar : Desperately Seeking Transformation - Part 2:  Insights from leading...Webinar : Desperately Seeking Transformation - Part 2:  Insights from leading...
Webinar : Desperately Seeking Transformation - Part 2: Insights from leading...
SAP Automation Using Bar Code and FIORI.pdf by Virendra Rai, PMP
SAP Automation Using Bar Code and FIORI.pdfSAP Automation Using Bar Code and FIORI.pdf
SAP Automation Using Bar Code and FIORI.pdf
ESPC 2023 - Protect and Govern your Sensitive Data with Microsoft Purview in ... by Jasper Oosterveld
ESPC 2023 - Protect and Govern your Sensitive Data with Microsoft Purview in ...ESPC 2023 - Protect and Govern your Sensitive Data with Microsoft Purview in ...
ESPC 2023 - Protect and Govern your Sensitive Data with Microsoft Purview in ...
PharoJS - Zürich Smalltalk Group Meetup November 2023 by Noury Bouraqadi
PharoJS - Zürich Smalltalk Group Meetup November 2023PharoJS - Zürich Smalltalk Group Meetup November 2023
PharoJS - Zürich Smalltalk Group Meetup November 2023
Noury Bouraqadi139 views
The Forbidden VPN Secrets.pdf by Mariam Shaba
The Forbidden VPN Secrets.pdfThe Forbidden VPN Secrets.pdf
The Forbidden VPN Secrets.pdf
Mariam Shaba20 views
STPI OctaNE CoE Brochure.pdf by madhurjyapb
STPI OctaNE CoE Brochure.pdfSTPI OctaNE CoE Brochure.pdf
STPI OctaNE CoE Brochure.pdf
madhurjyapb14 views

cloud security challenges and risk.pptx

  • 1. NADAR SARASWATHI COLLEGE OF ARTS AND SCIENCE , THENI. CLOUD SECURITY CHALLENGE AND RISK SUBMITTED BY: B.POORANI II-MSC(CS)
  • 2. Cloud Computing : • Cloud Computing is a type of technology that provides remote services on the internet to manage, access, and store data rather than storing it on Servers or local drives. This technology is also known as Serverless technology
  • 3. SECURITY ISSUES IN CLOUD COMPUTING • There is no doubt that Cloud Computing provides various Advantages but there are also some security issues in cloud computing. • Cloud computing provides various advantages, such as improved collaboration, excellent accessibility, Mobility, Storage capacity, etc.
  • 4. Data Loss • Data Loss is one of the issues faced in Cloud Computing. This is also known as Data Leakage. As we know that our sensitive data is in the hands of Somebody else, and we don’t have full control over our database. • Data loss is the process in which data is being deleted, corrupted, and unreadable by a user, software, or application.
  • 5. Hacked Interfaces and Insecure APIs • if we are talking about the cloud and its services it means we are talking about the Internet. Also, we know that the easiest way to communicate with Cloud is using API. • So it is important to protect the Interface’s and API’s which are used by an external user. But also in cloud computing, few services are available in the public domain which are the vulnerable part of Cloud Computing because it may be possible that these services are accessed by some third parties.
  • 6. Account Hijacking • Account Hijacking is the most serious security issue in Cloud Computing. If somehow the Account of User or an Organization is hijacked by a hacker then the hacker has full authority to perform Unauthorized Activities. Changing Service Provider • Vendor lock-In is also an important Security issue in Cloud Computing. Many organizations will face different problems while shifting from one vendor to another
  • 7. Lack of Skill • While working, shifting to another service provider, need an extra feature, how to use a feature, etc. are the main problems caused in IT Company who doesn’t have skilled Employees. So it requires a skilled person to work with Cloud Computing.
  • 8. Denial of Service (DoS) attack • This type of attack occurs when the system receives too much traffic. Mostly DoS attacks occur in large organizations such as the banking sector, government sector, etc. • When a DoS attack occurs, data is lost. So, in order to recover data, it requires a great amount of money as well as time to handle it.