SlideShare a Scribd company logo
1 of 9
NADAR SARASWATHI COLLEGE
OF ARTS AND SCIENCE , THENI.
CLOUD SECURITY CHALLENGE AND RISK
SUBMITTED BY:
B.POORANI
II-MSC(CS)
Cloud Computing :
• Cloud Computing is a type of technology that provides remote
services on the internet to manage, access, and store data rather
than storing it on Servers or local drives. This technology is also
known as Serverless technology
SECURITY ISSUES IN CLOUD COMPUTING
• There is no doubt that Cloud Computing provides various Advantages but
there are also some security issues in cloud computing.
• Cloud computing provides various advantages, such as improved
collaboration, excellent accessibility, Mobility, Storage capacity, etc.
Data Loss
• Data Loss is one of the issues faced in Cloud Computing. This is also known
as Data Leakage. As we know that our sensitive data is in the hands of
Somebody else, and we don’t have full control over our database.
• Data loss is the process in which data is being deleted, corrupted, and
unreadable by a user, software, or application.
Hacked Interfaces and Insecure APIs
• if we are talking about the cloud and its services it means we are talking
about the Internet. Also, we know that the easiest way to communicate with
Cloud is using API.
• So it is important to protect the Interface’s and API’s which are used by an
external user. But also in cloud computing, few services are available in the
public domain which are the vulnerable part of Cloud Computing because it
may be possible that these services are accessed by some third parties.
Account Hijacking
• Account Hijacking is the most serious security issue in Cloud Computing. If
somehow the Account of User or an Organization is hijacked by a hacker
then the hacker has full authority to perform Unauthorized Activities.
Changing Service Provider
• Vendor lock-In is also an important Security issue in Cloud Computing.
Many organizations will face different problems while shifting from one
vendor to another
Lack of Skill
• While working, shifting to another service provider, need an extra feature,
how to use a feature, etc. are the main problems caused in IT Company who
doesn’t have skilled Employees. So it requires a skilled person to work with
Cloud Computing.
Denial of Service (DoS) attack
• This type of attack occurs when the system receives too much traffic. Mostly
DoS attacks occur in large organizations such as the banking sector,
government sector, etc.
• When a DoS attack occurs, data is lost. So, in order to recover data, it
requires a great amount of money as well as time to handle it.
THANK YOU

More Related Content

Similar to cloud security challenges and risk.pptx

Security in Cloud Computing
Security in Cloud ComputingSecurity in Cloud Computing
Security in Cloud Computing
Rohit Buddabathina
 
AFP 2016 - Why the cloud is good for treasury
AFP 2016 - Why the cloud is good for treasuryAFP 2016 - Why the cloud is good for treasury
AFP 2016 - Why the cloud is good for treasury
Craig Gross, CFA, CTP
 
Security in cloud computing kashyap kunal
Security in cloud computing  kashyap kunalSecurity in cloud computing  kashyap kunal
Security in cloud computing kashyap kunal
Kashyap Kunal
 

Similar to cloud security challenges and risk.pptx (20)

Security in Cloud Computing
Security in Cloud ComputingSecurity in Cloud Computing
Security in Cloud Computing
 
Cloud Computing
Cloud ComputingCloud Computing
Cloud Computing
 
How secured and safe is Cloud?
How secured and safe is Cloud?How secured and safe is Cloud?
How secured and safe is Cloud?
 
AFP 2016 - Why the cloud is good for treasury
AFP 2016 - Why the cloud is good for treasuryAFP 2016 - Why the cloud is good for treasury
AFP 2016 - Why the cloud is good for treasury
 
Risks and Benefits of Cloud Computing
Risks and Benefits of Cloud ComputingRisks and Benefits of Cloud Computing
Risks and Benefits of Cloud Computing
 
Introduction Of Cloud Computing
Introduction Of Cloud Computing Introduction Of Cloud Computing
Introduction Of Cloud Computing
 
Security Issues in Cloud Computing Solution of DDOS and Introducing Two-Tier ...
Security Issues in Cloud Computing Solution of DDOS and Introducing Two-Tier ...Security Issues in Cloud Computing Solution of DDOS and Introducing Two-Tier ...
Security Issues in Cloud Computing Solution of DDOS and Introducing Two-Tier ...
 
Cloud computing seminar report
Cloud computing seminar reportCloud computing seminar report
Cloud computing seminar report
 
Business in the cloud
Business in the cloudBusiness in the cloud
Business in the cloud
 
Introduction to Cloud computing
Introduction to Cloud computingIntroduction to Cloud computing
Introduction to Cloud computing
 
Cloud Computing Risks by Ravi Namboori Cisco Evangelist
Cloud Computing Risks by Ravi Namboori Cisco EvangelistCloud Computing Risks by Ravi Namboori Cisco Evangelist
Cloud Computing Risks by Ravi Namboori Cisco Evangelist
 
cloud computing Architecture in Details.ppt
cloud computing Architecture in Details.pptcloud computing Architecture in Details.ppt
cloud computing Architecture in Details.ppt
 
Cloud Computing Security Threats and Responses
Cloud Computing Security Threats and ResponsesCloud Computing Security Threats and Responses
Cloud Computing Security Threats and Responses
 
Cloud computing
Cloud computingCloud computing
Cloud computing
 
Cloud computing
Cloud computingCloud computing
Cloud computing
 
Lecture 1.Basics of cloud computing, Advantage and Disadvantage and History
Lecture 1.Basics of cloud computing, Advantage and Disadvantage and HistoryLecture 1.Basics of cloud computing, Advantage and Disadvantage and History
Lecture 1.Basics of cloud computing, Advantage and Disadvantage and History
 
Cloud Computing - True Vision Technologies
Cloud Computing  - True Vision TechnologiesCloud Computing  - True Vision Technologies
Cloud Computing - True Vision Technologies
 
Security in cloud computing kashyap kunal
Security in cloud computing  kashyap kunalSecurity in cloud computing  kashyap kunal
Security in cloud computing kashyap kunal
 
Cloud computing- Benefits,Future and Challenges
Cloud computing- Benefits,Future and Challenges Cloud computing- Benefits,Future and Challenges
Cloud computing- Benefits,Future and Challenges
 
Unit 1.2 move to cloud computing
Unit 1.2   move to cloud computingUnit 1.2   move to cloud computing
Unit 1.2 move to cloud computing
 

More from soundaryasellapandia (10)

apache hadOop.pdf
apache hadOop.pdfapache hadOop.pdf
apache hadOop.pdf
 
Microfinance and entrepreneur skill and competition
Microfinance and entrepreneur skill and competitionMicrofinance and entrepreneur skill and competition
Microfinance and entrepreneur skill and competition
 
Color quantization
Color quantizationColor quantization
Color quantization
 
artificial intelligence.pptx
artificial intelligence.pptxartificial intelligence.pptx
artificial intelligence.pptx
 
cloud computing.pdf
cloud computing.pdfcloud computing.pdf
cloud computing.pdf
 
ARTIFICIAL INTELIGENCE.pdf
ARTIFICIAL INTELIGENCE.pdfARTIFICIAL INTELIGENCE.pdf
ARTIFICIAL INTELIGENCE.pdf
 
Memory management
Memory managementMemory management
Memory management
 
Web security
Web securityWeb security
Web security
 
Querying a graph
Querying a graphQuerying a graph
Querying a graph
 
Integration java with python.pdf
Integration java with python.pdfIntegration java with python.pdf
Integration java with python.pdf
 

Recently uploaded

Hyatt driving innovation and exceptional customer experiences with FIDO passw...
Hyatt driving innovation and exceptional customer experiences with FIDO passw...Hyatt driving innovation and exceptional customer experiences with FIDO passw...
Hyatt driving innovation and exceptional customer experiences with FIDO passw...
FIDO Alliance
 

Recently uploaded (20)

Frisco Automating Purchase Orders with MuleSoft IDP- May 10th, 2024.pptx.pdf
Frisco Automating Purchase Orders with MuleSoft IDP- May 10th, 2024.pptx.pdfFrisco Automating Purchase Orders with MuleSoft IDP- May 10th, 2024.pptx.pdf
Frisco Automating Purchase Orders with MuleSoft IDP- May 10th, 2024.pptx.pdf
 
Using IESVE for Room Loads Analysis - UK & Ireland
Using IESVE for Room Loads Analysis - UK & IrelandUsing IESVE for Room Loads Analysis - UK & Ireland
Using IESVE for Room Loads Analysis - UK & Ireland
 
UiPath manufacturing technology benefits and AI overview
UiPath manufacturing technology benefits and AI overviewUiPath manufacturing technology benefits and AI overview
UiPath manufacturing technology benefits and AI overview
 
Google I/O Extended 2024 Warsaw
Google I/O Extended 2024 WarsawGoogle I/O Extended 2024 Warsaw
Google I/O Extended 2024 Warsaw
 
How to Check CNIC Information Online with Pakdata cf
How to Check CNIC Information Online with Pakdata cfHow to Check CNIC Information Online with Pakdata cf
How to Check CNIC Information Online with Pakdata cf
 
TEST BANK For, Information Technology Project Management 9th Edition Kathy Sc...
TEST BANK For, Information Technology Project Management 9th Edition Kathy Sc...TEST BANK For, Information Technology Project Management 9th Edition Kathy Sc...
TEST BANK For, Information Technology Project Management 9th Edition Kathy Sc...
 
ADP Passwordless Journey Case Study.pptx
ADP Passwordless Journey Case Study.pptxADP Passwordless Journey Case Study.pptx
ADP Passwordless Journey Case Study.pptx
 
How we scaled to 80K users by doing nothing!.pdf
How we scaled to 80K users by doing nothing!.pdfHow we scaled to 80K users by doing nothing!.pdf
How we scaled to 80K users by doing nothing!.pdf
 
Hyatt driving innovation and exceptional customer experiences with FIDO passw...
Hyatt driving innovation and exceptional customer experiences with FIDO passw...Hyatt driving innovation and exceptional customer experiences with FIDO passw...
Hyatt driving innovation and exceptional customer experiences with FIDO passw...
 
JavaScript Usage Statistics 2024 - The Ultimate Guide
JavaScript Usage Statistics 2024 - The Ultimate GuideJavaScript Usage Statistics 2024 - The Ultimate Guide
JavaScript Usage Statistics 2024 - The Ultimate Guide
 
ERP Contender Series: Acumatica vs. Sage Intacct
ERP Contender Series: Acumatica vs. Sage IntacctERP Contender Series: Acumatica vs. Sage Intacct
ERP Contender Series: Acumatica vs. Sage Intacct
 
Design Guidelines for Passkeys 2024.pptx
Design Guidelines for Passkeys 2024.pptxDesign Guidelines for Passkeys 2024.pptx
Design Guidelines for Passkeys 2024.pptx
 
Oauth 2.0 Introduction and Flows with MuleSoft
Oauth 2.0 Introduction and Flows with MuleSoftOauth 2.0 Introduction and Flows with MuleSoft
Oauth 2.0 Introduction and Flows with MuleSoft
 
Syngulon - Selection technology May 2024.pdf
Syngulon - Selection technology May 2024.pdfSyngulon - Selection technology May 2024.pdf
Syngulon - Selection technology May 2024.pdf
 
(Explainable) Data-Centric AI: what are you explaininhg, and to whom?
(Explainable) Data-Centric AI: what are you explaininhg, and to whom?(Explainable) Data-Centric AI: what are you explaininhg, and to whom?
(Explainable) Data-Centric AI: what are you explaininhg, and to whom?
 
Continuing Bonds Through AI: A Hermeneutic Reflection on Thanabots
Continuing Bonds Through AI: A Hermeneutic Reflection on ThanabotsContinuing Bonds Through AI: A Hermeneutic Reflection on Thanabots
Continuing Bonds Through AI: A Hermeneutic Reflection on Thanabots
 
Observability Concepts EVERY Developer Should Know (DevOpsDays Seattle)
Observability Concepts EVERY Developer Should Know (DevOpsDays Seattle)Observability Concepts EVERY Developer Should Know (DevOpsDays Seattle)
Observability Concepts EVERY Developer Should Know (DevOpsDays Seattle)
 
Introduction to FIDO Authentication and Passkeys.pptx
Introduction to FIDO Authentication and Passkeys.pptxIntroduction to FIDO Authentication and Passkeys.pptx
Introduction to FIDO Authentication and Passkeys.pptx
 
Event-Driven Architecture Masterclass: Engineering a Robust, High-performance...
Event-Driven Architecture Masterclass: Engineering a Robust, High-performance...Event-Driven Architecture Masterclass: Engineering a Robust, High-performance...
Event-Driven Architecture Masterclass: Engineering a Robust, High-performance...
 
Event-Driven Architecture Masterclass: Integrating Distributed Data Stores Ac...
Event-Driven Architecture Masterclass: Integrating Distributed Data Stores Ac...Event-Driven Architecture Masterclass: Integrating Distributed Data Stores Ac...
Event-Driven Architecture Masterclass: Integrating Distributed Data Stores Ac...
 

cloud security challenges and risk.pptx

  • 1. NADAR SARASWATHI COLLEGE OF ARTS AND SCIENCE , THENI. CLOUD SECURITY CHALLENGE AND RISK SUBMITTED BY: B.POORANI II-MSC(CS)
  • 2. Cloud Computing : • Cloud Computing is a type of technology that provides remote services on the internet to manage, access, and store data rather than storing it on Servers or local drives. This technology is also known as Serverless technology
  • 3. SECURITY ISSUES IN CLOUD COMPUTING • There is no doubt that Cloud Computing provides various Advantages but there are also some security issues in cloud computing. • Cloud computing provides various advantages, such as improved collaboration, excellent accessibility, Mobility, Storage capacity, etc.
  • 4. Data Loss • Data Loss is one of the issues faced in Cloud Computing. This is also known as Data Leakage. As we know that our sensitive data is in the hands of Somebody else, and we don’t have full control over our database. • Data loss is the process in which data is being deleted, corrupted, and unreadable by a user, software, or application.
  • 5. Hacked Interfaces and Insecure APIs • if we are talking about the cloud and its services it means we are talking about the Internet. Also, we know that the easiest way to communicate with Cloud is using API. • So it is important to protect the Interface’s and API’s which are used by an external user. But also in cloud computing, few services are available in the public domain which are the vulnerable part of Cloud Computing because it may be possible that these services are accessed by some third parties.
  • 6. Account Hijacking • Account Hijacking is the most serious security issue in Cloud Computing. If somehow the Account of User or an Organization is hijacked by a hacker then the hacker has full authority to perform Unauthorized Activities. Changing Service Provider • Vendor lock-In is also an important Security issue in Cloud Computing. Many organizations will face different problems while shifting from one vendor to another
  • 7. Lack of Skill • While working, shifting to another service provider, need an extra feature, how to use a feature, etc. are the main problems caused in IT Company who doesn’t have skilled Employees. So it requires a skilled person to work with Cloud Computing.
  • 8. Denial of Service (DoS) attack • This type of attack occurs when the system receives too much traffic. Mostly DoS attacks occur in large organizations such as the banking sector, government sector, etc. • When a DoS attack occurs, data is lost. So, in order to recover data, it requires a great amount of money as well as time to handle it.