SlideShare a Scribd company logo
1 of 56
Information Security 365/765, Fall Semester, 2016
Course Instructor, Nicholas Davis, CISA, CISSP
Lecture 11, Cloud Security and BYOD Security
Today’s Chocolate BarToday’s Chocolate Bar
100 Grand100 Grand
100 Grand Bar (formerly known as $100,000 Bar spoken as "hundred
thousand dollar bar" until the mid 1980s) is a candy bar produced by
Nestlé in the United States. The candy bar was created in 1966, and
named after a series of successful game shows. It weighs 1.5 ounces (42
grams) and includes chocolate, caramel and crisped rice. The bar
contains 190 calories; it is low in cholesterol and sodium, but high in
saturated fat and sugar. Its slogan is "That's Rich!“
The mini 100 Grand bars we are eating today in class, are 93 calories
each!
11/03/16 UNIVERSITY OF WISCONSIN 2
Today’s AgendaToday’s Agenda
• Exam 2, proposed date, November 17, instead
of Thanksgiving week.
• Turkey, stuffing, mashed potatoes and pie are
more important than an exam!
• However, you may make alternate
arrangements if November 17th
does not fit
well with your schedule. See me after class
• Cloud Security
• BYOD Security
• Written assignment #4 is assigned
• Distribution of list for team project work
11/03/16 UNIVERSITY OF WISCONSIN 3
Why are We Covering CloudWhy are We Covering Cloud
and BYOD Together?and BYOD Together?
Let’s Discuss the Technical SpecificsLet’s Discuss the Technical Specifics
of What Could Have Happenedof What Could Have Happened
11/03/16 UNIVERSITY OF WISCONSIN 4
In My OpinionIn My Opinion
• Probably NOT Huma’s primary computer
work computer, but rather, an un-inventoried
BYOD, long forgotten about
• Shared OS user account, Huma and Anthony
• Perhaps without password on the OS
• Full email client probably auto-launched in
background upon OS login, with cached
(memorized) password
11/03/16 UNIVERSITY OF WISCONSIN 5
In My OpinionIn My Opinion
(Educated Guess)(Educated Guess)
11/03/16 UNIVERSITY OF WISCONSIN 6
Meanwhile, on PrimaryMeanwhile, on Primary
Computer, No Sign of DuplicateComputer, No Sign of Duplicate
Remote Email Client LoginRemote Email Client Login
11/03/16 UNIVERSITY OF WISCONSIN 7
The CloudThe Cloud
Cloud computing describes a type of
outsourcing of computer services, similar to
the way in which electricity supply is
outsourced. Users can simply use it. They
do not need to worry where the computing
resource is from, how it is made, or
transported.
A subscription based service
11/03/16 UNIVERSITY OF WISCONSIN 8
Cloud SecurityCloud Security
Cloud Security refers to a
broad set of policies,
technologies, and
controls deployed to
protect data,
applications, and the
associated infrastructure
of cloud computing.
11/03/16 UNIVERSITY OF WISCONSIN 9
Cloud Service ModelsCloud Service Models
Software as a Service
Platform as a Service
Infrastructure as a Service
11/03/16 UNIVERSITY OF WISCONSIN 10
Three ModelsThree Models
of Cloud Computing SaaSof Cloud Computing SaaS
• Software as a Service
• “Consume”
• Web browser provides point of
access
• Software management is moved
to a third party
• Examples: Salesforce and Google
Apps
11/03/16 UNIVERSITY OF WISCONSIN 11
Three ModelsThree Models
of Cloud Computing PaaSof Cloud Computing PaaS
• Platform as a Service
• “Host”
• Hardware is managed externally
• Operating System is managed externally
• Network is managed externally
• The customer builds, installs and manages
their specific applications
• Examples: Google App Engine, and Red
Hat’s OpenShift
11/03/16 UNIVERSITY OF WISCONSIN 12
Three ModelsThree Models
of Cloud Computing IaaSof Cloud Computing IaaS
• Infrastructure as a Service
• “Build”
• Cloud servers and associated resources are
made available
• Customer controls architecture
• Customer controls OS
• Customer controls software applications
• Examples: Navisite and Exoscale
11/03/16 UNIVERSITY OF WISCONSIN 13
Cloud Deployment ModelsCloud Deployment Models
Private
Public
Hybrid
11/03/16 UNIVERSITY OF WISCONSIN 14
Private CloudPrivate Cloud
Private cloud is cloud
infrastructure operated
solely for a single
organization, whether
managed internally or by a
third-party, and hosted
either internally or
externally
11/03/16 UNIVERSITY OF WISCONSIN 15
Public CloudPublic Cloud
A cloud is called a "public cloud" when the
services are rendered over a network that is
open for public use.
Technically there may be little or no
difference between public and private cloud
architecture, however, security
consideration may be substantially different
for services (applications, storage, and
other resources) that are made available by
a service provider
11/03/16 UNIVERSITY OF WISCONSIN 16
Hybrid CloudHybrid Cloud
Hybrid cloud is a composition of two or
more clouds (private, community or
public) that remain distinct entities but are
bound together, offering the benefits of
multiple deployment models. Hybrid cloud
can also mean the ability to connect
collocation, managed and/or dedicated
services with cloud resources.
11/03/16 UNIVERSITY OF WISCONSIN 17
Provider vs CustomerProvider vs Customer
Security ConcernsSecurity Concerns
• Provider must make sure that proper
security controls are in place and that their
services are being correctly represented.
For example, HIPAA compliant from a
physical security perspective
• Customer must verify controls are up to
standards and ensure that portions for
which they have control, are securely
managed. For example, how they issue
login credentials to systems
11/03/16 UNIVERSITY OF WISCONSIN 18
Suggested ControlsSuggested Controls
For Cloud SecurityFor Cloud Security
• Gartner breaks it down into seven areas
• The Cloud Security Alliance has fourteen
• Nicholas Davis has 10 areas
“The nice thing about standards is that there are so
many to choose from” (Note the contradiction)
What really matters is that you take a
comprehensive approach, no matter how you
break it down into varying categories. Take
nothing for granted!
11/03/16 UNIVERSITY OF WISCONSIN 19
CloudCloud
Physical SecurityPhysical Security
1. The location where the hardware and software
resides must not be publicly accessible
2. The location where the hardware and software
reside must be access controlled in such a manner as
to make all entry and exits attempts, successful or
unsuccessful, logged and auditable
3. The procedure for third party access to the
physical facility must be documented and agreed to
by the customer
11/03/16 UNIVERSITY OF WISCONSIN 20
CloudCloud
Physical SecurityPhysical Security
4. All visitors to the secured area where the
hardware and software reside must be accompanied
by an authorized escort, agreed to by the customer
5. All people accessing the secured area where the
hardware and software reside, must have and
display ID badges at all times
6. The secured area must be monitored and
recorded by video camera at all times
11/03/16 UNIVERSITY OF WISCONSIN 21
Employee and Computing
Environment Reliability and
Integrity
1. The cloud service provider must perform a
criminal, work history, education history and
credit history background check on all of its
employees and produce the results for
inspection by the customer
2. The cloud service provider should be able
to produce a recent SSAE 16 SOC II report of
its facility, for inspection by the customer
11/03/16 UNIVERSITY OF WISCONSIN 22
Employee and Computing
Environment Reliability and
Integrity
3. The cloud service provider must be
able to produce a copy of its latest
vulnerability assessment and a list of
security risks and gaps which have
been addressed as a of the vulnerability
assessment
11/03/16 UNIVERSITY OF WISCONSIN 23
Cloud Data PersistenceCloud Data Persistence
1. List all locations where the customer’s
data will reside (City, State, Country)
2. Reference any legislation the company
adheres to in terms of data transmission
across organizational and geographic borders
3. Describe both the on-site and off-site data
backups of customer data the company
performs
11/03/16 UNIVERSITY OF WISCONSIN 24
Cloud Data PersistenceCloud Data Persistence
4. Does a subcontractor store data off-site? If
so, please describe.
5. Is the customer’s data encrypted in storage
and backup? If so, please describe
6. Describe how the company controls access
to backup storage and media
11/03/16 UNIVERSITY OF WISCONSIN 25
CloudCloud
Business ContinuityBusiness Continuity
1. Describe the company’s continuity plan
for addressing critical service failures, such
as power, heating, cooling, etc.
2. Describe the company’s continuity plan
for addressing natural disasters such as fire,
tornadoes, flooding, etc.
3. Describe the company’s response plan for
information technology or human related
security breaches of the facility
11/03/16 UNIVERSITY OF WISCONSIN 26
Cloud Network MonitoringCloud Network Monitoring
1. Does the cloud provider log network
traffic, file and server access?
2. All log files must be made available to the
customer, upon demand
11/03/16 UNIVERSITY OF WISCONSIN 27
Cloud Network MonitoringCloud Network Monitoring
3. Logs must record who accessed the
system, by what means, and what if any data
was accessed or changed
4. Security event logs should be captured for
all systems which are or which may
potentially be used for accessing and/or
managing customer data
11/03/16 UNIVERSITY OF WISCONSIN 28
Data Encryption and EntityData Encryption and Entity
AuthenticationAuthentication
1. Describe the specifics of how customer
data is encrypted at rest as well as in transit
2. Describe the authentication technologies
used to control administrative access to all
systems which may have access to customer
11/03/16 UNIVERSITY OF WISCONSIN 29
CloudCloud
Multi TenancyMulti Tenancy
1. Is the cloud infrastructure of the service
being considered by the customer multi-
tenant or is it dedicated only to the
customer’s system? Please describe the
controls in place to protect customer data, if
the environment is multi-tenant
2. Is the cloud service segmented using
virtual machines? If so, please describe the
architecture
11/03/16 UNIVERSITY OF WISCONSIN 30
CloudCloud
Service UptimeService Uptime
1. What is the specified service uptime and
availability of the cloud solution being
considered by the customer?
2. Does the cloud service have a fail over
site? If so, describe its performance
specifications/differences in comparison to
the primary site
11/03/16 UNIVERSITY OF WISCONSIN 31
CloudCloud
Service UptimeService Uptime
1. What is the specified service
uptime and availability of the cloud
solution being considered by the
customer?
2. Does the cloud service have a fail
over site? If so, describe its
performance
specifications/differences in
comparison to the primary site
11/03/16 UNIVERSITY OF WISCONSIN 32
CloudCloud
Service UptimeService Uptime
3. Are the security controls in
place at the fail over site different
in any way from the security
controls in place at the primary
site? If so, please describe
4. Does the cloud service provider
provide an “active-active”
consistent configuration between
the primary and fail over site?
11/03/16 UNIVERSITY OF WISCONSIN 33
Policy ConsistencyPolicy Consistency
Across OrganizationsAcross Organizations
1. Will the cloud service provider adhere to
applicable information security policies and
procedures of the customer?
2. Are there any customer IT security policies
which the cloud provider cannot adhere to? If
so, please describe
11/03/16 UNIVERSITY OF WISCONSIN 34
CloudCloud
Service Level AgreementService Level Agreement
Please provide a copy of the cloud service
provider’s proposed Service Level
Agreement (SLA) with the customer
11/03/16 UNIVERSITY OF WISCONSIN 35
Bring Your Own DeviceBring Your Own Device
BYOD (bring your own device) is the
increasing trend toward employee-owned
devices within a business. Smartphones are
the most common example but employees
also take their own tablets, laptops and USB
drives into the workplace.
11/03/16 UNIVERSITY OF WISCONSIN 36
BYOD Security, Flexibility,BYOD Security, Flexibility,
Security, ViolationsSecurity, Violations
• Although the ability to allow staff to work at any
time from anywhere and on any device provides
real business benefits; it also brings significant
risks.
• To ensure information does not end up in the
wrong hands, it’s imperative for companies to
put security measures in place.
• According to an IDG survey, more than half of
1,600 senior IT security and technology
purchase decision-makers reported serious
violations of personal mobile device use.
11/03/16 UNIVERSITY OF WISCONSIN 37
End Node ProblemEnd Node Problem
• BYOD security relates strongly to the end
node problem, wherein a device is used to
access both sensitive and risky
networks/services
• Risk-averse organizations issue devices
specifically for Internet use (this is
termed Inverse-BYOD)
11/03/16 UNIVERSITY OF WISCONSIN 38
Lost Devices, Sold DevicesLost Devices, Sold Devices
Memorized PasswordsMemorized Passwords
• BYOD has resulted in data breaches. For example, if an
employee uses a smartphone to access the company
network and then loses that phone or sells that phone,
untrusted parties could retrieve any unsecured data on
the phone.
• Another type of security breach occurs when an employee
leaves the company, they do not have to give back the
device, so company applications and other data may still
be present on their device
• If passwords are cached (remembered) by the phone,
anyone who has access to the device can now access the
password protected resources
11/03/16 UNIVERSITY OF WISCONSIN 39
Notable Statistics of ConcernNotable Statistics of Concern
11/03/16 UNIVERSITY OF WISCONSIN 40
Personal PrivacyPersonal Privacy
Drawing the LineDrawing the Line
IT Security departments that
wish to monitor usage of
personal devices must
ensure that they only
monitor work related
activities or activities that
accesses company data or
information
11/03/16 UNIVERSITY OF WISCONSIN 41
Malware InfectionsMalware Infections
Organizations who wish to adopt a BYOD
policy must also consider how they will
ensure that the devices which connect to the
organization’s network infrastructure to
access sensitive information will be protected
from malware.
11/03/16 UNIVERSITY OF WISCONSIN 42
Patching Many DifferentPatching Many Different
Models of BYODsModels of BYODs
BYOD policy must be prepared
to have the necessary systems
and processes in place that will
apply the patches to protect
systems against the known
vulnerabilities to the various
devices that users may choose to
use.
11/03/16 UNIVERSITY OF WISCONSIN 43
Mobile Device ManagementMobile Device Management
SolutionsSolutions
Several market and policies have emerged
to address BYOD security concerns,
including mobile device management
(MDM), containerization and app
virtualization
•Containerization
•Virtualization
11/03/16 UNIVERSITY OF WISCONSIN 44
MDM May Result in PrivacyMDM May Result in Privacy
and Usability Concernsand Usability Concerns
While MDM provides organizations with
the ability to control applications and
content on the device, research has revealed
controversy related to employee privacy
and usability issues that lead to resistance
in some organizations
11/03/16 UNIVERSITY OF WISCONSIN 45
Phone NumberPhone Number
OwnershipOwnership
A key issue of BYOD which is often
overlooked is BYOD's phone number
problem, which raises the question of the
ownership of the phone number. The issue
becomes apparent when employees in sales
or other customer-facing roles leave the
company and take their phone number with
them. Customers calling the number will
then potentially be calling competitors
which can lead to loss of business for BYOD
enterprises
11/03/16 UNIVERSITY OF WISCONSIN 46
Lack of BYOD PolicyLack of BYOD Policy
• Research reveals that only 20% of
employees have signed a BYOD policy
• Why not have them agree online, in order
to gain network access? Offer them a
carrot (network access) to agree.
• Businesses need to get out of the idea of
using legacy paper forms for such things
11/03/16 UNIVERSITY OF WISCONSIN 47
BYOD InventoryBYOD Inventory
Firms need an efficient inventory
management system that keeps track of
which devices employees are using, where
the device is located, whether it is being
used, and what software it is equipped with
11/03/16 UNIVERSITY OF WISCONSIN 48
Make Sure the Employees KnowMake Sure the Employees Know
If sensitive, classified, or criminal data lands
on a U.S. government employee's device, the
device is subject to confiscation
11/03/16 UNIVERSITY OF WISCONSIN 49
Scalability and CapabilityScalability and Capability
of Corporate Networksof Corporate Networks
Many organizations today lack proper network
infrastructure to handle the large traffic which will
be generated when employees will start using
different devices at the same time
11/03/16 UNIVERSITY OF WISCONSIN 50
Two Scenarios For the FutureTwo Scenarios For the Future
Personally Owned, Company
Enabled (POCE)
Corporate Owned, Personally
Enabled (COPE)
11/03/16 UNIVERSITY OF WISCONSIN 51
Personally Owned, Company
Enabled (POCE)
The company will maintain management
control and authorize the use of personally
owned devices and shall develop guidelines
to define which employees can use their
own devices, the types of devices they can
use, and which applications and data they
can access, process, or store.
11/03/16 UNIVERSITY OF WISCONSIN 52
Corporate Owned, PersonallyCorporate Owned, Personally
Enabled (COPE)Enabled (COPE)
As part of enterprise mobility, an alternative
approach are corporate owned, personally
enabled devices (COPE). With this policy the
company purchases the devices to provide to
their employees; the functionality of a
private device is enabled to allow personal
usage.
11/03/16 UNIVERSITY OF WISCONSIN 53
SummarySummary
• Both Cloud and BYOD are relatively new to
organizations
• Both Cloud and BYOD blur the lines of where an
organization’s control over data resides
• Both Cloud and BYOD extend the information
assets beyond historic organizational geographic
boundaries
• Both Cloud and BYOD are security concerns, in
an attempt to maintain Confidentiality, Integrity
and Availability
11/03/16 UNIVERSITY OF WISCONSIN 54
11/03/16 UNIVERSITY OF WISCONSIN 55
11/03/16 UNIVERSITY OF WISCONSIN 56

More Related Content

Viewers also liked

Security Operations -- An Overview
Security Operations -- An OverviewSecurity Operations -- An Overview
Security Operations -- An OverviewNicholas Davis
 
Information Systems 365 Lecture Six -- Access Control
Information Systems 365 Lecture Six -- Access ControlInformation Systems 365 Lecture Six -- Access Control
Information Systems 365 Lecture Six -- Access ControlNicholas Davis
 
UW-Madison Information Systems 365 -- Physical Security -- Lecture 9
UW-Madison Information Systems 365 -- Physical Security -- Lecture 9 UW-Madison Information Systems 365 -- Physical Security -- Lecture 9
UW-Madison Information Systems 365 -- Physical Security -- Lecture 9 Nicholas Davis
 
The IT Security Jungle of Higher Education
The IT Security Jungle of Higher EducationThe IT Security Jungle of Higher Education
The IT Security Jungle of Higher EducationNicholas Davis
 
Information Security 365 -- Policies, Data Classification, Employee Training ...
Information Security 365 -- Policies, Data Classification, Employee Training ...Information Security 365 -- Policies, Data Classification, Employee Training ...
Information Security 365 -- Policies, Data Classification, Employee Training ...Nicholas Davis
 
Demystifying Professional Certifications
Demystifying Professional CertificationsDemystifying Professional Certifications
Demystifying Professional CertificationsNicholas Davis
 
Information Security Fall Semester 2016 - Course Wrap Up Summary
Information Security Fall Semester 2016 - Course Wrap Up SummaryInformation Security Fall Semester 2016 - Course Wrap Up Summary
Information Security Fall Semester 2016 - Course Wrap Up SummaryNicholas Davis
 
Student Presentation Sample (Netflix) -- Information Security 365/765 -- UW-M...
Student Presentation Sample (Netflix) -- Information Security 365/765 -- UW-M...Student Presentation Sample (Netflix) -- Information Security 365/765 -- UW-M...
Student Presentation Sample (Netflix) -- Information Security 365/765 -- UW-M...Nicholas Davis
 
Trends in Accounting and Auditing
Trends in Accounting and AuditingTrends in Accounting and Auditing
Trends in Accounting and AuditingIbrahim Sulaiman
 
Mobile Devices & BYOD Security – Deployment & Best Practices
Mobile Devices & BYOD Security – Deployment & Best PracticesMobile Devices & BYOD Security – Deployment & Best Practices
Mobile Devices & BYOD Security – Deployment & Best PracticesCisco Canada
 
Database auditing essentials
Database auditing essentialsDatabase auditing essentials
Database auditing essentialsCraig Mullins
 
BYOD: Bring Your Own Device Implementation and Security Issues
BYOD: Bring Your Own Device Implementation and Security IssuesBYOD: Bring Your Own Device Implementation and Security Issues
BYOD: Bring Your Own Device Implementation and Security IssuesHarsh Kishore Mishra
 
Authenticated and unrestricted auditing of big data space on cloud through v...
Authenticated and unrestricted auditing of big data space on  cloud through v...Authenticated and unrestricted auditing of big data space on  cloud through v...
Authenticated and unrestricted auditing of big data space on cloud through v...IJMER
 

Viewers also liked (14)

Security Operations -- An Overview
Security Operations -- An OverviewSecurity Operations -- An Overview
Security Operations -- An Overview
 
Information Systems 365 Lecture Six -- Access Control
Information Systems 365 Lecture Six -- Access ControlInformation Systems 365 Lecture Six -- Access Control
Information Systems 365 Lecture Six -- Access Control
 
UW-Madison Information Systems 365 -- Physical Security -- Lecture 9
UW-Madison Information Systems 365 -- Physical Security -- Lecture 9 UW-Madison Information Systems 365 -- Physical Security -- Lecture 9
UW-Madison Information Systems 365 -- Physical Security -- Lecture 9
 
The IT Security Jungle of Higher Education
The IT Security Jungle of Higher EducationThe IT Security Jungle of Higher Education
The IT Security Jungle of Higher Education
 
Information Security 365 -- Policies, Data Classification, Employee Training ...
Information Security 365 -- Policies, Data Classification, Employee Training ...Information Security 365 -- Policies, Data Classification, Employee Training ...
Information Security 365 -- Policies, Data Classification, Employee Training ...
 
Demystifying Professional Certifications
Demystifying Professional CertificationsDemystifying Professional Certifications
Demystifying Professional Certifications
 
Information Security Fall Semester 2016 - Course Wrap Up Summary
Information Security Fall Semester 2016 - Course Wrap Up SummaryInformation Security Fall Semester 2016 - Course Wrap Up Summary
Information Security Fall Semester 2016 - Course Wrap Up Summary
 
Student Presentation Sample (Netflix) -- Information Security 365/765 -- UW-M...
Student Presentation Sample (Netflix) -- Information Security 365/765 -- UW-M...Student Presentation Sample (Netflix) -- Information Security 365/765 -- UW-M...
Student Presentation Sample (Netflix) -- Information Security 365/765 -- UW-M...
 
Fetc byod best_prac
Fetc byod best_pracFetc byod best_prac
Fetc byod best_prac
 
Trends in Accounting and Auditing
Trends in Accounting and AuditingTrends in Accounting and Auditing
Trends in Accounting and Auditing
 
Mobile Devices & BYOD Security – Deployment & Best Practices
Mobile Devices & BYOD Security – Deployment & Best PracticesMobile Devices & BYOD Security – Deployment & Best Practices
Mobile Devices & BYOD Security – Deployment & Best Practices
 
Database auditing essentials
Database auditing essentialsDatabase auditing essentials
Database auditing essentials
 
BYOD: Bring Your Own Device Implementation and Security Issues
BYOD: Bring Your Own Device Implementation and Security IssuesBYOD: Bring Your Own Device Implementation and Security Issues
BYOD: Bring Your Own Device Implementation and Security Issues
 
Authenticated and unrestricted auditing of big data space on cloud through v...
Authenticated and unrestricted auditing of big data space on  cloud through v...Authenticated and unrestricted auditing of big data space on  cloud through v...
Authenticated and unrestricted auditing of big data space on cloud through v...
 

Similar to Cloud Security and Bring Your Own Device (BYOD) Security

Information systems 365 - Cloud and BYOD Security
Information systems 365 - Cloud and BYOD SecurityInformation systems 365 - Cloud and BYOD Security
Information systems 365 - Cloud and BYOD SecurityNicholas Davis
 
Whitepaper: Security of the Cloud
Whitepaper: Security of the CloudWhitepaper: Security of the Cloud
Whitepaper: Security of the CloudCloudSmartz
 
Iirdem a novel approach for enhancing security in multi cloud environment
Iirdem a novel approach for enhancing security in multi  cloud environmentIirdem a novel approach for enhancing security in multi  cloud environment
Iirdem a novel approach for enhancing security in multi cloud environmentIaetsd Iaetsd
 
Winning Strategy For Hybrid Cloud Environments
Winning Strategy For Hybrid Cloud EnvironmentsWinning Strategy For Hybrid Cloud Environments
Winning Strategy For Hybrid Cloud EnvironmentsCarl De Groote
 
Proposed Model for Enhancing Data Storage Security in Cloud Computing Systems
Proposed Model for Enhancing Data Storage Security in Cloud Computing SystemsProposed Model for Enhancing Data Storage Security in Cloud Computing Systems
Proposed Model for Enhancing Data Storage Security in Cloud Computing SystemsHossam Al-Ansary
 
Cloud_Security_–_An_Overview_coure subject.pdf
Cloud_Security_–_An_Overview_coure subject.pdfCloud_Security_–_An_Overview_coure subject.pdf
Cloud_Security_–_An_Overview_coure subject.pdfAlexanderJPSibarani1
 
Cloud Security - Types, Common Threats & Tips To Mitigate.pdf
Cloud Security - Types, Common Threats & Tips To Mitigate.pdfCloud Security - Types, Common Threats & Tips To Mitigate.pdf
Cloud Security - Types, Common Threats & Tips To Mitigate.pdfDataSpace Academy
 
Enhanced Data Partitioning Technique for Improving Cloud Data Storage Security
Enhanced Data Partitioning Technique for Improving Cloud Data Storage SecurityEnhanced Data Partitioning Technique for Improving Cloud Data Storage Security
Enhanced Data Partitioning Technique for Improving Cloud Data Storage SecurityEditor IJMTER
 
O Outro Lado BSidesSP Ed. 5 - As Nove Principais Ameaças na Computação em Nuvem
O Outro Lado BSidesSP Ed. 5 - As Nove Principais Ameaças na Computação em NuvemO Outro Lado BSidesSP Ed. 5 - As Nove Principais Ameaças na Computação em Nuvem
O Outro Lado BSidesSP Ed. 5 - As Nove Principais Ameaças na Computação em NuvemAndre Serralheiro
 
Security Related Issues Associated With Migrating to Cloud Services
Security Related Issues Associated With Migrating to Cloud ServicesSecurity Related Issues Associated With Migrating to Cloud Services
Security Related Issues Associated With Migrating to Cloud ServicesNicholas Davis
 
Two competing approaches to hybrid cloud
Two competing approaches to hybrid cloudTwo competing approaches to hybrid cloud
Two competing approaches to hybrid cloudPrincipled Technologies
 
Design and implement a new cloud security method based on multi clouds on ope...
Design and implement a new cloud security method based on multi clouds on ope...Design and implement a new cloud security method based on multi clouds on ope...
Design and implement a new cloud security method based on multi clouds on ope...csandit
 

Similar to Cloud Security and Bring Your Own Device (BYOD) Security (20)

Information systems 365 - Cloud and BYOD Security
Information systems 365 - Cloud and BYOD SecurityInformation systems 365 - Cloud and BYOD Security
Information systems 365 - Cloud and BYOD Security
 
B042306013
B042306013B042306013
B042306013
 
Whitepaper: Security of the Cloud
Whitepaper: Security of the CloudWhitepaper: Security of the Cloud
Whitepaper: Security of the Cloud
 
Security of the Cloud
Security of the CloudSecurity of the Cloud
Security of the Cloud
 
Iirdem a novel approach for enhancing security in multi cloud environment
Iirdem a novel approach for enhancing security in multi  cloud environmentIirdem a novel approach for enhancing security in multi  cloud environment
Iirdem a novel approach for enhancing security in multi cloud environment
 
Winning Strategy For Hybrid Cloud Environments
Winning Strategy For Hybrid Cloud EnvironmentsWinning Strategy For Hybrid Cloud Environments
Winning Strategy For Hybrid Cloud Environments
 
Proposed Model for Enhancing Data Storage Security in Cloud Computing Systems
Proposed Model for Enhancing Data Storage Security in Cloud Computing SystemsProposed Model for Enhancing Data Storage Security in Cloud Computing Systems
Proposed Model for Enhancing Data Storage Security in Cloud Computing Systems
 
Cloud_Security_–_An_Overview_coure subject.pdf
Cloud_Security_–_An_Overview_coure subject.pdfCloud_Security_–_An_Overview_coure subject.pdf
Cloud_Security_–_An_Overview_coure subject.pdf
 
F017414853
F017414853F017414853
F017414853
 
Cloud computing
Cloud computingCloud computing
Cloud computing
 
Data Security and Privacy in Cloud Computing
Data Security and Privacy in Cloud ComputingData Security and Privacy in Cloud Computing
Data Security and Privacy in Cloud Computing
 
Cloud Security - Types, Common Threats & Tips To Mitigate.pdf
Cloud Security - Types, Common Threats & Tips To Mitigate.pdfCloud Security - Types, Common Threats & Tips To Mitigate.pdf
Cloud Security - Types, Common Threats & Tips To Mitigate.pdf
 
Enhanced Data Partitioning Technique for Improving Cloud Data Storage Security
Enhanced Data Partitioning Technique for Improving Cloud Data Storage SecurityEnhanced Data Partitioning Technique for Improving Cloud Data Storage Security
Enhanced Data Partitioning Technique for Improving Cloud Data Storage Security
 
6 Ways to Fight the Data Loss Gremlins
6 Ways to Fight the Data Loss Gremlins6 Ways to Fight the Data Loss Gremlins
6 Ways to Fight the Data Loss Gremlins
 
O Outro Lado BSidesSP Ed. 5 - As Nove Principais Ameaças na Computação em Nuvem
O Outro Lado BSidesSP Ed. 5 - As Nove Principais Ameaças na Computação em NuvemO Outro Lado BSidesSP Ed. 5 - As Nove Principais Ameaças na Computação em Nuvem
O Outro Lado BSidesSP Ed. 5 - As Nove Principais Ameaças na Computação em Nuvem
 
Security Related Issues Associated With Migrating to Cloud Services
Security Related Issues Associated With Migrating to Cloud ServicesSecurity Related Issues Associated With Migrating to Cloud Services
Security Related Issues Associated With Migrating to Cloud Services
 
Two competing approaches to hybrid cloud
Two competing approaches to hybrid cloudTwo competing approaches to hybrid cloud
Two competing approaches to hybrid cloud
 
journal paper
journal paperjournal paper
journal paper
 
Security in the Cloud
Security in the CloudSecurity in the Cloud
Security in the Cloud
 
Design and implement a new cloud security method based on multi clouds on ope...
Design and implement a new cloud security method based on multi clouds on ope...Design and implement a new cloud security method based on multi clouds on ope...
Design and implement a new cloud security method based on multi clouds on ope...
 

More from Nicholas Davis

Conducting a NIST Cybersecurity Framework (CSF) Assessment
Conducting a NIST Cybersecurity Framework (CSF) AssessmentConducting a NIST Cybersecurity Framework (CSF) Assessment
Conducting a NIST Cybersecurity Framework (CSF) AssessmentNicholas Davis
 
Top Cybersecurity Challenges Facing Your Business
Top Cybersecurity Challenges Facing Your BusinessTop Cybersecurity Challenges Facing Your Business
Top Cybersecurity Challenges Facing Your BusinessNicholas Davis
 
UW-Madison, Information Systems 371 - Decision Support Systems
UW-Madison, Information Systems 371 - Decision Support SystemsUW-Madison, Information Systems 371 - Decision Support Systems
UW-Madison, Information Systems 371 - Decision Support SystemsNicholas Davis
 
Software Development Methodologies
Software Development MethodologiesSoftware Development Methodologies
Software Development MethodologiesNicholas Davis
 
Information Security Awareness: at Work, at Home, and For Your Kids
Information Security Awareness: at Work, at Home, and For Your Kids Information Security Awareness: at Work, at Home, and For Your Kids
Information Security Awareness: at Work, at Home, and For Your Kids Nicholas Davis
 
Information Systems 365/765, Lecture 4, Policies, Data Classification, Traini...
Information Systems 365/765, Lecture 4, Policies, Data Classification, Traini...Information Systems 365/765, Lecture 4, Policies, Data Classification, Traini...
Information Systems 365/765, Lecture 4, Policies, Data Classification, Traini...Nicholas Davis
 
Information Systems 371 -The Internet of Things Overview
Information Systems 371 -The Internet of Things OverviewInformation Systems 371 -The Internet of Things Overview
Information Systems 371 -The Internet of Things OverviewNicholas Davis
 
Cyberwar Gets Personal
Cyberwar Gets PersonalCyberwar Gets Personal
Cyberwar Gets PersonalNicholas Davis
 
University of Wisconsin-Madison, Information Security 365/765 Course Summary,...
University of Wisconsin-Madison, Information Security 365/765 Course Summary,...University of Wisconsin-Madison, Information Security 365/765 Course Summary,...
University of Wisconsin-Madison, Information Security 365/765 Course Summary,...Nicholas Davis
 
Bringing the Entire Information Security Semester Together With a Team Project
Bringing the Entire Information Security Semester Together With a Team ProjectBringing the Entire Information Security Semester Together With a Team Project
Bringing the Entire Information Security Semester Together With a Team ProjectNicholas Davis
 
The Deep and Dark Web - Spooky Halloween Information Security Lecture -- Info...
The Deep and Dark Web - Spooky Halloween Information Security Lecture -- Info...The Deep and Dark Web - Spooky Halloween Information Security Lecture -- Info...
The Deep and Dark Web - Spooky Halloween Information Security Lecture -- Info...Nicholas Davis
 
Organizational Phishing Education
Organizational Phishing EducationOrganizational Phishing Education
Organizational Phishing EducationNicholas Davis
 
Network Design, Common Network Terminology and Security Implications
Network Design, Common Network Terminology and Security ImplicationsNetwork Design, Common Network Terminology and Security Implications
Network Design, Common Network Terminology and Security ImplicationsNicholas Davis
 
Survey Presentation About Application Security
Survey Presentation About Application SecuritySurvey Presentation About Application Security
Survey Presentation About Application SecurityNicholas Davis
 
Information Security 365/765 Lecture 13 – Legal Regulations, Industry Compli...
Information Security 365/765 Lecture 13 – Legal Regulations,  Industry Compli...Information Security 365/765 Lecture 13 – Legal Regulations,  Industry Compli...
Information Security 365/765 Lecture 13 – Legal Regulations, Industry Compli...Nicholas Davis
 
Spooky Halloween IT Security Lecture -- The Deep Web
Spooky Halloween IT Security Lecture -- The Deep WebSpooky Halloween IT Security Lecture -- The Deep Web
Spooky Halloween IT Security Lecture -- The Deep WebNicholas Davis
 
Scary Halloween Cybersecurity Lecture -- The Deep Web
Scary Halloween Cybersecurity Lecture -- The Deep WebScary Halloween Cybersecurity Lecture -- The Deep Web
Scary Halloween Cybersecurity Lecture -- The Deep WebNicholas Davis
 
Managing the Threat of Trade Secret and Intellectual Property (IP) Theft in t...
Managing the Threat of Trade Secret and Intellectual Property (IP) Theft in t...Managing the Threat of Trade Secret and Intellectual Property (IP) Theft in t...
Managing the Threat of Trade Secret and Intellectual Property (IP) Theft in t...Nicholas Davis
 
Cyberwarfare focusing on higher education as a prime target
Cyberwarfare focusing on higher education as a prime targetCyberwarfare focusing on higher education as a prime target
Cyberwarfare focusing on higher education as a prime targetNicholas Davis
 

More from Nicholas Davis (20)

Conducting a NIST Cybersecurity Framework (CSF) Assessment
Conducting a NIST Cybersecurity Framework (CSF) AssessmentConducting a NIST Cybersecurity Framework (CSF) Assessment
Conducting a NIST Cybersecurity Framework (CSF) Assessment
 
Top Cybersecurity Challenges Facing Your Business
Top Cybersecurity Challenges Facing Your BusinessTop Cybersecurity Challenges Facing Your Business
Top Cybersecurity Challenges Facing Your Business
 
UW-Madison, Information Systems 371 - Decision Support Systems
UW-Madison, Information Systems 371 - Decision Support SystemsUW-Madison, Information Systems 371 - Decision Support Systems
UW-Madison, Information Systems 371 - Decision Support Systems
 
Lecture blockchain
Lecture blockchainLecture blockchain
Lecture blockchain
 
Software Development Methodologies
Software Development MethodologiesSoftware Development Methodologies
Software Development Methodologies
 
Information Security Awareness: at Work, at Home, and For Your Kids
Information Security Awareness: at Work, at Home, and For Your Kids Information Security Awareness: at Work, at Home, and For Your Kids
Information Security Awareness: at Work, at Home, and For Your Kids
 
Information Systems 365/765, Lecture 4, Policies, Data Classification, Traini...
Information Systems 365/765, Lecture 4, Policies, Data Classification, Traini...Information Systems 365/765, Lecture 4, Policies, Data Classification, Traini...
Information Systems 365/765, Lecture 4, Policies, Data Classification, Traini...
 
Information Systems 371 -The Internet of Things Overview
Information Systems 371 -The Internet of Things OverviewInformation Systems 371 -The Internet of Things Overview
Information Systems 371 -The Internet of Things Overview
 
Cyberwar Gets Personal
Cyberwar Gets PersonalCyberwar Gets Personal
Cyberwar Gets Personal
 
University of Wisconsin-Madison, Information Security 365/765 Course Summary,...
University of Wisconsin-Madison, Information Security 365/765 Course Summary,...University of Wisconsin-Madison, Information Security 365/765 Course Summary,...
University of Wisconsin-Madison, Information Security 365/765 Course Summary,...
 
Bringing the Entire Information Security Semester Together With a Team Project
Bringing the Entire Information Security Semester Together With a Team ProjectBringing the Entire Information Security Semester Together With a Team Project
Bringing the Entire Information Security Semester Together With a Team Project
 
The Deep and Dark Web - Spooky Halloween Information Security Lecture -- Info...
The Deep and Dark Web - Spooky Halloween Information Security Lecture -- Info...The Deep and Dark Web - Spooky Halloween Information Security Lecture -- Info...
The Deep and Dark Web - Spooky Halloween Information Security Lecture -- Info...
 
Organizational Phishing Education
Organizational Phishing EducationOrganizational Phishing Education
Organizational Phishing Education
 
Network Design, Common Network Terminology and Security Implications
Network Design, Common Network Terminology and Security ImplicationsNetwork Design, Common Network Terminology and Security Implications
Network Design, Common Network Terminology and Security Implications
 
Survey Presentation About Application Security
Survey Presentation About Application SecuritySurvey Presentation About Application Security
Survey Presentation About Application Security
 
Information Security 365/765 Lecture 13 – Legal Regulations, Industry Compli...
Information Security 365/765 Lecture 13 – Legal Regulations,  Industry Compli...Information Security 365/765 Lecture 13 – Legal Regulations,  Industry Compli...
Information Security 365/765 Lecture 13 – Legal Regulations, Industry Compli...
 
Spooky Halloween IT Security Lecture -- The Deep Web
Spooky Halloween IT Security Lecture -- The Deep WebSpooky Halloween IT Security Lecture -- The Deep Web
Spooky Halloween IT Security Lecture -- The Deep Web
 
Scary Halloween Cybersecurity Lecture -- The Deep Web
Scary Halloween Cybersecurity Lecture -- The Deep WebScary Halloween Cybersecurity Lecture -- The Deep Web
Scary Halloween Cybersecurity Lecture -- The Deep Web
 
Managing the Threat of Trade Secret and Intellectual Property (IP) Theft in t...
Managing the Threat of Trade Secret and Intellectual Property (IP) Theft in t...Managing the Threat of Trade Secret and Intellectual Property (IP) Theft in t...
Managing the Threat of Trade Secret and Intellectual Property (IP) Theft in t...
 
Cyberwarfare focusing on higher education as a prime target
Cyberwarfare focusing on higher education as a prime targetCyberwarfare focusing on higher education as a prime target
Cyberwarfare focusing on higher education as a prime target
 

Recently uploaded

How is AI changing journalism? (v. April 2024)
How is AI changing journalism? (v. April 2024)How is AI changing journalism? (v. April 2024)
How is AI changing journalism? (v. April 2024)Damian Radcliffe
 
AlbaniaDreamin24 - How to easily use an API with Flows
AlbaniaDreamin24 - How to easily use an API with FlowsAlbaniaDreamin24 - How to easily use an API with Flows
AlbaniaDreamin24 - How to easily use an API with FlowsThierry TROUIN ☁
 
Git and Github workshop GDSC MLRITM
Git and Github  workshop GDSC MLRITMGit and Github  workshop GDSC MLRITM
Git and Github workshop GDSC MLRITMgdsc13
 
Gram Darshan PPT cyber rural in villages of india
Gram Darshan PPT cyber rural  in villages of indiaGram Darshan PPT cyber rural  in villages of india
Gram Darshan PPT cyber rural in villages of indiaimessage0108
 
定制(Management毕业证书)新加坡管理大学毕业证成绩单原版一比一
定制(Management毕业证书)新加坡管理大学毕业证成绩单原版一比一定制(Management毕业证书)新加坡管理大学毕业证成绩单原版一比一
定制(Management毕业证书)新加坡管理大学毕业证成绩单原版一比一Fs
 
Denver Web Design brochure for public viewing
Denver Web Design brochure for public viewingDenver Web Design brochure for public viewing
Denver Web Design brochure for public viewingbigorange77
 
定制(Lincoln毕业证书)新西兰林肯大学毕业证成绩单原版一比一
定制(Lincoln毕业证书)新西兰林肯大学毕业证成绩单原版一比一定制(Lincoln毕业证书)新西兰林肯大学毕业证成绩单原版一比一
定制(Lincoln毕业证书)新西兰林肯大学毕业证成绩单原版一比一Fs
 
10.pdfMature Call girls in Dubai +971563133746 Dubai Call girls
10.pdfMature Call girls in Dubai +971563133746 Dubai Call girls10.pdfMature Call girls in Dubai +971563133746 Dubai Call girls
10.pdfMature Call girls in Dubai +971563133746 Dubai Call girlsstephieert
 
Russian Call girls in Dubai +971563133746 Dubai Call girls
Russian  Call girls in Dubai +971563133746 Dubai  Call girlsRussian  Call girls in Dubai +971563133746 Dubai  Call girls
Russian Call girls in Dubai +971563133746 Dubai Call girlsstephieert
 
VIP Kolkata Call Girl Salt Lake 👉 8250192130 Available With Room
VIP Kolkata Call Girl Salt Lake 👉 8250192130  Available With RoomVIP Kolkata Call Girl Salt Lake 👉 8250192130  Available With Room
VIP Kolkata Call Girl Salt Lake 👉 8250192130 Available With Roomishabajaj13
 
VIP Kolkata Call Girls Salt Lake 8250192130 Available With Room
VIP Kolkata Call Girls Salt Lake 8250192130 Available With RoomVIP Kolkata Call Girls Salt Lake 8250192130 Available With Room
VIP Kolkata Call Girls Salt Lake 8250192130 Available With Roomgirls4nights
 
定制(AUT毕业证书)新西兰奥克兰理工大学毕业证成绩单原版一比一
定制(AUT毕业证书)新西兰奥克兰理工大学毕业证成绩单原版一比一定制(AUT毕业证书)新西兰奥克兰理工大学毕业证成绩单原版一比一
定制(AUT毕业证书)新西兰奥克兰理工大学毕业证成绩单原版一比一Fs
 
Call Girls In Mumbai Central Mumbai ❤️ 9920874524 👈 Cash on Delivery
Call Girls In Mumbai Central Mumbai ❤️ 9920874524 👈 Cash on DeliveryCall Girls In Mumbai Central Mumbai ❤️ 9920874524 👈 Cash on Delivery
Call Girls In Mumbai Central Mumbai ❤️ 9920874524 👈 Cash on Deliverybabeytanya
 
FULL ENJOY Call Girls In Mayur Vihar Delhi Contact Us 8377087607
FULL ENJOY Call Girls In Mayur Vihar Delhi Contact Us 8377087607FULL ENJOY Call Girls In Mayur Vihar Delhi Contact Us 8377087607
FULL ENJOY Call Girls In Mayur Vihar Delhi Contact Us 8377087607dollysharma2066
 
Packaging the Monolith - PHP Tek 2024 (Breaking it down one bite at a time)
Packaging the Monolith - PHP Tek 2024 (Breaking it down one bite at a time)Packaging the Monolith - PHP Tek 2024 (Breaking it down one bite at a time)
Packaging the Monolith - PHP Tek 2024 (Breaking it down one bite at a time)Dana Luther
 
Call Girls South Delhi Delhi reach out to us at ☎ 9711199012
Call Girls South Delhi Delhi reach out to us at ☎ 9711199012Call Girls South Delhi Delhi reach out to us at ☎ 9711199012
Call Girls South Delhi Delhi reach out to us at ☎ 9711199012rehmti665
 
VIP 7001035870 Find & Meet Hyderabad Call Girls LB Nagar high-profile Call Girl
VIP 7001035870 Find & Meet Hyderabad Call Girls LB Nagar high-profile Call GirlVIP 7001035870 Find & Meet Hyderabad Call Girls LB Nagar high-profile Call Girl
VIP 7001035870 Find & Meet Hyderabad Call Girls LB Nagar high-profile Call Girladitipandeya
 
VIP 7001035870 Find & Meet Hyderabad Call Girls Dilsukhnagar high-profile Cal...
VIP 7001035870 Find & Meet Hyderabad Call Girls Dilsukhnagar high-profile Cal...VIP 7001035870 Find & Meet Hyderabad Call Girls Dilsukhnagar high-profile Cal...
VIP 7001035870 Find & Meet Hyderabad Call Girls Dilsukhnagar high-profile Cal...aditipandeya
 

Recently uploaded (20)

How is AI changing journalism? (v. April 2024)
How is AI changing journalism? (v. April 2024)How is AI changing journalism? (v. April 2024)
How is AI changing journalism? (v. April 2024)
 
AlbaniaDreamin24 - How to easily use an API with Flows
AlbaniaDreamin24 - How to easily use an API with FlowsAlbaniaDreamin24 - How to easily use an API with Flows
AlbaniaDreamin24 - How to easily use an API with Flows
 
Git and Github workshop GDSC MLRITM
Git and Github  workshop GDSC MLRITMGit and Github  workshop GDSC MLRITM
Git and Github workshop GDSC MLRITM
 
Gram Darshan PPT cyber rural in villages of india
Gram Darshan PPT cyber rural  in villages of indiaGram Darshan PPT cyber rural  in villages of india
Gram Darshan PPT cyber rural in villages of india
 
定制(Management毕业证书)新加坡管理大学毕业证成绩单原版一比一
定制(Management毕业证书)新加坡管理大学毕业证成绩单原版一比一定制(Management毕业证书)新加坡管理大学毕业证成绩单原版一比一
定制(Management毕业证书)新加坡管理大学毕业证成绩单原版一比一
 
Denver Web Design brochure for public viewing
Denver Web Design brochure for public viewingDenver Web Design brochure for public viewing
Denver Web Design brochure for public viewing
 
定制(Lincoln毕业证书)新西兰林肯大学毕业证成绩单原版一比一
定制(Lincoln毕业证书)新西兰林肯大学毕业证成绩单原版一比一定制(Lincoln毕业证书)新西兰林肯大学毕业证成绩单原版一比一
定制(Lincoln毕业证书)新西兰林肯大学毕业证成绩单原版一比一
 
10.pdfMature Call girls in Dubai +971563133746 Dubai Call girls
10.pdfMature Call girls in Dubai +971563133746 Dubai Call girls10.pdfMature Call girls in Dubai +971563133746 Dubai Call girls
10.pdfMature Call girls in Dubai +971563133746 Dubai Call girls
 
Russian Call girls in Dubai +971563133746 Dubai Call girls
Russian  Call girls in Dubai +971563133746 Dubai  Call girlsRussian  Call girls in Dubai +971563133746 Dubai  Call girls
Russian Call girls in Dubai +971563133746 Dubai Call girls
 
VIP Kolkata Call Girl Salt Lake 👉 8250192130 Available With Room
VIP Kolkata Call Girl Salt Lake 👉 8250192130  Available With RoomVIP Kolkata Call Girl Salt Lake 👉 8250192130  Available With Room
VIP Kolkata Call Girl Salt Lake 👉 8250192130 Available With Room
 
VIP Kolkata Call Girls Salt Lake 8250192130 Available With Room
VIP Kolkata Call Girls Salt Lake 8250192130 Available With RoomVIP Kolkata Call Girls Salt Lake 8250192130 Available With Room
VIP Kolkata Call Girls Salt Lake 8250192130 Available With Room
 
定制(AUT毕业证书)新西兰奥克兰理工大学毕业证成绩单原版一比一
定制(AUT毕业证书)新西兰奥克兰理工大学毕业证成绩单原版一比一定制(AUT毕业证书)新西兰奥克兰理工大学毕业证成绩单原版一比一
定制(AUT毕业证书)新西兰奥克兰理工大学毕业证成绩单原版一比一
 
Call Girls In Mumbai Central Mumbai ❤️ 9920874524 👈 Cash on Delivery
Call Girls In Mumbai Central Mumbai ❤️ 9920874524 👈 Cash on DeliveryCall Girls In Mumbai Central Mumbai ❤️ 9920874524 👈 Cash on Delivery
Call Girls In Mumbai Central Mumbai ❤️ 9920874524 👈 Cash on Delivery
 
Call Girls Service Dwarka @9999965857 Delhi 🫦 No Advance VVIP 🍎 SERVICE
Call Girls Service Dwarka @9999965857 Delhi 🫦 No Advance  VVIP 🍎 SERVICECall Girls Service Dwarka @9999965857 Delhi 🫦 No Advance  VVIP 🍎 SERVICE
Call Girls Service Dwarka @9999965857 Delhi 🫦 No Advance VVIP 🍎 SERVICE
 
FULL ENJOY Call Girls In Mayur Vihar Delhi Contact Us 8377087607
FULL ENJOY Call Girls In Mayur Vihar Delhi Contact Us 8377087607FULL ENJOY Call Girls In Mayur Vihar Delhi Contact Us 8377087607
FULL ENJOY Call Girls In Mayur Vihar Delhi Contact Us 8377087607
 
Packaging the Monolith - PHP Tek 2024 (Breaking it down one bite at a time)
Packaging the Monolith - PHP Tek 2024 (Breaking it down one bite at a time)Packaging the Monolith - PHP Tek 2024 (Breaking it down one bite at a time)
Packaging the Monolith - PHP Tek 2024 (Breaking it down one bite at a time)
 
Call Girls South Delhi Delhi reach out to us at ☎ 9711199012
Call Girls South Delhi Delhi reach out to us at ☎ 9711199012Call Girls South Delhi Delhi reach out to us at ☎ 9711199012
Call Girls South Delhi Delhi reach out to us at ☎ 9711199012
 
Rohini Sector 26 Call Girls Delhi 9999965857 @Sabina Saikh No Advance
Rohini Sector 26 Call Girls Delhi 9999965857 @Sabina Saikh No AdvanceRohini Sector 26 Call Girls Delhi 9999965857 @Sabina Saikh No Advance
Rohini Sector 26 Call Girls Delhi 9999965857 @Sabina Saikh No Advance
 
VIP 7001035870 Find & Meet Hyderabad Call Girls LB Nagar high-profile Call Girl
VIP 7001035870 Find & Meet Hyderabad Call Girls LB Nagar high-profile Call GirlVIP 7001035870 Find & Meet Hyderabad Call Girls LB Nagar high-profile Call Girl
VIP 7001035870 Find & Meet Hyderabad Call Girls LB Nagar high-profile Call Girl
 
VIP 7001035870 Find & Meet Hyderabad Call Girls Dilsukhnagar high-profile Cal...
VIP 7001035870 Find & Meet Hyderabad Call Girls Dilsukhnagar high-profile Cal...VIP 7001035870 Find & Meet Hyderabad Call Girls Dilsukhnagar high-profile Cal...
VIP 7001035870 Find & Meet Hyderabad Call Girls Dilsukhnagar high-profile Cal...
 

Cloud Security and Bring Your Own Device (BYOD) Security

  • 1. Information Security 365/765, Fall Semester, 2016 Course Instructor, Nicholas Davis, CISA, CISSP Lecture 11, Cloud Security and BYOD Security
  • 2. Today’s Chocolate BarToday’s Chocolate Bar 100 Grand100 Grand 100 Grand Bar (formerly known as $100,000 Bar spoken as "hundred thousand dollar bar" until the mid 1980s) is a candy bar produced by Nestlé in the United States. The candy bar was created in 1966, and named after a series of successful game shows. It weighs 1.5 ounces (42 grams) and includes chocolate, caramel and crisped rice. The bar contains 190 calories; it is low in cholesterol and sodium, but high in saturated fat and sugar. Its slogan is "That's Rich!“ The mini 100 Grand bars we are eating today in class, are 93 calories each! 11/03/16 UNIVERSITY OF WISCONSIN 2
  • 3. Today’s AgendaToday’s Agenda • Exam 2, proposed date, November 17, instead of Thanksgiving week. • Turkey, stuffing, mashed potatoes and pie are more important than an exam! • However, you may make alternate arrangements if November 17th does not fit well with your schedule. See me after class • Cloud Security • BYOD Security • Written assignment #4 is assigned • Distribution of list for team project work 11/03/16 UNIVERSITY OF WISCONSIN 3
  • 4. Why are We Covering CloudWhy are We Covering Cloud and BYOD Together?and BYOD Together? Let’s Discuss the Technical SpecificsLet’s Discuss the Technical Specifics of What Could Have Happenedof What Could Have Happened 11/03/16 UNIVERSITY OF WISCONSIN 4
  • 5. In My OpinionIn My Opinion • Probably NOT Huma’s primary computer work computer, but rather, an un-inventoried BYOD, long forgotten about • Shared OS user account, Huma and Anthony • Perhaps without password on the OS • Full email client probably auto-launched in background upon OS login, with cached (memorized) password 11/03/16 UNIVERSITY OF WISCONSIN 5
  • 6. In My OpinionIn My Opinion (Educated Guess)(Educated Guess) 11/03/16 UNIVERSITY OF WISCONSIN 6
  • 7. Meanwhile, on PrimaryMeanwhile, on Primary Computer, No Sign of DuplicateComputer, No Sign of Duplicate Remote Email Client LoginRemote Email Client Login 11/03/16 UNIVERSITY OF WISCONSIN 7
  • 8. The CloudThe Cloud Cloud computing describes a type of outsourcing of computer services, similar to the way in which electricity supply is outsourced. Users can simply use it. They do not need to worry where the computing resource is from, how it is made, or transported. A subscription based service 11/03/16 UNIVERSITY OF WISCONSIN 8
  • 9. Cloud SecurityCloud Security Cloud Security refers to a broad set of policies, technologies, and controls deployed to protect data, applications, and the associated infrastructure of cloud computing. 11/03/16 UNIVERSITY OF WISCONSIN 9
  • 10. Cloud Service ModelsCloud Service Models Software as a Service Platform as a Service Infrastructure as a Service 11/03/16 UNIVERSITY OF WISCONSIN 10
  • 11. Three ModelsThree Models of Cloud Computing SaaSof Cloud Computing SaaS • Software as a Service • “Consume” • Web browser provides point of access • Software management is moved to a third party • Examples: Salesforce and Google Apps 11/03/16 UNIVERSITY OF WISCONSIN 11
  • 12. Three ModelsThree Models of Cloud Computing PaaSof Cloud Computing PaaS • Platform as a Service • “Host” • Hardware is managed externally • Operating System is managed externally • Network is managed externally • The customer builds, installs and manages their specific applications • Examples: Google App Engine, and Red Hat’s OpenShift 11/03/16 UNIVERSITY OF WISCONSIN 12
  • 13. Three ModelsThree Models of Cloud Computing IaaSof Cloud Computing IaaS • Infrastructure as a Service • “Build” • Cloud servers and associated resources are made available • Customer controls architecture • Customer controls OS • Customer controls software applications • Examples: Navisite and Exoscale 11/03/16 UNIVERSITY OF WISCONSIN 13
  • 14. Cloud Deployment ModelsCloud Deployment Models Private Public Hybrid 11/03/16 UNIVERSITY OF WISCONSIN 14
  • 15. Private CloudPrivate Cloud Private cloud is cloud infrastructure operated solely for a single organization, whether managed internally or by a third-party, and hosted either internally or externally 11/03/16 UNIVERSITY OF WISCONSIN 15
  • 16. Public CloudPublic Cloud A cloud is called a "public cloud" when the services are rendered over a network that is open for public use. Technically there may be little or no difference between public and private cloud architecture, however, security consideration may be substantially different for services (applications, storage, and other resources) that are made available by a service provider 11/03/16 UNIVERSITY OF WISCONSIN 16
  • 17. Hybrid CloudHybrid Cloud Hybrid cloud is a composition of two or more clouds (private, community or public) that remain distinct entities but are bound together, offering the benefits of multiple deployment models. Hybrid cloud can also mean the ability to connect collocation, managed and/or dedicated services with cloud resources. 11/03/16 UNIVERSITY OF WISCONSIN 17
  • 18. Provider vs CustomerProvider vs Customer Security ConcernsSecurity Concerns • Provider must make sure that proper security controls are in place and that their services are being correctly represented. For example, HIPAA compliant from a physical security perspective • Customer must verify controls are up to standards and ensure that portions for which they have control, are securely managed. For example, how they issue login credentials to systems 11/03/16 UNIVERSITY OF WISCONSIN 18
  • 19. Suggested ControlsSuggested Controls For Cloud SecurityFor Cloud Security • Gartner breaks it down into seven areas • The Cloud Security Alliance has fourteen • Nicholas Davis has 10 areas “The nice thing about standards is that there are so many to choose from” (Note the contradiction) What really matters is that you take a comprehensive approach, no matter how you break it down into varying categories. Take nothing for granted! 11/03/16 UNIVERSITY OF WISCONSIN 19
  • 20. CloudCloud Physical SecurityPhysical Security 1. The location where the hardware and software resides must not be publicly accessible 2. The location where the hardware and software reside must be access controlled in such a manner as to make all entry and exits attempts, successful or unsuccessful, logged and auditable 3. The procedure for third party access to the physical facility must be documented and agreed to by the customer 11/03/16 UNIVERSITY OF WISCONSIN 20
  • 21. CloudCloud Physical SecurityPhysical Security 4. All visitors to the secured area where the hardware and software reside must be accompanied by an authorized escort, agreed to by the customer 5. All people accessing the secured area where the hardware and software reside, must have and display ID badges at all times 6. The secured area must be monitored and recorded by video camera at all times 11/03/16 UNIVERSITY OF WISCONSIN 21
  • 22. Employee and Computing Environment Reliability and Integrity 1. The cloud service provider must perform a criminal, work history, education history and credit history background check on all of its employees and produce the results for inspection by the customer 2. The cloud service provider should be able to produce a recent SSAE 16 SOC II report of its facility, for inspection by the customer 11/03/16 UNIVERSITY OF WISCONSIN 22
  • 23. Employee and Computing Environment Reliability and Integrity 3. The cloud service provider must be able to produce a copy of its latest vulnerability assessment and a list of security risks and gaps which have been addressed as a of the vulnerability assessment 11/03/16 UNIVERSITY OF WISCONSIN 23
  • 24. Cloud Data PersistenceCloud Data Persistence 1. List all locations where the customer’s data will reside (City, State, Country) 2. Reference any legislation the company adheres to in terms of data transmission across organizational and geographic borders 3. Describe both the on-site and off-site data backups of customer data the company performs 11/03/16 UNIVERSITY OF WISCONSIN 24
  • 25. Cloud Data PersistenceCloud Data Persistence 4. Does a subcontractor store data off-site? If so, please describe. 5. Is the customer’s data encrypted in storage and backup? If so, please describe 6. Describe how the company controls access to backup storage and media 11/03/16 UNIVERSITY OF WISCONSIN 25
  • 26. CloudCloud Business ContinuityBusiness Continuity 1. Describe the company’s continuity plan for addressing critical service failures, such as power, heating, cooling, etc. 2. Describe the company’s continuity plan for addressing natural disasters such as fire, tornadoes, flooding, etc. 3. Describe the company’s response plan for information technology or human related security breaches of the facility 11/03/16 UNIVERSITY OF WISCONSIN 26
  • 27. Cloud Network MonitoringCloud Network Monitoring 1. Does the cloud provider log network traffic, file and server access? 2. All log files must be made available to the customer, upon demand 11/03/16 UNIVERSITY OF WISCONSIN 27
  • 28. Cloud Network MonitoringCloud Network Monitoring 3. Logs must record who accessed the system, by what means, and what if any data was accessed or changed 4. Security event logs should be captured for all systems which are or which may potentially be used for accessing and/or managing customer data 11/03/16 UNIVERSITY OF WISCONSIN 28
  • 29. Data Encryption and EntityData Encryption and Entity AuthenticationAuthentication 1. Describe the specifics of how customer data is encrypted at rest as well as in transit 2. Describe the authentication technologies used to control administrative access to all systems which may have access to customer 11/03/16 UNIVERSITY OF WISCONSIN 29
  • 30. CloudCloud Multi TenancyMulti Tenancy 1. Is the cloud infrastructure of the service being considered by the customer multi- tenant or is it dedicated only to the customer’s system? Please describe the controls in place to protect customer data, if the environment is multi-tenant 2. Is the cloud service segmented using virtual machines? If so, please describe the architecture 11/03/16 UNIVERSITY OF WISCONSIN 30
  • 31. CloudCloud Service UptimeService Uptime 1. What is the specified service uptime and availability of the cloud solution being considered by the customer? 2. Does the cloud service have a fail over site? If so, describe its performance specifications/differences in comparison to the primary site 11/03/16 UNIVERSITY OF WISCONSIN 31
  • 32. CloudCloud Service UptimeService Uptime 1. What is the specified service uptime and availability of the cloud solution being considered by the customer? 2. Does the cloud service have a fail over site? If so, describe its performance specifications/differences in comparison to the primary site 11/03/16 UNIVERSITY OF WISCONSIN 32
  • 33. CloudCloud Service UptimeService Uptime 3. Are the security controls in place at the fail over site different in any way from the security controls in place at the primary site? If so, please describe 4. Does the cloud service provider provide an “active-active” consistent configuration between the primary and fail over site? 11/03/16 UNIVERSITY OF WISCONSIN 33
  • 34. Policy ConsistencyPolicy Consistency Across OrganizationsAcross Organizations 1. Will the cloud service provider adhere to applicable information security policies and procedures of the customer? 2. Are there any customer IT security policies which the cloud provider cannot adhere to? If so, please describe 11/03/16 UNIVERSITY OF WISCONSIN 34
  • 35. CloudCloud Service Level AgreementService Level Agreement Please provide a copy of the cloud service provider’s proposed Service Level Agreement (SLA) with the customer 11/03/16 UNIVERSITY OF WISCONSIN 35
  • 36. Bring Your Own DeviceBring Your Own Device BYOD (bring your own device) is the increasing trend toward employee-owned devices within a business. Smartphones are the most common example but employees also take their own tablets, laptops and USB drives into the workplace. 11/03/16 UNIVERSITY OF WISCONSIN 36
  • 37. BYOD Security, Flexibility,BYOD Security, Flexibility, Security, ViolationsSecurity, Violations • Although the ability to allow staff to work at any time from anywhere and on any device provides real business benefits; it also brings significant risks. • To ensure information does not end up in the wrong hands, it’s imperative for companies to put security measures in place. • According to an IDG survey, more than half of 1,600 senior IT security and technology purchase decision-makers reported serious violations of personal mobile device use. 11/03/16 UNIVERSITY OF WISCONSIN 37
  • 38. End Node ProblemEnd Node Problem • BYOD security relates strongly to the end node problem, wherein a device is used to access both sensitive and risky networks/services • Risk-averse organizations issue devices specifically for Internet use (this is termed Inverse-BYOD) 11/03/16 UNIVERSITY OF WISCONSIN 38
  • 39. Lost Devices, Sold DevicesLost Devices, Sold Devices Memorized PasswordsMemorized Passwords • BYOD has resulted in data breaches. For example, if an employee uses a smartphone to access the company network and then loses that phone or sells that phone, untrusted parties could retrieve any unsecured data on the phone. • Another type of security breach occurs when an employee leaves the company, they do not have to give back the device, so company applications and other data may still be present on their device • If passwords are cached (remembered) by the phone, anyone who has access to the device can now access the password protected resources 11/03/16 UNIVERSITY OF WISCONSIN 39
  • 40. Notable Statistics of ConcernNotable Statistics of Concern 11/03/16 UNIVERSITY OF WISCONSIN 40
  • 41. Personal PrivacyPersonal Privacy Drawing the LineDrawing the Line IT Security departments that wish to monitor usage of personal devices must ensure that they only monitor work related activities or activities that accesses company data or information 11/03/16 UNIVERSITY OF WISCONSIN 41
  • 42. Malware InfectionsMalware Infections Organizations who wish to adopt a BYOD policy must also consider how they will ensure that the devices which connect to the organization’s network infrastructure to access sensitive information will be protected from malware. 11/03/16 UNIVERSITY OF WISCONSIN 42
  • 43. Patching Many DifferentPatching Many Different Models of BYODsModels of BYODs BYOD policy must be prepared to have the necessary systems and processes in place that will apply the patches to protect systems against the known vulnerabilities to the various devices that users may choose to use. 11/03/16 UNIVERSITY OF WISCONSIN 43
  • 44. Mobile Device ManagementMobile Device Management SolutionsSolutions Several market and policies have emerged to address BYOD security concerns, including mobile device management (MDM), containerization and app virtualization •Containerization •Virtualization 11/03/16 UNIVERSITY OF WISCONSIN 44
  • 45. MDM May Result in PrivacyMDM May Result in Privacy and Usability Concernsand Usability Concerns While MDM provides organizations with the ability to control applications and content on the device, research has revealed controversy related to employee privacy and usability issues that lead to resistance in some organizations 11/03/16 UNIVERSITY OF WISCONSIN 45
  • 46. Phone NumberPhone Number OwnershipOwnership A key issue of BYOD which is often overlooked is BYOD's phone number problem, which raises the question of the ownership of the phone number. The issue becomes apparent when employees in sales or other customer-facing roles leave the company and take their phone number with them. Customers calling the number will then potentially be calling competitors which can lead to loss of business for BYOD enterprises 11/03/16 UNIVERSITY OF WISCONSIN 46
  • 47. Lack of BYOD PolicyLack of BYOD Policy • Research reveals that only 20% of employees have signed a BYOD policy • Why not have them agree online, in order to gain network access? Offer them a carrot (network access) to agree. • Businesses need to get out of the idea of using legacy paper forms for such things 11/03/16 UNIVERSITY OF WISCONSIN 47
  • 48. BYOD InventoryBYOD Inventory Firms need an efficient inventory management system that keeps track of which devices employees are using, where the device is located, whether it is being used, and what software it is equipped with 11/03/16 UNIVERSITY OF WISCONSIN 48
  • 49. Make Sure the Employees KnowMake Sure the Employees Know If sensitive, classified, or criminal data lands on a U.S. government employee's device, the device is subject to confiscation 11/03/16 UNIVERSITY OF WISCONSIN 49
  • 50. Scalability and CapabilityScalability and Capability of Corporate Networksof Corporate Networks Many organizations today lack proper network infrastructure to handle the large traffic which will be generated when employees will start using different devices at the same time 11/03/16 UNIVERSITY OF WISCONSIN 50
  • 51. Two Scenarios For the FutureTwo Scenarios For the Future Personally Owned, Company Enabled (POCE) Corporate Owned, Personally Enabled (COPE) 11/03/16 UNIVERSITY OF WISCONSIN 51
  • 52. Personally Owned, Company Enabled (POCE) The company will maintain management control and authorize the use of personally owned devices and shall develop guidelines to define which employees can use their own devices, the types of devices they can use, and which applications and data they can access, process, or store. 11/03/16 UNIVERSITY OF WISCONSIN 52
  • 53. Corporate Owned, PersonallyCorporate Owned, Personally Enabled (COPE)Enabled (COPE) As part of enterprise mobility, an alternative approach are corporate owned, personally enabled devices (COPE). With this policy the company purchases the devices to provide to their employees; the functionality of a private device is enabled to allow personal usage. 11/03/16 UNIVERSITY OF WISCONSIN 53
  • 54. SummarySummary • Both Cloud and BYOD are relatively new to organizations • Both Cloud and BYOD blur the lines of where an organization’s control over data resides • Both Cloud and BYOD extend the information assets beyond historic organizational geographic boundaries • Both Cloud and BYOD are security concerns, in an attempt to maintain Confidentiality, Integrity and Availability 11/03/16 UNIVERSITY OF WISCONSIN 54
  • 55. 11/03/16 UNIVERSITY OF WISCONSIN 55
  • 56. 11/03/16 UNIVERSITY OF WISCONSIN 56