Presentation is loading. Please wait.

Presentation is loading. Please wait.

Cloud Computing How secure is it? Author: Marziyeh Arabnejad Revised/Edited: James Childress April 2014 Tandy School of Computer Science.

Similar presentations


Presentation on theme: "Cloud Computing How secure is it? Author: Marziyeh Arabnejad Revised/Edited: James Childress April 2014 Tandy School of Computer Science."— Presentation transcript:

1 Cloud Computing How secure is it? Author: Marziyeh Arabnejad Revised/Edited: James Childress April 2014 Tandy School of Computer Science

2 Outline Introduction Cloud diagram Types of Clouds Benefits of Clouds Security Issues of the Cloud Cloud data center Security Cloud security control Can cloud computing be secure?

3 Introduction Cloud Computing is an extreme form of outsourcing delivering hosted services via the internet. The Cloud acts as a virtual server that users can access via the internet on an as needed basis. Cloud Computing includes any subscription-based or pay-per-use service extending IT capabilities and allowing users to access stored information remotely.

4 Cloud diagram

5 Types of Clouds Public cloud  Sells services to anyone on the internet o Currently Amazon Web Services is the largest public cloud provider Private cloud  A proprietary network or a data center that supplies hosted services to a limited number of people

6 Public Cloud VS Private Cloud

7 Benefits of Cloud Computing Reduced costs  Provider saves money due to economies of scale  Resources are contracted and the cost is predictable, simplifies budgeting Safer data  High level of physical protection  Cloud providers use redundancy  Anytime/Anywhere data access  Give the customers contract access requirements Increased storage capacity  Easy to upgrade when needed Worry-free maintenance  Always have the latest and most security technology

8 Security Issues of Cloud Computing Location  Where the data is actually stored Data segregation  How vendors keep a certain degree of separation between one customers data and another's Recoverability  How quickly and effectively can information be recovered after a large disaster Hacking  This is the most daunting issue for most users, what if someone hacks into my information and shares it with the world?

9 Security in Cloud Data Centers The data center you choose should offer some protection measures:  Physical Security  Logical Security

10 Physical Security Redundant power supplies  Backup power supplies needed Redundant Internet connections  Several internet connections should run in the same time Redundant hardware  Multiple hard drives should be prepared Fire and flood  Data should be replicated in multiple locations Theft  Servers should not be easily accessible

11 Logical Security Logical Security covers the software side of the data center o Firewalls  Act as an electronic barrier between the data center & internet o Anti-virus detection software  Detect and remove any viruses o Data encryption software  Encrypts data as travels between firm and data center o Administrative controls  Govern access to application and data o Security audits  Conduct regular third party intrusion detection audit

12 Cloud security controls Deterrent controls  Honeypot/net used to attract and monitor hackers.  Tracking users Preventative controls  Implement Best practices:  Install OS and Application updates regularly  Physical security, CCTV, logging, automated alerts, etc  Firewalls, encryption, multi-level authentication

13 Cloud security controls Corrective controls  Disabling compromised open ports  IP and MAC filtering Detective controls  Snort  Tripwire  Logging and alert systems

14 Can cloud computing be secure? Summary: ways to reduce risk and protect data  Logging all network and system activity  Automated alerts when baseline parameters are outside the accepted range  Deploy IDS tools like Tripwire & Snort  Implement and maintain an effective network firewall  Implement a sophisticated access control model like RBAC (Role Based Access Controls)  Implement best practices for updates to the OS and all other applications

15 Can cloud computing be secure? Summary: ways to reduce risk and protect data  Disable/decommission outdated, unused software and hardware  Security awareness Training for employees: helpdesk staff, SAs, management, support staff, contractors, consultants, etc.  Require an AUP for all system users before granting access  Provide an SLA to all customers describing security expectations.  Backup & Restore capability

16 Question?


Download ppt "Cloud Computing How secure is it? Author: Marziyeh Arabnejad Revised/Edited: James Childress April 2014 Tandy School of Computer Science."

Similar presentations


Ads by Google