Cloud Computing By: Vanika Jennings.

Slides:



Advertisements
Similar presentations
Chapter 22: Cloud Computing and Related Security Issues Guide to Computer Network Security.
Advertisements

WARNING ! The system is either busy or has been unstable. You can wait and See if it becomes available again, or you can restart your computer. *
Hacker, Cracker?! Are they the same? No!!! Hacker programmers intensely interested in the arcane and recondite workings of any computer operating system.
Security Issues and Challenges in Cloud Computing
Lesson 11-Virtual Private Networks. Overview Define Virtual Private Networks (VPNs). Deploy User VPNs. Deploy Site VPNs. Understand standard VPN techniques.
Andrew Schroeder Networking Aspects of Cloud Computing.
Web server security Dr Jim Briggs WEBP security1.
Lesson 9-Securing a Network. Overview Identifying threats to the network security. Planning a secure network.
What is it? CLOUD COMPUTING.  Connects to the cloud via the Internet  Does computing tasks, or  Runs applications, or  Stores Data THE AVERAGE CLOUD.
Cloud Usability Framework
CLOUD COMPUTING.  It is a collection of integrated and networked hardware, software and Internet infrastructure (called a platform).  One can use.
Addition to Networking.  There is no unique and standard definition out there  Cloud Computing is a general term used to describe a new class of network.
Chapter-7 Introduction to Cloud Computing Cloud Computing.
Cloud Computing How secure is it? Author: Marziyeh Arabnejad Revised/Edited: James Childress April 2014 Tandy School of Computer Science.
Cloud Computing.
VPN AND SECURITY FLAWS Rajesh Perumal Clemson University.
By Chris Versaci CLOUD SECURITY. WHAT IS CLOUD COMPUTING? Cloud computing is a concept that involves a large number of computers connected through a real-time.
Computing on the Cloud Jason Detchevery March 4 th 2009.
 INADEQUATE SECURITY POLICIES ›Each covered entity and business associate must have written polices that cover all the Required and Addressable HIPAA.
Cloud Computing. Overview of Technology Accessible Anywhere Anytime.
Cloud Computing Characteristics A service provided by large internet-based specialised data centres that offers storage, processing and computer resources.
Security Issues and Strategies Chapter 8 – Computers: Understanding Technology (Third edition)
Cloud Computing Project By:Jessica, Fadiah, and Bill.
Amit Warke Jerry Philip Lateef Yusuf Supraja Narasimhan Back2Cloud: Remote Backup Service.
COSC 513 Operating Systems Project Presentation: Internet Security Instructor: Dr. Anvari Student: Ying Zhou Spring 2003.
{ Cloud computing. Exciting and relatively new technologies allow computing to be a part of our everyday lives. Cloud computing allows users to save their.
Company small business cloud solution Client UNIVERSITY OF BEDFORDSHIRE.
What is virtualization? virtualization is a broad term that refers to the abstraction of computer resources in order to work with the computer’s complexity.
Bay Ridge Security Consulting (BRSC) Cloud Computing.
Endpoint Encryption Methodologies Ed Underwood Dell Data Protection.
Cloud Computing 10 Cloud Computing 10. Cloud Computing 10 You’ll have heard about the ‘Cloud’ Lots of you will use it! But you need to be clear about.
Network and Server Basics. Learning Objectives After viewing this presentation, you will be able to: Understand the benefits of a client/server network.
Wireless Network By Mohammed AL Amoudi. Overview Definition of Wireless Reliability Speed Security Conclusion.
What is System Design? In System design, we use the requirements we developed in system analysis to create a blueprint of the future system Successful.
Cloud Storage Service with Proven Military Grade Security
Securing Information Systems
Unit 3 Virtualization.
Chapter 5 Electronic Commerce | Security Threats - Solution
Cloud Computing Brandy Donahue ITEC 7445.
Chapter 6: Securing the Cloud
Port Knocking Benjamin DiYanni.
Network Security (the Internet Security)
Networks 2 Key Revision Points.
People used to install software on their computers
Prepared by: Assistant prof. Aslamzai
What is System Design? In System design, we use the requirements we developed in system analysis to create a blueprint of the future system Successful.
A Wireless LAN Security Protocol
Presented by, K.K.Radhika.
Chapter 5 Electronic Commerce | Security Threats - Solution
Cloud Storage - an introduction
Chapter 5 Electronic Commerce | Security
BY GAWARE S.R. DEPT.OF COMP.SCI
ADVANCED PERSISTENT THREATS (APTs) - Simulation
Chapter 21: Cloud Computing and Related Security Issues
QuickBooks Cloud Hosting Support Number
Introduction to Cloud Computing
Chapter 22: Cloud Computing Technology and Security
Cloud Computing Team Members: Aleksandra Knezevic Willie Robbins
Cloud Testing Shilpi Chugh.
Protect crypto exchange website from hackers
Chapter 5 Electronic Commerce | Security
VIRTUALIZATION & CLOUD COMPUTING
The Internet of Unsecure Things
Cloud Computing Cloud computing refers to “a model of computing that provides access to a shared pool of computing resources (computers, storage, applications,
"Cloud services" - what it is.
Online software and backups
Designing IIS Security (IIS – Internet Information Service)
Module 4 System and Application Security
Cloud and Database Security
Done by:Thikra abdullah
Presentation transcript:

Cloud Computing By: Vanika Jennings

What Is Cloud Computing ? Cloud Computing is referred to as services and applications provided to personal consumers and businesses via the internet. Essentially “the cloud” is a large server where clients can easily access a variety of virtual resources.

Benefits and Features of Cloud Computing for Businesses Pay as You Go Storage Capacity Storage or capacity space, can be purchased on a pay as you go basis, instead of over-specifying hardware and storage in advance. Storage capacity purchased beyond what is needed, can be returned to the cloud service provider. Internet Based System Access Cloud servicing also allows users within the same network to access the cloud worldwide given that the internet access in available. The convenience and the ease of access is a plus for businesses that have employees who need to access business data anytime, and anywhere.

Benefits to Cloud Computing for Businesses Cont. Cloud Based Operating System and a Hard Drive Cloud computing helps to reduce staffing cost due to outsourcing the hardware and environment maintenance. Businesses saves costs on hardware, software, and licensing fees due to the cloud controlling and updating the necessary software and development platforms.

Risks to Cloud Computing - System Attacks Denial of Service Attack (DOS) DOS attacks are done when a hacker initiates or (flood attacks) the network with a large amount of invalid requests, in turn causing the legitimate requests to be ignored These attacks cause major issues for network users such as system crashes, lost data, and downtime while the user awaits the system services being restored. One attacker has the power to disconnect hundreds of millions of users’ offline instantaneously. Man In the Middle Attack The man in the middle attack occurs when an attacker has the ability placed themselves or malicious hacking tools between the communication path of the user and a secured socket layer SSL ending path. This allows the attacker to access encrypted and unencrypted confidential information The major danger of this attack is that it can occur without the user knowing that they have been hacked.

Risks to Cloud Computing - System Attacks Cont. Network Sniffer Sniffing is generally referred to as a “passive” type of attack, wherein the attackers can be silent/invisible on the network. The sniffer can go unnoticed on a network for long periods of time, and possibly decode and break into the secured layers of the network system to further attack the users. Sniffing can cause possible system crashes, compromised access to passwords and user IDs, and also confidential network details.

Conclusion Cloud computing is the way of the future. The convenience and the ease of access of Cloud computing is a plus for businesses that have employees who need to access business data anytime, and anywhere. The drawbacks of Cloud computing is the network and security issues. Businesses should think thoroughly about using "the Cloud" to suit their business needs.