Security in Cloud Computing

Slides:



Advertisements
Similar presentations
CS898T Mobile and Wireless Network Handheld Device Security By Yuan Chen July 25 th, 2005.
Advertisements

Guide to Network Defense and Countermeasures Second Edition
Building Your Own Firewall Chapter 10. Learning Objectives List and define the two categories of firewalls Explain why desktop firewalls are used Explain.
Intrusion Detection using Honeypots Patrick Brannan Honeyd with virtual machines.
Lecture 11 Reliability and Security in IT infrastructure.
Virtual Machine approach to Security Gautam Prasad and Sudeep Pradhan 10/05/2010 CS 239 UCLA.
Authors: Thomas Ristenpart, et at.
Secure Network Design: Designing a Secure Local Area Network IT352 | Network Security |Najwa AlGhamdi1 Case Study
5205 – IT Service Delivery and Support
Presented by Manager, MIS.  GRIDCo’s intentions for publishing an Acceptable Use Policy are not to impose restrictions that are contrary to GRIDCo’s.
Security Framework For Cloud Computing -Sharath Reddy Gajjala.
1 Integrating a Network IDS into an Open Source Cloud Computing Environment 1st International Workshop on Security and Performance in Emerging Distributed.
Intranet, Extranet, Firewall. Intranet and Extranet.
Computer Crime and Information Technology Security
1 Deployment of Computer Security in an Organization CE-408 Sir Syed University of Engineering & Technology 99-CE-282, 257 & 260.
NICE :Network Intrusion Detection and Countermeasure Selection in Virtual Network Systems.
Software-Defined Networks Jennifer Rexford Princeton University.
Agenda Review route summarization Cisco acquire Sourcefire Review Final Exam.
CSE 4481 Computer Security Lab Mark Shtern. INTRODUCTION.
SECURITY ZONES. Security Zones  A security zone is a logical grouping of resources, such as systems, networks, or processes, that are similar in the.
Chapter 6 of the Executive Guide manual Technology.
Virtual Machine Security Systems Presented by Long Song 08/01/2013 Xin Zhao, Kevin Borders, Atul Prakash.
11 SECURING YOUR NETWORK PERIMETER Chapter 10. Chapter 10: SECURING YOUR NETWORK PERIMETER2 CHAPTER OBJECTIVES  Establish secure topologies.  Secure.
1 Topic 2: Lesson 3 Intro to Firewalls Summary. 2 Basic questions What is a firewall? What is a firewall? What can a firewall do? What can a firewall.
CSE 4481 Computer Security Lab Mark Shtern. INTRODUCTION.
SNORT Biopsy: A Forensic Analysis on Intrusion Detection System By Asif Syed Chowdhury.
Presented by: Reem Alshahrani. Outlines What is Virtualization Virtual environment components Advantages Security Challenges in virtualized environments.
Security in Cloud Computing Zac Douglass Chris Kahn.
Security Vulnerabilities in A Virtual Environment
Security and Assurance in IT organization Name: Mai Hoang Nguyen Class: INFO 609 Professor: T. Rohm.
Cryptography and Network Security Sixth Edition by William Stallings.
Chapter 1: Explore the Network
Security in Cloud Computing Zac douglass Chris kahn.
Understand Network Isolation Part 2 LESSON 3.3_B Security Fundamentals.
Network Security Terms. Perimeter is the fortified boundary of the network that might include the following aspects: 1.Border routers 2.Firewalls 3.IDSs.
Mark Shtern.  Our life depends on computer systems  Traffic control  Banking  Medical equipment  Internet  Social networks  Growing number of.
IS3220 Information Technology Infrastructure Security
Chapter 11 – Cloud Application Development. Contents Motivation. Connecting clients to instances through firewalls. Cloud Computing: Theory and Practice.
ASHRAY PATEL Securing Public Web Servers. Roadmap Web server security problems Steps to secure public web servers Securing web servers and contents Implementing.
Securing Interconnect Networks By: Bryan Roberts.
By: Surapheal Belay ITEC 6322 / Spring ABSTRACT NIST , guide to intrusion detection and prevention systems (IDPS), discusses four types of.
Chapter 13 Network Security Auditing Antivirus Firewalls Authentication Authorization Encryption.
25/09/ Firewall, IDS & IPS basics. Summary Firewalls Intrusion detection system Intrusion prevention system.
Clouding with Microsoft Azure
Chapter 6: Securing the Cloud
Port Knocking Benjamin DiYanni.
CompTIA Security+ SY0-401 Real Exam Question Answer
CONNECTING TO THE INTERNET
Rootkit Detection and Mitigation
Module 8: Securing Network Traffic by Using IPSec and Certificates
Joe, Larry, Josh, Susan, Mary, & Ken
Chapter 2. Malware Analysis in VMs
Network Security: IP Spoofing and Firewall
CONFIDENTIALITY, INTEGRITY, LEGAL INTERCEPTION
Computer Security Firewalls November 19, 2018 ©2004, Bryan J. Higgs.
Intrusion Detection & Prevention
11/17/2018 9:32 PM © Microsoft Corporation. All rights reserved. MICROSOFT MAKES NO WARRANTIES, EXPRESS, IMPLIED OR STATUTORY, AS TO THE INFORMATION IN.
Home Internet Vulnerabilities
Firewalls Routers, Switches, Hubs VPNs
Security in Cloud Computing
Faculty of Science IT Department By Raz Dara MA.
Firewalls.
Module 8: Securing Network Traffic by Using IPSec and Certificates
BACHELOR’S THESIS DEFENSE
BACHELOR’S THESIS DEFENSE
Key Manager Domains February, 2019.
FIREWALL.
Security Delivery Platform for the Micro-segmented Data Center
Computer Security By: Muhammed Anwar.
Chapter # 3 COMPUTER AND INTERNET CRIME
Presentation transcript:

Security in Cloud Computing Zac Douglass Chris Kahn

Mission Statement To provide a detailed assessment on the security concerns of cloud computing Specifically in relation to: Infrastructure as a Service Public cloud

Background Cloud computing is separated into three service models: Infrastructure as a Service Platform as a Service Software as a Service And four deployment models: Public cloud Private cloud Community cloud

Significance Cloud computing is becoming a major aspect in the IT environment Many businesses, organizations, and agencies all implement the cloud Becoming more popular for hackers/organized crime While in its infancy, now is the perfect time to shape the cloud around a secure environment Major losses can happen Must take preventative action!

Monitoring The act of starting, stopping, pausing, restarting, or modifying a Virtual Machine Usually controlled by the Host (Privileged Control) Wide range of effect Threat based on trust

Communication All network traffic routes through the host Allows host to read all network traffic Compromise of the Host means compromise of the system Virtual machine data bleed Results from multiple VMs using the same application on shared resources

DDoS Very serious security risk Cloud Systems must be available 24/7 Would delimit a Cloud System's main function One interrupted Virtual Machine can wreak havoc

Solutions Focus on Virtual Machines because they are the backbone For a DDOS you can restart the malicious virtual machine Allows reallocation of resources Firewalls are crucial Allows disabling all non-essential connections Needs highly specific IP tables for maximum security

Security Virtual Machine (SVM) Provides a detailed analysis of virtual network traffic Intrusion Prevention System detects and prevents: Known attacks Unknown attacks Catch that rootkit! Recently used as malicious software to gain access to privileged data

Anti-DDoS Virtualized Operating System (ADVOS) Secure network computers against DDoS attacks Packet filtering from the source machine to signify malicious traffic Moved from the machine itself to an independent domain Allows this tool to properly function if machine is misbehaving due to malicious code

Conclusion Cloud computing is the future of the IT world By understanding how the cloud works we can properly secure it Companies rely on the cloud to: Conduct efficient business practices Minimize cost associated with resources Rid IT systems of duplicate software/hardware Security risks compromise these aspects