Cloud Computing Part #3 Zigmunds Buliņš, Mg. sc. ing 1.

Slides:



Advertisements
Similar presentations
Transfer Content to a Website What is FTP? File Transfer Protocol FTP is a protocol – a set of rules Designed to allow files to be transferred across.
Advertisements

RASPro is a secure high performance remote application delivery platform through a perfect combination of application hosting and application streaming.
Chapter 17: WEB COMPONENTS
Session Hijacking Why web security depends on communications security and how TLS everywhere is the only solution. Scott Helme - 6th Aug scotthel.me.
Information Security 1 Information Security: Security Tools Jeffy Mwakalinga.
Security Issues and Challenges in Cloud Computing
Security Presented by : Qing Ma. Introduction Security overview security threats password security, encryption and network security as specific.
Supervisor : Mr. Hadi Salimi Advanced Topics in Information Systems Mazandaran University of Science and Technology February 4, 2011 Survey on Cloud Computing.
Chapter 7 HARDENING SERVERS.
Lesson 11-Virtual Private Networks. Overview Define Virtual Private Networks (VPNs). Deploy User VPNs. Deploy Site VPNs. Understand standard VPN techniques.
Information Networking Security and Assurance Lab National Chung Cheng University 1 Top Vulnerabilities in Web Applications (I) Unvalidated Input:  Information.
Security Management IACT 918 July 2004 Gene Awyzio SITACS University of Wollongong.
NETWORKS Lauren Hickman Patrick McCamy Morgan Pace Noah Ryder.
ASP.NET 2.0 Chapter 6 Securing the ASP.NET Application.
Chapter 20: Network Security Business Data Communications, 4e.
5205 – IT Service Delivery and Support
N. GSU Slide 1 Chapter 04 Cloud Computing Systems N. Xiong Georgia State University.
Virtual Private Network
Barracuda Networks Steve Scheidegger Commercial Account Manager
Real Security for Server Virtualization Rajiv Motwani 2 nd October 2010.
© 2007 Cisco Systems, Inc. All rights reserved.Cisco Public 1 Version 4.1 ISP Responsibility Working at a Small-to-Medium Business or ISP – Chapter 8.
ISOM MIS3150 Data and Info Mgmt Database Security Arijit Sengupta.
Cloud Computing Saneel Bidaye uni-slb2181. What is Cloud Computing? Cloud Computing refers to both the applications delivered as services over the Internet.
 Cloud computing  Workflow  Workflow lifecycle  Workflow design  Workflow tools : xcp, eucalyptus, open nebula.
Principles of Computer Security: CompTIA Security + ® and Beyond, Third Edition © 2012 Principles of Computer Security: CompTIA Security+ ® and Beyond,
Quality Attributes of Web Software Applications – Jeff Offutt By Julia Erdman SE 510 October 8, 2003.
IT Infrastructure Chap 1: Definition
Lesson 20-Wireless Security. Overview Introduction to wireless networks. Understanding current wireless technology. Understanding wireless security issues.
Vulnerabilities in peer to peer communications Web Security Sravan Kunnuri.
Virtual Machine Security Systems Presented by Long Song 08/01/2013 Xin Zhao, Kevin Borders, Atul Prakash.
Protecting Internet Communications: Encryption  Encryption: Process of transforming plain text or data into cipher text that cannot be read by anyone.
Network and Perimeter Security Paula Kiernan Senior Consultant Ward Solutions.
Protecting Students on the School Computer Network Enfield High School.
Principles of Computer Security: CompTIA Security + ® and Beyond, Third Edition © 2012 Principles of Computer Security: CompTIA Security+ ® and Beyond,
Network Security. 2 SECURITY REQUIREMENTS Privacy (Confidentiality) Data only be accessible by authorized parties Authenticity A host or service be able.
Copyright © cs-tutorial.com. Overview Introduction Architecture Implementation Evaluation.
Presented by: Reem Alshahrani. Outlines What is Virtualization Virtual environment components Advantages Security Challenges in virtualized environments.
Lecture 16 Page 1 CS 236 Online Web Security CS 236 On-Line MS Program Networks and Systems Security Peter Reiher.
Lesson 19-E-Commerce Security Needs. Overview Understand e-commerce services. Understand the importance of availability. Implement client-side security.
Chap1: Is there a Security Problem in Computing?.
ITGS Network Architecture. ITGS Network architecture –The way computers are logically organized on a network, and the role each takes. Client/server network.
Security Vulnerabilities in A Virtual Environment
Chapter 12: How Private are Web Interactions?. Why we care? How much of your personal info was released to the Internet each time you view a Web page?
Database Security Cmpe 226 Fall 2015 By Akanksha Jain Jerry Mengyuan Zheng.
| nectar.org.au NECTAR TRAINING Module 5 The Research Cloud Lifecycle.
WEB SERVER SOFTWARE FEATURE SETS
Chapter 40 Network Security (Access Control, Encryption, Firewalls)
Computer Security By Duncan Hall.
THE NEED FOR NETWORK SECURITY Hunar & Nawzad & Kovan & Abdulla & Aram.
Carrie Estes Collin Donaldson.  Zero day attacks  “zero day”  Web application attacks  Signing up for a class  Hardening the web server  Enhancing.
By: Brett Belin. Used to be only tackled by highly trained professionals As the internet grew, more and more people became familiar with securing a network.
New cloud services demand new security solutions. The evolving cloud landscape is paving the way for modern and more sophisticated technology. Among the.
Clouding with Microsoft Azure
Network security Vlasov Illia
CLOUD ARCHITECTURE Many organizations and researchers have defined the architecture for cloud computing. Basically the whole system can be divided into.
Chapter 6: Securing the Cloud
BEST CLOUD COMPUTING PLATFORM Skype : mukesh.k.bansal.
Working at a Small-to-Medium Business or ISP – Chapter 8
World Wide Web policy.
Securing the Network Perimeter with ISA 2004
Introduction to Networking
CLOUD COMPUTING Presented By:- EduTechlearners
Cloud Testing Shilpi Chugh.
RASPro is a secure high performance remote application delivery platform through a perfect combination of application hosting and application streaming.
Concept of VLAN (Virtual LAN) and Benefits
Cloud computing mechanisms
INTERNET SECURITY.
Presentation transcript:

Cloud Computing Part #3 Zigmunds Buliņš, Mg. sc. ing 1

Security in a cloud  Traditional threats to a software  Functional threats of cloud components  Attacks on a client  Virtualization threats  Threat of cloud complexity  Attacks on hypervisor  Threats of VM migration  Attacks on management systems  Privacy, personal data 2

Traditional threats to a software The traditional treads are related to the vulnerabilities of network protocols, operating systems, modular components and other similar weaknesses. This is a classic security threat, to solve that, it is sufficient to use anti-virus software, firewall and other components discussed later. It is important that these tools are adapted to the cloud environment to run effectively in virtualization. 3

Functional threats of cloud components  This type of attack is associated with multiple layers of the "clouds", the main principle ofv security – the general level of security is the security of the weakest element. 4 Cloud elementMeans of security Proxy serverProtection against DoS-attacks Web serverMonitoring the integrity of the web pages Application serverShielding of the applications Data storage layerProtection against SQL injections Data storage systemsAccess control and backups

Attacks on a client These types of attacks have worked out in a web environment, but they are just as relevant in cloud environments, as users connect to the cloud through a web browser. Attacks include such types as Cross Site Scripting (XSS), DoS attacks, interception of web sessions, stealing passwords, "the man in the middle” and others. 5

Virtualization threats Since the platform for the cloud elements, usually is a virtual environment, the attack on virtualization threatens the entire cloud as a whole. This type of attack is unique to cloud computing. 6

Threat of cloud complexity Monitoring the events in the "cloud" and management of them is also a security issue. How do we ensure that all resources are counted and that there is no rogue virtual machine that perform third- party processes and do not interfere in mutual configuration of the layers and elements of the "cloud"? 7

Attacks on hypervisor In fact, a key element in the virtual system is a hypervisor which provides separation of physical computer resources among virtual machines. Interfering the work of the hypervisor or its breach may allow one virtual machine to access resources of other – network traffic, stored data. This can also lead to virtual machine displacement from the server. 8

Threats of VM migration Note that the virtual machine itself is a file that can be executed on different nodes of the "cloud". The system of virtual machine management includes mechanisms for the transfer (migration) of virtual machines. Nevertheless, it is possible to steal virtual machine file and run it out of the cloud. It is impossible to steal the physical server from the data centre, but you can steal files of virtual machines across the network without physical access to servers. 9

Attacks on management systems A large number of virtual machines that are used in the "clouds", especially in public clouds require a management system that can reliably control the creation, transfer and utilization of virtual machines. The interference in the management system can lead to ghost virtual machines, blocking some of the machines and the substitution of elements or layers in the cloud to the rogue. 10

Privacy, personal data When it comes to the privacy of data, there are a lot of problems with the legislation – such as the processing of personal data and its protection. Choosing a cloud computing as a solution for business systems, it is important to take into account the confidentiality of the data that will be stored in a "cloud". To store secret and top secret data in the "cloud" environments is not absolutely safe – that's why government agencies are still not switched to “clouds” 11

Thank you! 12