Cloud Computing How secure is it? Author: Marziyeh Arabnejad Revised/Edited: James Childress April 2014 Tandy School of Computer Science.

Slides:



Advertisements
Similar presentations
Creating HIPAA-Compliant Medical Data Applications with Amazon Web Services Presented by, Tulika Srivastava Purdue University.
Advertisements

Pros and Cons of Cloud Computing Professor Kam-Fai Wong Faculty of Engineering The Chinese University of Hong Kong.
INADEQUATE SECURITY POLICIES Each covered entity and business associate must have written polices that cover all the Required and Addressable HIPAA standards.
Avoid data leakage, espionage, sabotage and other reputation and business risks without losing employee performance and mobility.
1 Chapter 8 Fundamentals of System Security. 2 Objectives In this chapter, you will: Understand the trade-offs among security, performance, and ease of.
Information Security 1 Information Security: Security Tools Jeffy Mwakalinga.
Project Management Methodology Procurement management.
An Approach to Secure Cloud Computing Architectures By Y. Serge Joseph FAU security Group February 24th, 2011.
Separate Domains of IT Infrastructure
Avoid data leakage, espionage, sabotage and other reputation and business risks without losing employee performance and mobility. Simplify authentication.
Network Security Overview Tales from the trenches.
Lesson 11-Virtual Private Networks. Overview Define Virtual Private Networks (VPNs). Deploy User VPNs. Deploy Site VPNs. Understand standard VPN techniques.
Lesson 9-Securing a Network. Overview Identifying threats to the network security. Planning a secure network.
Factors to be taken into account when designing ICT Security Policies
Stephen S. Yau CSE , Fall Security Strategies.
Barracuda Networks Confidential1 Barracuda Backup Service Integrated Local & Offsite Data Backup.
Network Security. Trust Relationships (Trust Zones) High trust (internal) = f c (once you gain access); g p Low trust ( ) = more controls; fewer privileges.
Intrusion Prevention, Detection & Response. IDS vs IPS IDS = Intrusion detection system IPS = intrusion prevention system.
University of Missouri System 1 Security – Defending your Customers from Themselves StateNets Annual Meeting February, 2004.
Open Cloud Sunil Kumar Balaganchi Thammaiah Internet and Web Systems 2, Spring 2012 Department of Computer Science University of Massachusetts Lowell.
November 2009 Network Disaster Recovery October 2014.
Security Guide for Interconnecting Information Technology Systems
1 Managed Security. 2 Managed Security provides a comprehensive suite of security services to manage and protect your network assets –Managed Firewall.
© 2007 Cisco Systems, Inc. All rights reserved.Cisco Public 1 Version 4.1 ISP Responsibility Working at a Small-to-Medium Business or ISP – Chapter 8.
Treasury in the Cloud Bob Stark – Vice President, Strategy September 17, 2014.
Lesson 8-Information Security Process. Overview Introducing information security process. Conducting an assessment. Developing a policy. Implementing.
 Cloud Computing means storing and accessing data and programs over the Internet instead of your computer’s hard drive.  Your software applications.
Concepts of Database Management Sixth Edition
CLOUD COMPUTING  IT is a service provider which provides information.  IT allows the employees to work remotely  IT is a on demand network access.
Security Baseline. Definition A preliminary assessment of a newly implemented system Serves as a starting point to measure changes in configurations and.
Web Site Content Protection Solution. Protecting Web Site Content with.
EarthLink Server Management and Monitoring Updated August 6, 2015.
COEN 252 Computer Forensics Collecting Network-based Evidence.
Introduction to Cloud Computing
Module 14: Configuring Server Security Compliance
Chapter 6 of the Executive Guide manual Technology.
Cloud Computing Characteristics A service provided by large internet-based specialised data centres that offers storage, processing and computer resources.
1 Managed Premises Firewall. 2 Typical Business IT Security Challenges How do I protect all my locations from malicious intruders and malware? How can.
Module 2: Installing and Maintaining ISA Server. Overview Installing ISA Server 2004 Choosing ISA Server Clients Installing and Configuring Firewall Clients.
Unit 6b System Security Procedures and Standards Component 8 Installation and Maintenance of Health IT Systems This material was developed by Duke University,
G061 - Network Security. Learning Objective: explain methods for combating ICT crime and protecting ICT systems.
Information Systems Security
Lesson 9-Information Security Best Practices. Overview Understanding administrative security. Security project plans. Understanding technical security.
Ali Pabrai, CISSP, CSCS ecfirst, chairman & ceo Preparing for a HIPAA Security Audit.
Cloud Computing Security Keep Your Head and Other Data Secure in the Cloud Lynne Pizzini, CISSP, CISM, CIPP Information Systems Security Officer Information.
Note1 (Admi1) Overview of administering security.
Chapter 2 Securing Network Server and User Workstations.
Discovery 2 Internetworking Module 8 JEOPARDY K. Martin.
Company small business cloud solution Client UNIVERSITY OF BEDFORDSHIRE.
Introduction TO Network Administration
MCSE Guide to Microsoft Exchange Server 2003 Administration Chapter One Introduction to Exchange Server 2003.
“Lines of Defense” against Malware.. Prevention: Keep Malware off your computer. Limit Damage: Stop Malware that gets onto your computer from doing any.
VDI AND DAAS – SAY WHAT?!? Bob Marshall, MD MPH MISM FAAFP Faculty, Valley Family Medicine Residency Faculty, DoD Clinical Informatics Fellowship.
Computer Security Sample security policy Dr Alexei Vernitski.
By: Matt Winkeler.  PCI – Payment Card Industry  DSS – Data Security Standard  PAN – Primary Account Number.
Unit 2 Personal Cyber Security and Social Engineering Part 2.
SemiCorp Inc. Presented by Danu Hunskunatai GGU ID #
Managed IT Services JND Consulting Group LLC
Avtec Inc Virtualization - Securely Moving to the Cloud.
Onsite CRM Security
Clouding with Microsoft Azure
Review of IT General Controls
Unit 3 Virtualization.
Chapter 6: Securing the Cloud
Understanding The Cloud
Avenues International Inc.
Working at a Small-to-Medium Business or ISP – Chapter 8
Managing Clouds with VMM
PLANNING A SECURE BASELINE INSTALLATION
Designing IIS Security (IIS – Internet Information Service)
Presentation transcript:

Cloud Computing How secure is it? Author: Marziyeh Arabnejad Revised/Edited: James Childress April 2014 Tandy School of Computer Science

Outline Introduction Cloud diagram Types of Clouds Benefits of Clouds Security Issues of the Cloud Cloud data center Security Cloud security control Can cloud computing be secure?

Introduction Cloud Computing is an extreme form of outsourcing delivering hosted services via the internet. The Cloud acts as a virtual server that users can access via the internet on an as needed basis. Cloud Computing includes any subscription-based or pay-per-use service extending IT capabilities and allowing users to access stored information remotely.

Cloud diagram

Types of Clouds Public cloud  Sells services to anyone on the internet o Currently Amazon Web Services is the largest public cloud provider Private cloud  A proprietary network or a data center that supplies hosted services to a limited number of people

Public Cloud VS Private Cloud

Benefits of Cloud Computing Reduced costs  Provider saves money due to economies of scale  Resources are contracted and the cost is predictable, simplifies budgeting Safer data  High level of physical protection  Cloud providers use redundancy  Anytime/Anywhere data access  Give the customers contract access requirements Increased storage capacity  Easy to upgrade when needed Worry-free maintenance  Always have the latest and most security technology

Security Issues of Cloud Computing Location  Where the data is actually stored Data segregation  How vendors keep a certain degree of separation between one customers data and another's Recoverability  How quickly and effectively can information be recovered after a large disaster Hacking  This is the most daunting issue for most users, what if someone hacks into my information and shares it with the world?

Security in Cloud Data Centers The data center you choose should offer some protection measures:  Physical Security  Logical Security

Physical Security Redundant power supplies  Backup power supplies needed Redundant Internet connections  Several internet connections should run in the same time Redundant hardware  Multiple hard drives should be prepared Fire and flood  Data should be replicated in multiple locations Theft  Servers should not be easily accessible

Logical Security Logical Security covers the software side of the data center o Firewalls  Act as an electronic barrier between the data center & internet o Anti-virus detection software  Detect and remove any viruses o Data encryption software  Encrypts data as travels between firm and data center o Administrative controls  Govern access to application and data o Security audits  Conduct regular third party intrusion detection audit

Cloud security controls Deterrent controls  Honeypot/net used to attract and monitor hackers.  Tracking users Preventative controls  Implement Best practices:  Install OS and Application updates regularly  Physical security, CCTV, logging, automated alerts, etc  Firewalls, encryption, multi-level authentication

Cloud security controls Corrective controls  Disabling compromised open ports  IP and MAC filtering Detective controls  Snort  Tripwire  Logging and alert systems

Can cloud computing be secure? Summary: ways to reduce risk and protect data  Logging all network and system activity  Automated alerts when baseline parameters are outside the accepted range  Deploy IDS tools like Tripwire & Snort  Implement and maintain an effective network firewall  Implement a sophisticated access control model like RBAC (Role Based Access Controls)  Implement best practices for updates to the OS and all other applications

Can cloud computing be secure? Summary: ways to reduce risk and protect data  Disable/decommission outdated, unused software and hardware  Security awareness Training for employees: helpdesk staff, SAs, management, support staff, contractors, consultants, etc.  Require an AUP for all system users before granting access  Provide an SLA to all customers describing security expectations.  Backup & Restore capability

Question?