Alyssa Fung Kyung Yi Brian Patullo. Introduction Background of cloud computing implementation Cloud technology Fundamental problems of cloud computing.

Slides:



Advertisements
Similar presentations
So You Want to Break Into the Industry… SAS No. 94 Requirements and Issues Related to IT Audits for Not-for-Profit Organizations.
Advertisements

Security on Web 2.0 Krasznay Csaba. Google Search Trends.
SECURITY OF OUTSOURCED IT WORK Offshore teams are taking IT development and management work out of the headquarters Cloud Computing is taking server management.
Cloud Computing Overview of cloud services and how Palm Coast will join the fun.
This paper states that one of the major problem to the adoption of cloud computing is that of security.  Existing cloud computing problem or concerns.
8.1 © 2007 by Prentice Hall 8 Chapter Securing Information Systems.
8.1 © 2007 by Prentice Hall 8 Chapter Securing Information Systems.
Goal of The Paper  What exactly is a VPN?  Why do you need a VPN?  what are some of the technologies used in deploying a VPN?  How does a VPN work?
E-Commerce Security and Fraud Issues and Protections
Assessing the Threat How much money is lost due to cyber crimes? –Estimates range from $100 million to $100s billions –Why the discrepancy? Companies don’t.
5205 – IT Service Delivery and Support
Course 2150A: Designing a Secure Microsoft Windows 2000 Network.
CLOUD COMPUTING Michael Gumbleton. Preview What is the cloud Internet facts DrawbacksSolutionFutureConclusion.
COMPUTER CRIME AND TYPES OF CRIME Prepared by: NURUL FATIHAH BT ANAS.
An Introduction to Assurance and Financial Statement Auditing
The Study of Security and Privacy in Mobile Applications Name: Liang Wei
Security Framework For Cloud Computing -Sharath Reddy Gajjala.
Designing Active Directory Child Domain Sainath K.E.V Directory Services MVP 5/Aug/2015.
CHAPTER 4 Information Security. CHAPTER OUTLINE 4.1 Introduction to Information Security 4.2 Unintentional Threats to Information Security 4.3 Deliberate.
Computer Crime and Information Technology Security
報告人 : 葉瑞群 日期 : 2011/11/10 出處 : IEEE Transactions on Knowledge and Data Engineering.
CHARTERED ACCOUNTANTS
Protecting Web 2.0 Services from Botnet Exploitations Cybercrime and Trustworthy Computing Workshop (CTC), 2010 Second Nguyen H Vo, Josef Pieprzyk Department.
 Prototype for Course on Web Security ETEC 550.  Huge topic covering both system/network architecture and programming techniques.  Identified lack.
Honeypots. Introduction A honeypot is a trap set to detect, deflect, or in some manner counteract attempts at unauthorized use of information systems.
Designing Security for Microsoft® Networks Course 2830B.
Overview:  Different controls in an organization  Relationship between IT controls & financial controls  The Mega Process Leads  Application of COBIT.
Secure Search Engine Ivan Zhou Xinyi Dong. Introduction  The Secure Search Engine project is a search engine that utilizes special modules to test the.
CIS 460 – Network Design Seminar Network Security Scanner Tool GFI LANguard.
Case Study 2 – TeraBit Inc. DMico Johnson Hans Schmidt.
TECHNOLOGY GUIDE THREE
Module 11: Remote Access Fundamentals
By: Ashish Gohel 8 th sem ISE.. Why Cloud Computing ? Cloud Computing platforms provides easy access to a company’s high-performance computing and storage.
Company LOGO Malicious Attacks Brian Duff Nidhi Doshi Timmy Choi Dustin Hellstern.
CSE 4481 Computer Security Lab Mark Shtern. INTRODUCTION.
Cloud Computing Presented by Alicia Wallis and Kerri Warf.
Management of Change ► The health, safety, security, environmental, technical and other impacts of temporary and permanent changes are formally assessed,
Introduction: Information security services. We adhere to the strictest and most respected standards in the industry, including: -The National Institute.
M. Alexander Helen J. Wang Yunxin Liu Microsoft Research 1 Presented by Zhaoliang Duan.
McGraw-Hill/Irwin © 2013 The McGraw-Hill Companies, Inc., All Rights Reserved. Chapter 11 Computer Crime and Information Technology Security.
Company small business cloud solution Client UNIVERSITY OF BEDFORDSHIRE.
INTOSAI Financial Audit Guidelines (ISSAI )
Security in Cloud Computing Zac Douglass Chris Kahn.
CLOUD COMPUTING Kevin Levy, Gunster David Zimmerman, IBM Marcos Galigarcía, Santander Private Banking.
Database security Diego Abella. Database security Global connection increase database security problems. Database security is the system, processes, and.
Security in Cloud Computing Zac douglass Chris kahn.
Safe’n’Sec IT security solutions for enterprises of any size.
Exploitation Development and Implementation PRESENTER: BRADLEY GREEN.
SAMET KARTAL No one wants to share own information with unknown person. Sometimes while sharing something with someone people wants to keep.
FROM CLOUD COMPUTING TO CLOUD MANUFACTURING Jenia Brook.
For More Tutorials ACC 564 ENTIRE COURSE  Please check the details below  ACC 564 Week 1 DQ 1 Value of Information and DQ 2 AIS.
Conflict Resolution & Policy Compliance in Multi-Cloud Distributed System. Presented By:- Adarsh Pillay Deepak Begrajka Rudra gupta.
INFORMATION SECURITY The protection of information from accidental or intentional misuse of a persons inside or outside an organization Comp 212 – Computer.
Business Risk.
Auditing & Investigations I
Auditing Application Controls
3.2 Virtualisation.
ACC 564Competitive Success/tutorialrank.com
ACC 564 NERD Lessons in Excellence-- acc564nerd.com.
ACC 564 Education for Service tutorialrank.com. ACC 564 Entire Course For more course tutorials visit ACC 564 Week 1 DQ 1 Value of.
ACC 564 NERD Education for Service-- acc564nerd.com.
Active Directory Audit
Computer-Based Processing: Developing an Audit Assessment Approach
Facebook Connect By Robert Daigle.
Level 2 Diploma Unit 11 IT Security
Security in Cloud Computing
Cloud Computing: Concepts
Identifying Slow HTTP DoS/DDoS Attacks against Web Servers DEPARTMENT ANDDepartment of Computer Science & Information SPECIALIZATIONTechnology, University.
Key Manager Domains February, 2019.
Security in Cloud Computing
Presentation transcript:

Alyssa Fung Kyung Yi Brian Patullo

Introduction Background of cloud computing implementation Cloud technology Fundamental problems of cloud computing Security issue Lack of knowledge

Cloud Security Implementation Corporations and cloud computing Up-to-date security implementation Example of cloud computing implementation

Bypassing Cloud Computing/Security Creation of virtual machines Attacks on virtual machines Malicious virtual machine attack Denial-of-service attack A keystroke attack

Bypassing Cloud Computing/Security Google and its cloud system security Easy access into servers for users and hackers (single sign-on) Attack on Google’s cloud system Phishing attack

Cloud Security & Accounting Scope of cloud audit Cloud service provider OR cloud service client Assess and evaluate risks of cloud computing changes in company’s operating environment Internal controls Assess and evaluate risks of cloud computing to auditors

Conclusion Cloud computing as a result of change in traditional connectivity models Understanding and minimizing risks associated with cloud computing Future in cloud computing