Daniel Cuschieri Information Security Distance Learning Weekend Conference August 2013.

Slides:



Advertisements
Similar presentations
© 2012 Open Grid Forum Simplifying Inter-Clouds October 10, 2012 Hyatt Regency Hotel Chicago, Illinois, USA.
Advertisements

Hi – 5 Marcus Hogue Chris Jacobson Alexandra Korol Mark Ordonez Jinjia Xi Security of Cloud Computing.
Prepared for [xxxx] – Commercial in Confidence connect transform protect A Cloudy Cyberspace? Tony Roadknight – Technical Architect.
Security, Privacy and the Cloud Connecticut Community Providers’ Association June 20, 2014 Steven R Bulmer, VP of Professional Services.
Chapter 22: Cloud Computing and Related Security Issues Guide to Computer Network Security.
Clouds C. Vuerli Contributed by Zsolt Nemeth. As it started.
Supervisor : Mr. Hadi Salimi Advanced Topics in Information Systems Mazandaran University of Science and Technology February 4, 2011 Survey on Cloud Computing.
Security Issues in Elastic Clouds
INTRODUCTION TO CLOUD COMPUTING CS 595 LECTURE 4.
Cloud Usability Framework
SaaS, PaaS & TaaS By: Raza Usmani
Cloud Computing Stuart Dillon-Roberts. “In the simplest terms, cloud computing means storing & accessing data & programs over the Internet instead of.
Securing and Auditing Cloud Computing Jason Alexander Chief Information Security Officer.
Cloud computing Tahani aljehani.
THE DICOM 2013 INTERNATIONAL CONFERENCE & SEMINAR March 14-16Bangalore, India DICOM Medical Image Management the Challenges and Solutions – Cloud as a.
Banking Clouds V International Youth Banking Forum.
Tunis, Tunisia, 28 April 2014 Security Issues for Cloud and Future Networks Noureddine Boudriga, Director CN&S, University of Carthage
Cloud Computing Cloud Security– an overview Keke Chen.
Introduction to Cloud Computing
Cloud Enabled Healthcare Presented by: Ron Parker and Stanley Ratajczak Emerging Technology Group Canada Health Infoway Inc. May 28, 2013Copyright © 2013.
© 2012-Robert G Parker May 24, 2012 Page: 1 © 2012-Robert G Parker May 24, 2012 Page: 1 © 2012-Robert G Parker May 24, 2012 Page: 1 © 2012-Robert G Parker.
Cloud Computing Saneel Bidaye uni-slb2181. What is Cloud Computing? Cloud Computing refers to both the applications delivered as services over the Internet.
Jim Reavis, Executive Director Cloud Security Alliance November 22, 2010 Developing a Baseline On Cloud Security.
CLOUD COMPUTING  IT is a service provider which provides information.  IT allows the employees to work remotely  IT is a on demand network access.
Computer Science and Engineering 1 Cloud ComputingSecurity.
Cloud computing.
About Sally Smoczynski Background in process improvement Consultant in Information Security, Service Management and Business Continuity Strong experience.
Overview Abstract Vulnerability: An Overview Cloud Computing Cloud-Specific Vulnerabilities Architectural Components and Vulnerabilities Conclusion.
Niagara Framework in the Clouds Scott Boehm. … what the heck does that mean??
Plan  Introduction  What is Cloud Computing?  Why is it called ‘’Cloud Computing’’?  Characteristics of Cloud Computing  Advantages of Cloud Computing.
In the Cloud How to Address Security in the Cloud.
Cloud Computing Security Keep Your Head and Other Data Secure in the Cloud Lynne Pizzini, CISSP, CISM, CIPP Information Systems Security Officer Information.
1 MIKE MARCELLIN VP PRODUCT MARKETING. THE NEW NETWORK ENABLES CLOUD SERVICES, SECURITY, MOBILITY AND CONTENT DELIVERY NETWORKS.
By Nicole Rowland. What is Cloud Computing?  Cloud computing means that infrastructure, applications, and business processes can be delivered to you.
Kia Manoochehri.  Background  Threat Classification ◦ Traditional Threats ◦ Availability of cloud services ◦ Third-Party Control  The “Notorious Nine”
PaaSport Introduction on Cloud Computing PaaSport training material.
Speaker: Meng-Ting Tsai Date:2010/11/25 The Information Assurance Practices of Cloud Computing Vendors IEEE Communications Society.
Cloud computing Cloud Computing1. NIST: Five essential characteristics On-demand self-service Computing capabilities, disks are demanded over the network.
Implications of Privacy Risks in IT and Operations Virginie Hupé Strategist, Trustworthy Computing Microsoft Corporation.
3/12/2013Computer Engg, IIT(BHU)1 CLOUD COMPUTING-1.
Web Technologies Lecture 13 Introduction to cloud computing.
Elizabeth Muli Technical University of Kenya & James Kimutai Moi University 1.
OTech CalCloud Security General 1  Meets the operational and compliance requirements of the State  SAM/SIMM  NIST  FedRAMP v2  Other necessary regulatory.
George Yauneridge. Overview  Basic Security  Selecting a Provider  Cloud Computing Security Threats  Cloud Computing Security Practices  Conclusion.
Security Policy and Key Management Centrally Manage Encryption Keys - Oracle TDE, SQL Server TDE and Vormetric. Tina Stewart, Vice President.
By Hajira Fatima Safa Mohammed Zaheer Abid Ali. Cloud computing is a result of evolving and adopting existing technologies. The goal of cloud computing.
The National Institute of Standards and Technology (NIST) define Cloud Computing as “a model for enabling convenient, on-demand network access to a shared.
Clouding with Microsoft Azure
CLOUD ARCHITECTURE Many organizations and researchers have defined the architecture for cloud computing. Basically the whole system can be divided into.
Cloud Security– an overview Keke Chen
Hot Topics:Mobility in the Cloud
Cloud Computing Kelley Raines.
Chapter 21: Cloud Computing and Related Security Issues
Introduction to Cloud Computing
Chapter 22: Cloud Computing Technology and Security
Cloud Computing Team Members: Aleksandra Knezevic Willie Robbins
CLOUD COMPUTING Presented By:- EduTechlearners
Clouds: What’s new is old is new…
2 Cloud Computing Transforms the way IT is consumed and managed, bringing costs down Service delivery (NIST 2011) SaaS (Software) PaaS (Platform) IaaS.
Developing a Baseline On Cloud Security Jim Reavis, Executive Director
Service Oriented Architecture for Cloud Based Travel Reservation Software as a Service Comp 684 – Rayna Burgess.
CSCE 715: Network Systems Security
Computers Are Your Future Twelfth Edition
Cloud Computing: Concepts
Fundamental Concepts and Models
Computer Science and Engineering
Basics of Cloud Computing
Done by:Thikra abdullah
Presentation transcript:

Daniel Cuschieri Information Security Distance Learning Weekend Conference August 2013

An evolving term Many existing technologies and approaches to computing combined into something different Storing your data on someone else’s computer and accessing it via a network (Bruce Schneier) A collection of services, applications, information, and infrastructure comprised of pools of compute, network, information, and storage resources that can be acquired or released as necessary (Cloud Security Alliance, 2009)

(NIST, 2009)

Cost savings Improved flexibility Better scalability More focus on the core business Higher availability Device independence

(KPMG Netherlands, 2010)

Generic security threats apply Confidentiality, Integrity and Availability Virtually unlimited Cloud compute power Vulnerability of Cloud management interfaces Malicious Cloud provider insiders A shared Cloud infrastructure Little direct control over data Insufficient forensic and auditing information An unknown risk profile

Data Cloud management Forensics Malicious Cloud provider insiders Compliance Unknown risk profile

Data at rest, in transit or in use (Ponemon Institute, 2012)

In SaaS Consumer encryption before data transmittal Provider encryption after data transmittal Third party encryption during data transmittal In PaaS Application-level encryption Infrastructure-level encryption In IaaS Application-level encryption Volume-based encryption

Encryption policies Availability of encrypted data Integrity of encrypted data Encryption client security Compliance with legislation and standards

Processing encrypted data Sorting encrypted data Searching encrypted data Encryption interoperability

Key generation and storage Key availability Key disposal and expiration Key management policy Separation of duties Key management interoperability

Cloud security is an issue, but measures such as encryption can address these concerns These measures are constantly improving Security will soon change from being a Cloud inhibitor to being one of the key enablers of Cloud adoption (Penn, 2010)

Daniel Cuschieri