Security in Cloud Computing Zac Douglass Chris Kahn.

Slides:



Advertisements
Similar presentations
CS898T Mobile and Wireless Network Handheld Device Security By Yuan Chen July 25 th, 2005.
Advertisements

Guide to Network Defense and Countermeasures Second Edition
VPN: Virtual Private Network Presented by: Germaine Bacon Lizzi Beduya Betty Huang Jun Mitsuoka Juliet Polintan.
Building Your Own Firewall Chapter 10. Learning Objectives List and define the two categories of firewalls Explain why desktop firewalls are used Explain.
Sanjay Goel, School of Business/Center for Information Forensics and Assurance University at Albany Proprietary Information 1 Unit Outline Information.
Lecture 11 Reliability and Security in IT infrastructure.
Virtual Machine approach to Security Gautam Prasad and Sudeep Pradhan 10/05/2010 CS 239 UCLA.
Internet Quarantine: Requirements for Containing Self-Propagating Code David Moore et. al. University of California, San Diego.
Secure Network Design: Designing a Secure Local Area Network IT352 | Network Security |Najwa AlGhamdi1 Case Study
5205 – IT Service Delivery and Support
N. GSU Slide 1 Chapter 04 Cloud Computing Systems N. Xiong Georgia State University.
Presented by Manager, MIS.  GRIDCo’s intentions for publishing an Acceptable Use Policy are not to impose restrictions that are contrary to GRIDCo’s.
Security Risk Management Marcus Murray, CISSP, MVP (Security) Senior Security Advisor, Truesec
Security Framework For Cloud Computing -Sharath Reddy Gajjala.
1 Integrating a Network IDS into an Open Source Cloud Computing Environment 1st International Workshop on Security and Performance in Emerging Distributed.
Intranet, Extranet, Firewall. Intranet and Extranet.
Computer Crime and Information Technology Security
1 Deployment of Computer Security in an Organization CE-408 Sir Syed University of Engineering & Technology 99-CE-282, 257 & 260.
BotNet Detection Techniques By Shreyas Sali
NICE :Network Intrusion Detection and Countermeasure Selection in Virtual Network Systems.
Software-Defined Networks Jennifer Rexford Princeton University.
Agenda Review route summarization Cisco acquire Sourcefire Review Final Exam.
Honeypot and Intrusion Detection System
SECURITY ZONES. Security Zones  A security zone is a logical grouping of resources, such as systems, networks, or processes, that are similar in the.
Chapter 6 of the Executive Guide manual Technology.
1 CISCO SAFE: VALIDATED SECURITY REFERENCE ARCHITECTURE What It Is Business Transformation Top Questions To Ask To Initiate The Sale Where It Fits KEY.
Virtual Machine Security Systems Presented by Long Song 08/01/2013 Xin Zhao, Kevin Borders, Atul Prakash.
11 SECURING YOUR NETWORK PERIMETER Chapter 10. Chapter 10: SECURING YOUR NETWORK PERIMETER2 CHAPTER OBJECTIVES  Establish secure topologies.  Secure.
Network and Perimeter Security Paula Kiernan Senior Consultant Ward Solutions.
Principles of Computer Security: CompTIA Security + ® and Beyond, Third Edition © 2012 Principles of Computer Security: CompTIA Security+ ® and Beyond,
Chapter 01: Introduction to Network Security. Network  A Network is the inter-connection of communications media, connectivity equipment, and electronic.
1 Topic 2: Lesson 3 Intro to Firewalls Summary. 2 Basic questions What is a firewall? What is a firewall? What can a firewall do? What can a firewall.
CSE 4481 Computer Security Lab Mark Shtern. INTRODUCTION.
SNORT Biopsy: A Forensic Analysis on Intrusion Detection System By Asif Syed Chowdhury.
Presented by: Reem Alshahrani. Outlines What is Virtualization Virtual environment components Advantages Security Challenges in virtualized environments.
PwC New Technologies New Risks. PricewaterhouseCoopers Technology and Security Evolution Mainframe Technology –Single host –Limited Trusted users Security.
Advanced Persistent Threats (APT) Sasha Browning.
SECURING SELF-VIRTUALIZING ETHERNET DEVICES IGOR SMOLYAR, MULI BEN-YEHUDA, AND DAN TSAFRIR PRESENTED BY LUREN WANG.
Security Vulnerabilities in A Virtual Environment
Security and Assurance in IT organization Name: Mai Hoang Nguyen Class: INFO 609 Professor: T. Rohm.
Cryptography and Network Security Sixth Edition by William Stallings.
Chapter 1: Explore the Network
Security in Cloud Computing Zac douglass Chris kahn.
Understand Network Isolation Part 2 LESSON 3.3_B Security Fundamentals.
SEMINAR ON IP SPOOFING. IP spoofing is the creation of IP packets using forged (spoofed) source IP address. In the April 1989, AT & T Bell a lab was among.
Network Security Terms. Perimeter is the fortified boundary of the network that might include the following aspects: 1.Border routers 2.Firewalls 3.IDSs.
Mark Shtern.  Our life depends on computer systems  Traffic control  Banking  Medical equipment  Internet  Social networks  Growing number of.
DOS Attacks Lyle YapDiangco COEN 150 5/21/04. Background DOS attacks have been around for decades Usually intentional and malicious Can cost a target.
UNDER THE GUIDENCE OF: Mr.M.JAYANTHI RAO,M.Tech HOD OF IT. BY: I.ADITHYA(09511A1212) HONEYPOTS.
Chapter 11 – Cloud Application Development. Contents Motivation. Connecting clients to instances through firewalls. Cloud Computing: Theory and Practice.
A Better Way Huawei Financial Agile Network Solution Success Cases.
Unit 2 Personal Cyber Security and Social Engineering Part 2.
Securing Interconnect Networks By: Bryan Roberts.
Chapter 13 Network Security Auditing Antivirus Firewalls Authentication Authorization Encryption.
25/09/ Firewall, IDS & IPS basics. Summary Firewalls Intrusion detection system Intrusion prevention system.
Chapter 6: Securing the Cloud
CompTIA Security+ SY0-401 Real Exam Question Answer
CONNECTING TO THE INTERNET
Module 8: Securing Network Traffic by Using IPSec and Certificates
Computer Security Firewalls November 19, 2018 ©2004, Bryan J. Higgs.
Home Internet Vulnerabilities
Security in Cloud Computing
Firewalls.
Module 8: Securing Network Traffic by Using IPSec and Certificates
Key Manager Domains February, 2019.
FIREWALL.
Computer Security By: Muhammed Anwar.
Chapter # 3 COMPUTER AND INTERNET CRIME
Security in Cloud Computing
Presentation transcript:

Security in Cloud Computing Zac Douglass Chris Kahn

Mission Statement To provide a detailed assessment on the security concerns of cloud computing Specifically in relation to: Infrastructure as a Service Public cloud

Background Cloud computing is separated into three service models: Infrastructure as a Service Platform as a Service Software as a Service And four deployment models: Public cloud Private cloud Community cloud

Significance Cloud computing is becoming a major aspect in the IT environment Many businesses, organizations, and agencies all implement the cloud Becoming more popular for hackers/organized crime While in its infancy, now is the perfect time to shape the cloud around a secure environment Major losses can happen Must take preventative action!

Monitoring The act of starting, stopping, pausing, restarting, or modifying a Virtual Machine Usually controlled by the Host (Privileged Control) Wide range of effect Threat based on trust

Communication All network traffic routes through the host Allows host to read all network traffic Compromise of the Host means compromise of the system Virtual machine data bleed Results from multiple VMs using the same application on shared resources

DDoS Very serious security risk Cloud Systems must be available 24/7 Would delimit a Cloud System's main function One interrupted Virtual Machine can wreak havoc

Solutions Focus on Virtual Machines because they are the backbone For a DDOS you can restart the malicious virtual machine  Allows reallocation of resources Firewalls are crucial  Allows disabling all non-essential connections  Needs highly specific IP tables for maximum security

Security Virtual Machine (SVM) Provides a detailed analysis of virtual network traffic Intrusion Prevention System detects and prevents: Known attacks Unknown attacks Catch that rootkit! Recently used as malicious software to gain access to privileged data

Anti-DDoS Virtualized Operating System (ADVOS) Secure network computers against DDoS attacks Packet filtering from the source machine to signify malicious traffic Moved from the machine itself to an independent domain Allows this tool to properly function if machine is misbehaving due to malicious code

Conclusion Cloud computing is the future of the IT world By understanding how the cloud works we can properly secure it Companies rely on the cloud to: Conduct efficient business practices Minimize cost associated with resources Rid IT systems of duplicate software/hardware Security risks compromise these aspects