Cloud Computing. Definition  The Cloud is a metaphor for the Internet  Cloud computing is a model for enabling ubiquitous, convenient, on-demand network.

Slides:



Advertisements
Similar presentations
Cloud Computing in the Federal Sector: What is it, what to worry about, and what to negotiate. Presented by: Sabrina M. Segal, USITC, Counselor to the.
Advertisements

Security, Privacy and the Cloud Connecticut Community Providers’ Association June 20, 2014 Steven R Bulmer, VP of Professional Services.
Chapter 22: Cloud Computing and Related Security Issues Guide to Computer Network Security.
Clouds C. Vuerli Contributed by Zsolt Nemeth. As it started.
What is Cloud Computing? o Cloud computing:- is a style of computing in which dynamically scalable and often virtualized resources are provided as a service.
CLOUD COMPUTING 10:45-11:15. CLOUD COMPUTING DEFINED  General definition: Hosted services delivery over the Internet from a remote location, either over.
The Cloud: Demystified Neil Cattermull Frontier Technology.
Cloud Usability Framework
Wally Kowal, President and Founder Canadian Cloud Computing Inc.
Be Smart, Use PwrSmart What Is The Cloud?. Where Did The Cloud Come From? We get the term “Cloud” from the early days of the internet where we drew a.
M.A.Doman Model for enabling the delivery of computing as a SERVICE.
SPRING 2011 CLOUD COMPUTING Cloud Computing San José State University Computer Architecture (CS 147) Professor Sin-Min Lee Presentation by Vladimir Serdyukov.
Design of New or Changed Services in the Cloud: An ISO/IEC Perspective Ronald Dattero Missouri State University, CIS Dept. Stuart D. Galup Florida.
Securing and Auditing Cloud Computing Jason Alexander Chief Information Security Officer.
Cloud computing Tahani aljehani.
Discussion on LI for Mobile Clouds
Plan Introduction What is Cloud Computing?
Introduction to Cloud Computing Zsolt Németh MTA SZTAKI.
Effectively and Securely Using the Cloud Computing Paradigm.
Cloud Computing. 2 A division of Konica Minolta Business Solutions USA Inc. What is Cloud Computing? A model for enabling convenient, on-demand network.
Clouds on IT horizon Faculty of Maritime Studies University of Rijeka Sanja Mohorovičić INFuture 2009, Zagreb, 5 November 2009.
CLOUD COMPUTING & COST MANAGEMENT S. Gurubalasubramaniyan, MSc IT, MTech Presented by.
Introduction to Cloud Computing
Cloud Computing Cloud Computing Class-1. Introduction to Cloud Computing In cloud computing, the word cloud (also phrased as "the cloud") is used as a.
Celoxis Intro Celoxis is a web-based project management software company based in India. The Celoxis application integrates management of projects, resources,
By Naranchuluun Davaanyam. IT Perspective for Developer Capital Expenditure (CapEx) for development environ. could be high Acquisition of hardware, software,
1 Introduction to Cloud Computing Jian Tang 01/19/2012.
Cloud Computing Saneel Bidaye uni-slb2181. What is Cloud Computing? Cloud Computing refers to both the applications delivered as services over the Internet.
PRIVATE / PUBLIC / HYBRID CLOUD. Differences between private, public and hybrid clouds Examples of the most popular providers of public/private/hybrid.
Cloud computing is the use of computing resources (hardware and software) that are delivered as a service over the Internet. Cloud is the metaphor for.
Cloud Computing Kwangyun Cho v=8AXk25TUSRQ.
Cloud Computing. What is Cloud Computing? Cloud computing is a model for enabling convenient, on-demand network access to a shared pool of configurable.
Introduction to Cloud Computing
In the name of God :).
Component 4: Introduction to Information and Computer Science Unit 10b: Future of Computing.
M.A.Doman Short video intro Model for enabling the delivery of computing as a SERVICE.
Plan  Introduction  What is Cloud Computing?  Why is it called ‘’Cloud Computing’’?  Characteristics of Cloud Computing  Advantages of Cloud Computing.
What is the cloud ? IT as a service Cloud allows access to services without user technical knowledge or control of supporting infrastructure Best described.
Introduction to Cloud Computing Insigma Hengtian Software Ltd. * 部分材料摘自 * 部分材料摘自 Jimmy Jiang , Doug Terry Shanping Li
PaaSport Introduction on Cloud Computing PaaSport training material.
Chapter 8 – Cloud Computing
Cloud computing Cloud Computing1. NIST: Five essential characteristics On-demand self-service Computing capabilities, disks are demanded over the network.
CLOUD COMPUTING RICH SANGPROM. What is cloud computing? “Cloud computing is a model for enabling ubiquitous, convenient, on-demand network access to a.
Software Acquisition Management. Cloud Computing 2.
3/12/2013Computer Engg, IIT(BHU)1 CLOUD COMPUTING-1.
Web Technologies Lecture 13 Introduction to cloud computing.
1 TCS Confidential. 2 Objective : In this session we will be able to learn:  What is Cloud Computing?  Characteristics  Cloud Flavors  Cloud Deployment.
CLOUD COMPUTING WHAT IS CLOUD COMPUTING?  Cloud Computing, also known as ‘on-demand computing’, is a kind of Internet-based computing,
Distributed Geospatial Information Processing (DGIP) Prof. Wenwen Li School of Geographical Sciences and Urban Planning 5644 Coor Hall
ISA 201 Intermediate Information Systems Acquisition.
Template V.17, July 29, 2011 What’s the Cloud Got to do with HR Transformation? Heath Brownsworth, Director Technology Strategy.
© 2012 Eucalyptus Systems, Inc. Cloud Computing Introduction Eucalyptus Education Services 2.
INTRODUCTION TO CLOUD COMPUTING. CLOUD  The expression cloud is commonly used in science to describe a large agglomeration of objects that visually appear.
Private KEEP OFF! Private KEEP OFF! Open! What is a cloud? Cloud computing is a model for enabling convenient, on-demand network access to a shared.
CS 6027 Advanced Networking FINAL PROJECT ​. Cloud Computing KRANTHI ​ CHENNUPATI PRANEETHA VARIGONDA ​ SANGEETHA LAXMAN ​ VARUN ​ DENDUKURI.
Unit 3 Virtualization.
Chapter 6: Securing the Cloud
Avenues International Inc.
Introduction to Cloud Computing
Principles of Computer Security
Chapter 21: Cloud Computing and Related Security Issues
Introduction to Cloud Computing
Cloud Computing.
Chapter 22: Cloud Computing Technology and Security
Cloud Computing Team Members: Aleksandra Knezevic Willie Robbins
CNIT131 Internet Basics & Beginning HTML
Clouds: What’s new is old is new…
Cloud Computing Cloud computing refers to “a model of computing that provides access to a shared pool of computing resources (computers, storage, applications,
Cloud Computing: Concepts
Basics of Cloud Computing
Presentation transcript:

Cloud Computing

Definition  The Cloud is a metaphor for the Internet  Cloud computing is a model for enabling ubiquitous, convenient, on-demand network access to a shared pool of configurable computing resources (e.g., networks, servers, storage, applications, and services) that can be rapidly provisioned and released with minimal management effort or service provider interaction 1  Five characteristics  Three service models  Four deployment models

Essential Characteristics  On-demand self-service  Broad network access  Resource pooling  Rapid elasticity  Measured service

Service Models  Software as a Service (SaaS)  Capability provided is to use the provider’s applications running on a cloud infrastructure  Applications accessible from various client devices and interfaces (e.g. web browser, thin client)  Consumer does not manage or control the underlying cloud infrastructure including network, servers, operating system, storage or application capabilities, with the possible exception of user-specific settings.  Examples  Google  Salesforce  GoTo Meeting  WebEx  Picasa

Service Models  Platform as a Service (PaaS)  The capability provided is to deploy onto the cloud infrastructure consumer- created or acquired applications created using programming languages, libraries, services, and tools supported by the provider.  The consumer does not manage or control the underlying cloud infrastructure including network, servers, operating systems, or storage.  The consumer has control over the deployed applications and possibly configuration settings for the application-hosting environment.  Examples  Force.com  Google App Engine  Heroku

Service Models  Infrastructure as a Service (IaaS)  The capability provided is to provision processing, storage, networks, and other fundamental computing resources where the consumer is able to deploy and run arbitrary software, which can include operating systems and applications.  The consumer does not manage or control the underlying cloud infrastructure but has control over operating systems, storage, and deployed applications; and possibly limited control of select networking components (e.g., host firewalls).  Examples  Rackspace  Amazon Web Services  Microsoft Azure

2

Deployment Models  Private cloud  The cloud infrastructure is provisioned for exclusive use by a single organization comprising multiple consumers (e.g., business units).  It may be owned, managed, and operated by the organization, a third party, or some combination of them, and it may exist on or off premises.  Community cloud  The cloud infrastructure is provisioned for exclusive use by a specific community of consumers from organizations that have shared concerns (e.g., mission, security requirements, policy, and compliance considerations).  It may be owned, managed, and operated by one or more of the organizations in the community, a third party, or some combination of them, and it may exist on or off premises.

Deployment Models  Public cloud  The cloud infrastructure is provisioned for open use by the general public.  It may be owned, managed, and operated by a business, academic, or government organization, or some combination of them.  It exists on the premises of the cloud provider.  Hybrid cloud  The cloud infrastructure is a composition of two or more distinct cloud infrastructures (private, community, or public) that remain unique entities, but are bound together by standardized or proprietary technology that enables data and application portability (e.g., cloud bursting for load balancing between clouds).

Public Cloud Private Cloud Hybrid Cloud Control/Governance Economies of Scale Economies of Scale vs Control and Governance

Pros  Scale and Cost  Next Generation Architecture  Choice and Agility  Environmentally Friendly  Improved Disaster Recovery  Ubiquitous  Device, OS and Browser Independent  Lower Software Costs  Lower Hardware Costs Cons  Internet Connection Dependent  Reliability  Lack of Control  Security  Ongoing Costs  Non-negotiable Agreements  No Hard Drive  Lack of Full Support  Software Incompatibility  Multiple Logon IDs and Passwords

Security and Logon Management  Know who is supposed to have access to each resource and service  Limit data access based on user context  Take a risk-based approach to securing assets used in the cloud  Extend security to the device  Add intelligence to network protection  Have internal processes to deactivate ALL user accounts upon termination  Single Sign On (SSO) and AD Integration are not necessarily the Holy Grail

Contracts  Read and understand the entire contract  Know your rights  May be expensive to break and result in data loss

Backups  Typically handled by the vendor  Verify the process  How are backups stored?  Frequency  Can you restore data or do you rely on the vendor?  Level of restoration  Server  File/Mailbox

Vendor Security and Availability  Data Center  Verify physical location and hardware  Verify security  Who comes and goes  How and when your information is updated  Availability  Guaranteed up time  Failover and redundancy  Colocation center (see Data Center above)  Bandwidth available

Interaction with Organization Resources  Data feeds  Format and type  Frequency  Downtime  Who develops  Direct Connection  Terminology  Ensure desired results  Active Directory  More than user credentials

Non-Business Use or Interaction  Corporate Devices  BYOD

BYOD  Allure  Staff bear the cost of device  Staff know how to use the device  Carry only one phone  Reality  Costs may be higher  More complex to manage

Access Considerations   HRIS  Network Resources  Financial Data  Protected Health Information (PHI)

Security Considerations  Device Password Protection  Encryption  Device/OS Specific  3 rd Party (e.g. TouchDown)  Malware  Apps  Stolen or Lost Devices  Can you wipe the device?  If so, what about personal information?

BYOD Security Approaches  Mobile Device Management – MDM  MobileIron  Airwatch (VMWare)  JAMF Software iOS MDM  Good Technology  Identity Management – IDM  Meru Identity Manager (Meru Networks)  IDSentrie (A10 Networks)  Network Access Control – NAC  Stealthwatch (Lancope)  ClearPass (Aruba)  Aerohive Hive Manager

Resources/References  Four IT shops, four approaches to BYOD network security, David Geer, TechTarget.com, January 2013   2 Introduction to Cloud Computing, ProfEdge Solutions Pvt Ltd., Jul 6, 2013,         