Security in Cloud Computing Zac douglass Chris kahn.

Slides:



Advertisements
Similar presentations
CS898T Mobile and Wireless Network Handheld Device Security By Yuan Chen July 25 th, 2005.
Advertisements

Prepared for [xxxx] – Commercial in Confidence connect transform protect A Cloudy Cyberspace? Tony Roadknight – Technical Architect.
Accountability in Hosted Virtual Networks Eric Keller, Ruby B. Lee, Jennifer Rexford Princeton University VISA 2009.
Chapter 22: Cloud Computing and Related Security Issues Guide to Computer Network Security.
An Approach to Secure Cloud Computing Architectures By Y. Serge Joseph FAU security Group February 24th, 2011.
 Max Planck Institute for Software Systems Towards trusted cloud computing Nuno Santos, Krishna P. Gummadi, and Rodrigo Rodrigues MPI-SWS.
C LOUD C OMPUTING Presented by Ye Chen. What is cloud computing? Cloud computing is a model for enabling ubiquitous, convenient, on- demand network access.
Security Issues and Challenges in Cloud Computing
Virtual Machine approach to Security Gautam Prasad and Sudeep Pradhan 10/05/2010 CS 239 UCLA.
Cloud Computing Will Crowley Monica Lopez Jaimie Morrison.
Securing and Auditing Cloud Computing Jason Alexander Chief Information Security Officer.
Security Risk Management Marcus Murray, CISSP, MVP (Security) Senior Security Advisor, Truesec
Introduction to Virtual Machines. Administration Presentation and class participation: 40% –Each student will present two and a half times this semester.
A Seminar on Securities In Cloud Computing Presented by Sanjib Kumar Raul Mtech(ICT) Roll-10IT61B09 IIT Kharagpur Under the supervision of Prof. Indranil.
Security Framework For Cloud Computing -Sharath Reddy Gajjala.
“ Does Cloud Computing Offer a Viable Option for the Control of Statistical Data: How Safe Are Clouds” Federal Committee for Statistical Methodology (FCSM)
Cloud Computing All Copyrights reserved to Talal Abu-Ghazaleh Organization
MIGRATING INTO A CLOUD P. Sai Kiran. 2 Cloud Computing Definition “It is a techno-business disruptive model of using distributed large-scale data centers.
Jordan Wissel Eric Lewis Sarah Basile. Introduction This presentation will analyze: Overview/History Implementation Advantages/Disadvantages Security.
MATT JARRELL TWYNER JONES CARTER FARMER RICK KASS Cloud Computing.
報告人 : 葉瑞群 日期 : 2011/11/10 出處 : IEEE Transactions on Knowledge and Data Engineering.
Sumit Kumar Archana Kumar Group # 4 CSE 591 : Virtualization and Cloud Computing.
1 Deployment of Computer Security in an Organization CE-408 Sir Syed University of Engineering & Technology 99-CE-282, 257 & 260.
Cloud Computing Kwangyun Cho v=8AXk25TUSRQ.
CLOUD COMPUTING  IT is a service provider which provides information.  IT allows the employees to work remotely  IT is a on demand network access.
NICE :Network Intrusion Detection and Countermeasure Selection in Virtual Network Systems.
Software-Defined Networks Jennifer Rexford Princeton University.
Lecture 6: Cloud Computing By D. Najla Al-Nabhan 1.
Computer Science and Engineering 1 Cloud ComputingSecurity.
In the name of God :).
Alyssa Fung Kyung Yi Brian Patullo. Introduction Background of cloud computing implementation Cloud technology Fundamental problems of cloud computing.
Cloud Computing Security Keep Your Head and Other Data Secure in the Cloud Lynne Pizzini, CISSP, CISM, CIPP Information Systems Security Officer Information.
By Nicole Rowland. What is Cloud Computing?  Cloud computing means that infrastructure, applications, and business processes can be delivered to you.
Modeling and Simulation of Cloud Computing:A Review Wei Zhao, Yong Peng, Feng Xie, Zhonghua Dai 報告者 : 饒展榕.
Presented by: Reem Alshahrani. Outlines What is Virtualization Virtual environment components Advantages Security Challenges in virtualized environments.
Self-service Cloud Computing Presented by: Yu Bai (ybai181) Butt, S., Lagar-Cavilla, H. A., Srivastava, A., & Ganapathy, V. (2012, October). Self-service.
Cyber Insecurity Under Attack Cyber Security Past, present and future Patricia Titus Chief Information Security Officer Unisys Corporation.
Institutional affiliation Date.  Security is very important as it keeps your secret from other know.  An insecure network exposes a business to various.
Security in Cloud Computing Zac Douglass Chris Kahn.
CLOUD COMPUTING Kevin Levy, Gunster David Zimmerman, IBM Marcos Galigarcía, Santander Private Banking.
Security Vulnerabilities in A Virtual Environment
Security and Assurance in IT organization Name: Mai Hoang Nguyen Class: INFO 609 Professor: T. Rohm.
Concerns with Network Research Funding S.Floyd & R. Atkinson, Editors Internet Architecture Board draft-iab-research-funding-02.txt.
Chapter 1: Explore the Network
CSc 8320 Advanced Operating Systems Chapter 8 Distributed Computer Security 8.1 Fundamentals of Computer Security FALL 2013 Instructor: Prof. Yanqing Zhang.
Clouding with Microsoft Azure
CompTIA Security+ Study Guide (SY0-401)
Chapter 6: Securing the Cloud
Problem Statement and Research Question
Hybrid Cloud Architecture for Software-as-a-Service Provider to Achieve Higher Privacy and Decrease Securiity Concerns about Cloud Computing P. Reinhold.
Cloud Computing Kelley Raines.
Chapter 21: Cloud Computing and Related Security Issues
Chapter 22: Cloud Computing Technology and Security
Network Services, Cloud Computing, and Virtualization
CompTIA Security+ Study Guide (SY0-401)
CompTIA Security+ Study Guide (SY0-501)
SECURITY MECHANISM & E-COMMERCE
CONFIDENTIALITY, INTEGRITY, LEGAL INTERCEPTION
Characteristics of Virtualized Environments
Security in Cloud Computing
Cloud computing Technology: innovation. Points  Cloud Computing and Social Network Sites have become major trends not only in business but also in various.
Cloud computing Technology: innovation. Points  Cloud Computing and Social Network Sites have become major trends not only in business but also in various.
Cloud Computing: Concepts
Computer Science and Engineering
Key Manager Domains February, 2019.
Administrative Software in Microsoft Azure Lets Companies Increase Productivity and Control “After conducting analysis and research for the best offer.
Security in Cloud Computing
Computer System Security
Final exam question format
Final exam question format
Presentation transcript:

Security in Cloud Computing Zac douglass Chris kahn

Mission Statement To provide a detailed assessment on the security concerns of cloud computing Specifically in relation to: Infrastructure as a Service Public cloud

Background Cloud computing is separated into three service models: Infrastructure as a Service Platform as a Service Software as a Service And four deployment models: Public cloud Private cloud Community cloud Hybrid cloud

Significance Cloud computing is becoming a major aspect in the IT environment Many businesses, organizations, and agencies all implement the cloud Becoming more popular for hackers/organized crime While in its infancy, now is the perfect time to shape the cloud around a secure environment Major losses can happen Must take preventative action!

Monitoring The act of starting, stopping, pausing, restarting, or modifying a Virtual Machine Usually controlled by the Host (Privileged Control) Wide range of effect Threat based on trust

DDOS Very serious security risk Cloud Systems must be available 24/7 Would delimit a Cloud System's main function One interrupted Virtual Machine can wreak havoc

Solutions Focus on Virtual Machines because they are the backbone For a DDOS you can restart the malicious Virtual machine  Allows reallocation of resources Firewalls are crucial  Allows disabling all non-essential connections  Needs highly specific IP tables for maximum security

Conclusion Cloud computing is the future of the IT world Security of the cloud is VERY important Infrastructures rely on the cloud to: Conduct efficient business practices Minimize cost associated with resources Rid IT systems of duplicate software/hardware Security risks compromise these aspects