Presentation is loading. Please wait.

Presentation is loading. Please wait.

Security in Cloud Computing

Similar presentations


Presentation on theme: "Security in Cloud Computing"— Presentation transcript:

1 Security in Cloud Computing
Zac Douglass Chris Kahn

2 Mission Statement To provide a detailed assessment on the security concerns of cloud computing Specifically in relation to: Infrastructure as a Service Public cloud

3 Background Cloud computing is separated into three service models:
Infrastructure as a Service Platform as a Service Software as a Service And four deployment models: Public cloud Private cloud Community cloud

4 Significance Cloud computing is becoming a major aspect in the IT environment Many businesses, organizations, and agencies all implement the cloud Becoming more popular for hackers/organized crime While in its infancy, now is the perfect time to shape the cloud around a secure environment Major losses can happen Must take preventative action!

5 Monitoring The act of starting, stopping, pausing, restarting, or modifying a Virtual Machine Usually controlled by the Host (Privileged Control) Wide range of effect Threat based on trust

6 Communication All network traffic routes through the host
Allows host to read all network traffic Compromise of the Host means compromise of the system Virtual machine data bleed Results from multiple VMs using the same application on shared resources

7 DDoS Very serious security risk Cloud Systems must be available 24/7
Would delimit a Cloud System's main function One interrupted Virtual Machine can wreak havoc

8 Solutions Focus on Virtual Machines because they are the backbone
For a DDOS you can restart the malicious virtual machine Allows reallocation of resources Firewalls are crucial Allows disabling all non-essential connections Needs highly specific IP tables for maximum security

9 Security Virtual Machine (SVM)
Provides a detailed analysis of virtual network traffic Intrusion Prevention System detects and prevents: Known attacks Unknown attacks Catch that rootkit! Recently used as malicious software to gain access to privileged data

10 Anti-DDoS Virtualized Operating System (ADVOS)
Secure network computers against DDoS attacks Packet filtering from the source machine to signify malicious traffic Moved from the machine itself to an independent domain Allows this tool to properly function if machine is misbehaving due to malicious code

11 Conclusion Cloud computing is the future of the IT world
By understanding how the cloud works we can properly secure it Companies rely on the cloud to: Conduct efficient business practices Minimize cost associated with resources Rid IT systems of duplicate software/hardware Security risks compromise these aspects


Download ppt "Security in Cloud Computing"

Similar presentations


Ads by Google