1 / 8

Ravi Namboori On Copy Data Management & Efficient Data Storage

This PPT is about data management, discusses on how it is possible for us to manage our data better & securely. Creation of more space to operate in is one of its main benefits. Do find more information from Ravi Namboori IT Entrepreneur.

Download Presentation

Ravi Namboori On Copy Data Management & Efficient Data Storage

An Image/Link below is provided (as is) to download presentation Download Policy: Content on the Website is provided to you AS IS for your information and personal use and may not be sold / licensed / shared on other websites without getting consent from its author. Content is provided to you AS IS for your information and personal use only. Download presentation by click this link. While downloading, if for some reason you are not able to download a presentation, the publisher may have deleted the file from their server. During download, if you can't get a presentation, the file might be deleted by the publisher.

E N D

Presentation Transcript


  1. Issues Of Cloud Computing Security Presentation by Presented By Ravi Namboori Visit us @ http://ravinamboori.net

  2. What is Cloud computing? Cloud computing is nothing but accessing and using applications and files over the Internet rather than on your own computing devices. How To Secure Cloud Services: Before an organization shifts some of its resources to the cloud Certain measures it should take to ensure that its data will be secure

  3. How To Secure Cloud Services If opting for software-as-a-service (SaaS), the firm has to collect as much information as possible about that service provider's infrastructure and security provisions. Infrastructure-as-a-service (IaaS) service providers should be asked about the tools they provide for the protection of data in virtual space.

  4. Advantages of Cloud Computing Businesses of all kinds are appreciating the advantages that cloud computing offers. Few are: Scalability to expand decrease the size of operations speed with which you can effect changes cost savings

  5. Disadvantages Are: Water hole attacks Water hole attacks are those that stealthily make way through the hackers' toolkits to compromise the privacy of the users' web applications of a company through their web browsers. In the initial phase hackers carry out the investigation and examination of the websites Next move would be to slip an exploit into these sites The exploit abuses the vulnerabilities of the systems, when the employees visit these sites

  6. Few Risks & Conclusion: From the governmental organizations, The governmental agencies come directly to the cloud, where it is transparent. Then, they move to the cloud service provider and detach the organization's link. Conclusion: Cloud must be encrypted and you only must have access to the encryption keys. So that even the governmental agencies will not be able to enter your cloud. In order to prevent water hole attacks, it is recommended protecting the vulnerability by updating and patching all software frequently to restrict potential access points.

  7. Conclusions The way your cloud's architecture is designed is crucial. Advisable to opt for cloud security solutions that adhere to regulations, such as PCI DSS, EU data protection laws, HIPAA, etc. Your organization has to bear the responsibility for breaches. While the cloud vendor secures the basic infrastructure, it is up to you to protect the security of all data you have hosted on the cloud. If you use split-key encryption technologies, your organization should ensure that only your users have control over the data, which includes all your apps.

  8. Thanks!!! Presentation by Ravi Namboori Visit us @ http://ravinamboori.net

More Related