80 likes | 181 Views
This PPT is about data management, discusses on how it is possible for us to manage our data better & securely. Creation of more space to operate in is one of its main benefits. Do find more information from Ravi Namboori IT Entrepreneur.
E N D
Issues Of Cloud Computing Security Presentation by Presented By Ravi Namboori Visit us @ http://ravinamboori.net
What is Cloud computing? Cloud computing is nothing but accessing and using applications and files over the Internet rather than on your own computing devices. How To Secure Cloud Services: Before an organization shifts some of its resources to the cloud Certain measures it should take to ensure that its data will be secure
How To Secure Cloud Services If opting for software-as-a-service (SaaS), the firm has to collect as much information as possible about that service provider's infrastructure and security provisions. Infrastructure-as-a-service (IaaS) service providers should be asked about the tools they provide for the protection of data in virtual space.
Advantages of Cloud Computing Businesses of all kinds are appreciating the advantages that cloud computing offers. Few are: Scalability to expand decrease the size of operations speed with which you can effect changes cost savings
Disadvantages Are: Water hole attacks Water hole attacks are those that stealthily make way through the hackers' toolkits to compromise the privacy of the users' web applications of a company through their web browsers. In the initial phase hackers carry out the investigation and examination of the websites Next move would be to slip an exploit into these sites The exploit abuses the vulnerabilities of the systems, when the employees visit these sites
Few Risks & Conclusion: From the governmental organizations, The governmental agencies come directly to the cloud, where it is transparent. Then, they move to the cloud service provider and detach the organization's link. Conclusion: Cloud must be encrypted and you only must have access to the encryption keys. So that even the governmental agencies will not be able to enter your cloud. In order to prevent water hole attacks, it is recommended protecting the vulnerability by updating and patching all software frequently to restrict potential access points.
Conclusions The way your cloud's architecture is designed is crucial. Advisable to opt for cloud security solutions that adhere to regulations, such as PCI DSS, EU data protection laws, HIPAA, etc. Your organization has to bear the responsibility for breaches. While the cloud vendor secures the basic infrastructure, it is up to you to protect the security of all data you have hosted on the cloud. If you use split-key encryption technologies, your organization should ensure that only your users have control over the data, which includes all your apps.
Thanks!!! Presentation by Ravi Namboori Visit us @ http://ravinamboori.net