160 likes | 299 Views
CSE 8990: Security in the Cloud. Dr. Dave Dampier. Syllabus. Class Hours : This class meets every Monday and Wednesday from 3:30 until 4:45 PM. Classes will begin promptly. Office Hours : Monday and Wednesday 1 – 2. Professor: Dr. David A. Dampier Box 9637, 318 Butler Hall
E N D
CSE 8990: Security in the Cloud Dr. Dave Dampier
Syllabus • Class Hours: This class meets every Monday and Wednesday from 3:30 until 4:45 PM. Classes will begin promptly. • Office Hours: Monday and Wednesday 1 – 2. • Professor: • Dr. David A. Dampier • Box 9637, 318 Butler Hall • Mississippi State, MS 39762-9637 • (662) 325-8923 • dampier@cse.msstate.edu .
Grading Policy • Attendance and Participation 20% • Research Paper 40% • Presentation 30% • Annotated Bibliography 10%
What do you think the cloud is? Stolen from Shane Fry, but it’s okay. He knows I did it.
NIST Definition On-demand self-service Broad network access Resource pooling Rapid elasticity Measured service Stolen from Shane Fry, but it’s okay. He knows I did it. [2]
NIST Definition Visual Model of NIST Working Definition of Cloud Computing http://www.csrc.nist.gov/groups/SNS/cloud-computing/index.hml Essential Characteristics Delivery Models Deployment Models Stolen from Shane Fry, but it’s okay. He knows I did it. [6]
What is the cloud? • Storage • Cheap • Distributed • Automated backups • Computing • Cheap • Scalable • No infrastructure to manage • Usually both are employed Stolen from Shane Fry, but it’s okay. He knows I did it.
Who is the cloud? Stolen from Shane Fry, but it’s okay. He knows I did it. [7]
Security Concerns What do you think the security concerns are when using the cloud? Stolen from Shane Fry, but it’s okay. He knows I did it.
Security Concerns • Data center location • Network perimeter security • Packet replay attacks • Information disclosure • Infrastructure security • Patch process • Underlying protocol security Stolen from Shane Fry, but it’s okay. He knows I did it.
Security Concerns • Physical security • Backup location • File scrubbing • Persistent data storage • VM Images • VM Image Security • OS Security • Known good state • Modified base image Stolen from Shane Fry, but it’s okay. He knows I did it.
Cloud Architecture Stolen from Shane Fry, but it’s okay. He knows I did it.
Malicious Use WPA cracking [4] Password cracking [5] DDoS attacks [3] Botnets [3] Stolen from Shane Fry, but it’s okay. He knows I did it.