16
Cloud Computing Security Threats & Responses Presented by: Shefee Munees TK 1

Cloud Computing Security Threats and Responses

Embed Size (px)

Citation preview

Page 1: Cloud Computing Security Threats and Responses

Cloud Computing Security

Threats & ResponsesPresented by:

Shefee Munees TK

1

Page 2: Cloud Computing Security Threats and Responses

Introduction

• What is Cloud Computing?

• Cloud computing is a network-based environment

that focuses on sharing computations or resources.

• In cloud, costumers must only pay for what they use

and have not to pay for local resources which they

need to such as storage or infrastructure.

2

Page 3: Cloud Computing Security Threats and Responses

Types of Cloud

• The three types of cloud environments:

1.Public Cloud

2.Private Cloud

3.Hybrid Cloud

3

Page 4: Cloud Computing Security Threats and Responses

Service Environments

• The three major types of service in the cloud environment:

1.SaaS(Software as a Service)

2.PaaS(Platform as a Service)

3.IaaS(Infrastructure as a Service)

4

Page 5: Cloud Computing Security Threats and Responses

RAS

RAS : Reliability Availability Security

For having good and high performance

Providers must meet features such as:

1.Availability management

2.Access control management

3.Vulnerability and problem management

4.Patch and configuration management

5.Countermeasure

6.Cloud system using and access monitoring

5

Page 6: Cloud Computing Security Threats and Responses

Information Security Policies

In cloud computing technology there are a set

of important policy issues, which include issues of

privacy, security, anonymity, government

surveillance, reliability, and liability, among

others .

But the most important between them is security

and how cloud provider assures it.

6

Page 7: Cloud Computing Security Threats and Responses

Security Issues

1. Privileged user access

2. Regulatory compliance

3. Data location

4. Data segregation

5. Recovery

6. Investigative support

7. Long-term viability

7

Page 8: Cloud Computing Security Threats and Responses

Cloud RAS Issues

Using Cloud results applications and data will

move under third-party control.

Shared responsibility model will bring new

security management challenges to the

organization's IT operations staff .

8

Page 9: Cloud Computing Security Threats and Responses

Data Leakage

First, the data will store away from the customer's

local machine.

Second, the data is moving from a single-tenant

to a multi-tenant environment.

These changes can raise an important concern

that called data leakage.

9

Page 10: Cloud Computing Security Threats and Responses

Cloud Security Issues

All of users who use same virtual machine as

infrastructure, if a hacker steals a virtual machine

or take control over it, he will be able to access to

all users' data within it.

The hacker can copy them into his local machine

before cloud provider detect that virtual machine

is in out of control then the hacker with analysis

the data may be find valuable data afterward

10

Page 11: Cloud Computing Security Threats and Responses

DDOS Attacks Against Cloud

DDoS: Distributed Denial of Service

Serious problem is when a malicious user

deliberately done a DDoS attacks using botnet.

Unfortunately, similar to IPS(Intrusion Prevention

Systems) solutions, firewalls are vulnerable and

ineffective against DDoS attacks.

11

Page 12: Cloud Computing Security Threats and Responses

Solutions Against Cloud

Security Problems

There are several traditional solutions to mitigate

security problems that exist in the Internet

environment, as a cloud infrastructure, but

nature of cloud causes some security problem

that they are especially exist in cloud

environment.

12

Page 13: Cloud Computing Security Threats and Responses

Access Control

Control access to information.

Manage user access rights.

Encourage good access practices.

Control access to network services.

Control access to operating systems.

Control access to applications and systems.

13

Page 14: Cloud Computing Security Threats and Responses

Incident Countermeasure and

Response

1. Partitioning

2. Migration

3. Workload Analysis and Allocation

14

Page 15: Cloud Computing Security Threats and Responses

Conclusion

As a solution, cloud providers can add more

resource to protect themselves from malicious

attacks but unfortunately there is no defense

against a powerful DDoS attack which has good

sapience. Certain countermeasures can be

implemented to increase reliability to some

extend.

15

Page 16: Cloud Computing Security Threats and Responses

THANK YOU

16