Security in Cloud Computing

Slides:



Advertisements
Similar presentations
CS898T Mobile and Wireless Network Handheld Device Security By Yuan Chen July 25 th, 2005.
Advertisements

Chapter 22: Cloud Computing and Related Security Issues Guide to Computer Network Security.
C LOUD C OMPUTING Presented by Ye Chen. What is cloud computing? Cloud computing is a model for enabling ubiquitous, convenient, on- demand network access.
Security Issues and Challenges in Cloud Computing
Supervisor : Mr. Hadi Salimi Advanced Topics in Information Systems Mazandaran University of Science and Technology February 4, 2011 Survey on Cloud Computing.
What is Cloud Computing? o Cloud computing:- is a style of computing in which dynamically scalable and often virtualized resources are provided as a service.
Virtual Machine approach to Security Gautam Prasad and Sudeep Pradhan 10/05/2010 CS 239 UCLA.
Cloud Computing Will Crowley Monica Lopez Jaimie Morrison.
Commonwealth of Massachusetts Statewide Strategic IT Consolidation (ITC) Initiative ITD Virtualization and Shared Services Executive Briefing Presentation.
Securing and Auditing Cloud Computing Jason Alexander Chief Information Security Officer.
A Seminar on Securities In Cloud Computing Presented by Sanjib Kumar Raul Mtech(ICT) Roll-10IT61B09 IIT Kharagpur Under the supervision of Prof. Indranil.
Security Framework For Cloud Computing -Sharath Reddy Gajjala.
PLUG IT IN 4 Cloud Computing. 1.Introduction 2.What Is Cloud Computing? 3.Different Types of Clouds 4.Cloud Computing Services 5.The Benefits of Cloud.
CLOUD COMPUTING & COST MANAGEMENT S. Gurubalasubramaniyan, MSc IT, MTech Presented by.
Cloud Computing All Copyrights reserved to Talal Abu-Ghazaleh Organization
Cloud Computing Cloud Computing Class-1. Introduction to Cloud Computing In cloud computing, the word cloud (also phrased as "the cloud") is used as a.
Presentation to the Housing Technology Conference Tim Cowland- Senior Consultant 27 th February 2014 The Rise of the Housing Cloud.
3 Cloud Computing.
Lecture 6: Cloud Computing By D. Najla Al-Nabhan 1.
UI and Data Entry UI and Data Entry Front-End Business Logic Mid-Tier Data Store Back-End.
Computer Science and Engineering 1 Cloud ComputingSecurity.
Introduction to Cloud Computing Cloud Computing : Module 1.
The Legal Issues Facing Digital Forensic Investigations In A Cloud Environment Presented by Janice Rafraf 15/05/2015Janice Rafraf1.
In the name of God :).
SUNY FARMINGDALE Computer Programming & Information Systems BCS451 – Cloud Computing Prof. Tolga Tohumcu.
About Sally Smoczynski Background in process improvement Consultant in Information Security, Service Management and Business Continuity Strong experience.
Cloud Architecture Chapter 2. SPI Model Cloud Computing Classification Model – SPI - SaaS: (Software as a Service) - PaaS (Platform as a Service) - IaaS.
Alyssa Fung Kyung Yi Brian Patullo. Introduction Background of cloud computing implementation Cloud technology Fundamental problems of cloud computing.
Niagara Framework in the Clouds Scott Boehm. … what the heck does that mean??
IT Internal Audit “Hot Topics” April 2011 Agenda Survey Overview Survey Results IT Internal Audit Hot Topics Overview – Social Media and Social Networking.
Cloud Computing Security Keep Your Head and Other Data Secure in the Cloud Lynne Pizzini, CISSP, CISM, CIPP Information Systems Security Officer Information.
By Nicole Rowland. What is Cloud Computing?  Cloud computing means that infrastructure, applications, and business processes can be delivered to you.
CLOUD COMPUTING cloud computing and its importance to large scale firms such as Apple and Microsoft.
Security in Cloud Computing Zac Douglass Chris Kahn.
CLOUD COMPUTING Kevin Levy, Gunster David Zimmerman, IBM Marcos Galigarcía, Santander Private Banking.
PaaSport Introduction on Cloud Computing PaaSport training material.
SERVER I SLIDE: 3. SERVER I Topic for tomorrow: Chapter 3: Configuring Hyper-V ■■ Objective 3.1: Create and configure virtual machine settings (Group.
Cloud computing Cloud Computing1. NIST: Five essential characteristics On-demand self-service Computing capabilities, disks are demanded over the network.
Architecture & Cybersecurity – Module 3 ELO-100Identify the features of virtualization. (Figure 3) ELO-060Identify the different components of a cloud.
Security in Cloud Computing Zac douglass Chris kahn.
CLOUD COMPUTING RICH SANGPROM. What is cloud computing? “Cloud computing is a model for enabling ubiquitous, convenient, on-demand network access to a.
Web Technologies Lecture 13 Introduction to cloud computing.
Cloud Architecture. SPI Model Cloud Computing Classification Model – SPI Cloud Computing Classification Model – SPI - SaaS: (Software as a Service) -
3/14/2016 © Crown Copyright. All rights reserved. Risk Managed Cloud Computing HMG IA Approach Ian McCormack TD IA Policy and Risk CESG.
By: Joshua Wiegand. Overview ● What is the cloud computing? ● History of Mobile Computing ● Service Models ● Deployment Models ● Architecture ● Security.
Clouding with Microsoft Azure
Unit 3 Virtualization.
CLOUD ARCHITECTURE Many organizations and researchers have defined the architecture for cloud computing. Basically the whole system can be divided into.
Chapter 6: Securing the Cloud
COMP532 IT INFRASTRUCTURE
Problem Statement and Research Question
Planning & System installation
Cloud Computing Kelley Raines.
Chapter 21: Cloud Computing and Related Security Issues
Chapter 22: Cloud Computing Technology and Security
Network Services, Cloud Computing, and Virtualization
CompTIA Security+ Study Guide (SY0-401)
3 Cloud Computing.
CompTIA Security+ Study Guide (SY0-501)
Partition Starter Find out what disk partitioning is, state key features, find a diagram and give an example.
Computers Are Your Future Twelfth Edition
Cloud Computing: Concepts
Fundamental Concepts and Models
Computer Science and Engineering
SUSE CaaS and Dell EMC.
Basics of Cloud Computing
Security in Cloud Computing
Final exam question format
Final exam question format
Presentation transcript:

Security in Cloud Computing Zac douglass Chris kahn

Mission Statement To provide a detailed assessment on the security concerns of cloud computing Specifically in relation to: Infrastructure as a Service Public cloud

Background Cloud computing is separated into three service models: Infrastructure as a Service Platform as a Service Software as a Service And four deployment models: Public cloud Private cloud Community cloud Hybrid cloud

Significance Cloud computing is becoming a major aspect in the IT environment Many businesses, organizations, and agencies all implement the cloud Becoming more popular for hackers/organized crime While in its infancy, now is the perfect time to shape the cloud around a secure environment Major losses can happen Must take preventative action!

Up to date completion… Background information on cloud computing Significance of topic

Remaining Tasks… Pick out specific security flaws: Since dealing with IaaS we can look at physical flaws to networking: Vandalizing servers, machines, cables Also look at software flaws: What can compromise a virtualized machine? Malicious software Physical damage to a machine hosting virtualized operating systems What is a public security flaw? For one, easily accessible to EVERYONE. Users/hackers

Conclusion Cloud computing is the future of the IT world Security of the cloud is VERY important Infrastructures rely on the cloud to: Conduct efficient business practices Minimize cost associated with resources Rid IT systems of duplicate software/hardware Security risks compromise these aspects