Cloud and Database Security

Slides:



Advertisements
Similar presentations
Creating HIPAA-Compliant Medical Data Applications with Amazon Web Services Presented by, Tulika Srivastava Purdue University.
Advertisements

Information System protection and Security. Need for Information System Security §With the invent of computers and telecommunication systems, organizations.
Security Issues and Challenges in Cloud Computing
Security+ Guide to Network Security Fundamentals
8.1 © 2007 by Prentice Hall 8 Chapter Securing Information Systems.
What is Cloud Computing? o Cloud computing:- is a style of computing in which dynamically scalable and often virtualized resources are provided as a service.
Lesson 9-Securing a Network. Overview Identifying threats to the network security. Planning a secure network.
Wonga example Register Question- What risks do you think businesses face due to IT developments?
Security Overview. 2 Objectives Understand network security Understand security threat trends and their ramifications Understand the goals of network.
Term 2, 2011 Week 3. CONTENTS Network security Security threats – Accidental threats – Deliberate threats – Power surge Usernames and passwords Firewalls.
Alter – Information Systems 4th ed. © 2002 Prentice Hall 1 E-Business Security.
E-business Security Dana Vasiloaica Institute of Technology Sligo 22 April 2006.
© 2007 Cisco Systems, Inc. All rights reserved.Cisco Public ITE PC v4.0 Chapter 1 1 Basic Security Networking for Home and Small Businesses – Chapter 8.
Cyber crime & Security Prepared by : Rughani Zarana.
Lecture 10 Intrusion Detection modified from slides of Lawrie Brown.
Cloud Computing. What is Cloud Computing? Cloud computing is a model for enabling convenient, on-demand network access to a shared pool of configurable.
Cloud Computing & Amazon Web Services – EC2 Arpita Patel Software Engineer.
Intrusion Detection Prepared by: Mohammed Hussein Supervised by: Dr. Lo’ai Tawalbeh NYIT- winter 2007.
Types of Electronic Infection
Database Security Tampere University of Technology, Introduction to Databases. Oleg Esin.
COSC 513 Operating Systems Project Presentation: Internet Security Instructor: Dr. Anvari Student: Ying Zhou Spring 2003.
1 Network and E-commerce Security Nungky Awang Chandra Fasilkom Mercu Buana University.
Topic 5: Basic Security.
Chap1: Is there a Security Problem in Computing?.
Security fundamentals Topic 2 Establishing and maintaining baseline security.
Database Security Cmpe 226 Fall 2015 By Akanksha Jain Jerry Mengyuan Zheng.
Cloud Computing is a Nebulous Subject Or how I learned to love VDF on Amazon.
MANAGING RISK. CYBER CRIME The use of the internet and developments in IT bring with it a risk of cyber crime. Credit card details are stolen, hackers.
3/12/2013Computer Engg, IIT(BHU)1 CLOUD COMPUTING-1.
LESSON 5-2 Protecting Your Computer Lesson Contents Protecting Your Computer Best Practices for Securing Online and Network Transactions Measures for Securing.
Securing a Host Computer BY STEPHEN GOSNER. Definition of a Host  Host  In networking, a host is any device that has an IP address.  Hosts include.
What is Cloud Computing 1. Cloud computing is a service that helps you to perform the tasks over the Internet. The users can access resources as they.
Lecture 19 Page 1 CS 236 Online 6. Application Software Security Why it’s important: –Security flaws in applications are increasingly the attacker’s entry.
PROTECTING YOUR DATA THREATS TO YOUR DATA SECURITY.
Clouding with Microsoft Azure
Chapter 40 Internet Security.
Network security Vlasov Illia
Securing Information Systems
Securing Network Servers
Chapter 6: Securing the Cloud
Avenues International Inc.
Network Security Presented by: JAISURYA BANERJEA MBA, 2ND Semester.
Chapter 7: Identifying Advanced Attacks
Instructor Materials Chapter 7 Network Security
Secure Software Confidentiality Integrity Data Security Authentication
CAN A DATABASE REALLY BE SECURE?
Wireless Network Security
Lesson Objectives Aims You should be able to:
Cloud Security.
Business Risks of Insecure Networks
AWS COURSE DEMO BY PROFESSIONAL-GURU. Amazon History Ladder & Offering.
Teaching Computing to GCSE
Security in Networking
Determined Human Adversaries: Mitigations
Cloud Computing BY: Udit Jain.
Microsoft Virtual Academy
How to Mitigate the Consequences What are the Countermeasures?
Web Servers / Deployment
Faculty of Science IT Department By Raz Dara MA.
Cyber security and Computer Misuse
Computer Security By: Muhammed Anwar.
Determined Human Adversaries: Mitigations
Cloud Security AWS as an example.
Cloud Security AWS as an example.
Designing IIS Security (IIS – Internet Information Service)
Module 4 System and Application Security
Wireless Spoofing Attacks on Mobile Devices
ONLINE SECURITY, ETHICS AND ETIQUETTES EMPOWERMENT TECHNOLOGY.
6. Application Software Security
Cloud Computing for Wireless Networks
Presentation transcript:

Cloud and Database Security Cyber Security Cloud and Database Security

Topics Database security Wi-Fi Protection Cyber Security Types of Cyber attacks Cloud Computing Database protection on the cloud

Database Security Why do we need database security? Threats are introduced everyday and we must prevent these threats from accessing our database. Hackers and Insiders will try to compromise our data for the own personal gain. Data integrity must not be compromised We must be able to perform update, insert and delete operations without demaging the underlying infrustructure. Data must be availability at all times to users and programs who need access to them. Data must be protected and disclosed to unauthorized users or programs.

Types of Database Threats There are many threats that can occur to a database Hackers can perform SQL Injections to database A Denial of Service attack(DOS) or Malware software can be downloaded on to your PC Privilege abuse or unauthorized Application accessing our database. Simple user error and accidental deletion of a database or table

Ways to secure our database There are many ways to secure our database Access control Handled by creating user accounts and passwords Inference control Must ensure information about individuals cannot be accessed Flow control Prevents information from flowing to unauthorized users Data encryption

WI-FI Protection Change the name of your default home network. Set a strong and unique password for your WI-FI router. Consider using a password manager. Limit Use of the Administrator Account Install a firewall for your network Disable WPS. Wi-Fi Protected Setup (WPS) provides simplified mechanisms for a wireless device to join a Wi-Fi network without the need to enter the wireless network password. Monitor for unknown device connections. Use your router manufacturer’s website to monitor for unauthorized devices joining or attempting to join your network. Turn off your WI-FI network when your not using it. Regularly back up your data and Remove unnecessary services and software

Types of WI-FI Attacks KRACKs” (Key Reinstallation Attacks) also known as Man in the middle attack , is actually a group of multiple vulnerabilities that when successfully exploited, could allow attackers to intercept and steal data transmitted across a Wi-Fi network.

DOS, Phishing and Ransomware DOS attacks: A denial-of-service attack occurs when legitimate users are unable to access information systems, devices, or other network resources due to the actions of a malicious cyber threat actor. DOS is accomplished by flooding the targeted host or network with traffic until the target cannot respond or simply crashes, preventing access for legitimate users. Phishing Attacks. The fraudulent acquisition of confidential data by the intended recipients and the misuse of such data. The phishing attack is often done by email and the purpose of phishing attacks is to steal sensitive data such as credit card, login information or to install malicious software on the victim's machine. Ransomware: An attack a form of malicious software (i.e. malware) which encrypts documents on a PC or even across a network. Victims can often only regain access to their encrypted files and PCs by paying a ransom to the criminals.

Cyber Security Cyber Security: The practice of protecting systems, networks, and programs from digital attacks. Cyber security applies security preventions methods to provide confidentiality, integrity, and availability of data. Confidentiality: Aims to restrict disclosures and to grant access of information to only the authorized people. Integrity: Requires protecting data in a consistent, precise, and reliable manner. This has to guarantee that data is not altered in the course of a specific period. Availability: The data and resources should be available when people need to access it, particularly during emergencies or disasters. These cyber attacks are usually aimed at assessing, changing, or destroying sensitive information; extorting money from users; or interrupting normal business processes

Cloud computing Cloud computing : The on demand delivery of computing services(i.e. servers, storage, database storage, applications, networking and other IT services) through a cloud service provider via the internet. The Users pay for the resources and storage they need and depending on the cloud provider the price may be static or fixed monthly rate or dynamic which the user can be charged by the hour or by the minute. There are 3 different types of cloud deployment they are Public, Private and Hybrid cloud.

Public, Private and Hybrid Cloud Public clouds are the most common way of deploying cloud computing. The cloud resources (like servers and storage) are owned, operated by a third-party cloud service provider and delivered over the Internet. Private cloud: Consists of computing resources used exclusively by one business or organization. It can be physically located at your organization’s on-site datacenter, or it can be hosted by a third-party service provider. The private cloud services and infrastructure are always maintained on a private network, the hardware and software are dedicated solely to the organization. Hybrid cloud : Combine on-premises infrastructure, or private clouds, with public clouds so organizations can reap the advantages of both. The data and applications can move between private and public clouds for greater flexibility. The application or resource runs in the private cloud until there is a spike in demand (seasonal events like online shopping or Airline tickets), at which point the organization can “burst through” to the public cloud to tap into additional computing resources. The top 3 cloud service providers are Amazon Web Services(AWS), Microsoft Azure and Google Cloud Plattform. They all provide database security and protection. I will be focusing on AWS

Amazon Web Services Amazon Relational Database Service (Amazon RDS) makes it easy to set up, operate, and scale a relational database in the cloud. It is a cost-efficient and resizable capacity while automating time-consuming administration tasks such as hardware provisioning, database setup, patching and backups. You manage access to your Amazon RDS resources and your databases on a DB instance. You Run your DB instance in an Amazon Virtual Private Cloud (VPC) for the greatest possible network access control. Identity and Access Management (IAM) policies to assign permissions that determine who is allowed to manage RDS resources. It is a web service that helps you securely control access to AWS resources. You control who is authenticated (signed in) and authorized (has permissions) to use resources. You attach a permissions policy to a user or a group in your account to grant permissions for those users to create an Amazon RDS resource, such as a DB instance. Security groups to control what IP addresses or Amazon EC2 instances can connect to your databases on a DB instance. When you first create a DB instance, its firewall prevents any database access except through rules specified by an associated security group. Secure Socket Layer (SSL) connections with DB instances running the MySQL, Maria DB, PostgreSQL, and more.

Hackers attacking our cloud database