Cloud Security Gregor von Laszewski Pervasive Technology Institute Indiana University Bloomington, IN U.S.A.

Slides:



Advertisements
Similar presentations
Creating HIPAA-Compliant Medical Data Applications with Amazon Web Services Presented by, Tulika Srivastava Purdue University.
Advertisements

The OWASP Foundation Copyright © The OWASP Foundation Permission is granted to copy, distribute and/or modify this document under.
Privacy, Security, Confidentiality, and Legal Issues
Ethics Ethics are the rules of personal behavior and conduct established by a social group for those existing within the established framework of the social.
GRAD 521, Research Data Management Winter 2014 – Lecture 7 Amanda L. Whitmire, Asst. Professor.
11 Section D: SQL  SQL Basics  Adding Records  Searching for Information  Updating Fields  Joining Tables Chapter 11: Databases1.
Crime and Security in the Networked Economy Part 4.
E-Commerce Security Issues. General E-Business Security Issues Any E-Business needs to be concerned about network security. The Internet is a “ public.
The Cloud is Safe Pract The Facts. Backround: The recent hacking of the Cloud poses many issues with respect to Internet security. Just recently a hacker.
Introduction to Cloud Computing and Secure Cloud Computing
Wonga example Register Question- What risks do you think businesses face due to IT developments?
Cloud Computing and Information Policy: Computing in a Policy Cloud? Jimmy Lin The iSchool University of Maryland Thursday, April 2, 2009 This work is.
Scams and Schemes. Today’s Objective I can understand what identity theft is and why it is important to guard against it, I can recognize strategies that.
Network Security. Trust Relationships (Trust Zones) High trust (internal) = f c (once you gain access); g p Low trust ( ) = more controls; fewer privileges.
Cloud Computing Stuart Dillon-Roberts. “In the simplest terms, cloud computing means storing & accessing data & programs over the Internet instead of.
Alter – Information Systems 4th ed. © 2002 Prentice Hall 1 E-Business Security.
Chapter-7 Introduction to Cloud Computing Cloud Computing.
Chapter 3 Ethics, Privacy & Security
Cloud Computing How secure is it? Author: Marziyeh Arabnejad Revised/Edited: James Childress April 2014 Tandy School of Computer Science.
Mobility Without Vulnerability: Secure and Enable Your Mobile Users, Apps, and Devices David Clapp – Intuitive.
A Seminar on Securities In Cloud Computing Presented by Sanjib Kumar Raul Mtech(ICT) Roll-10IT61B09 IIT Kharagpur Under the supervision of Prof. Indranil.
Chapter © 2012 Pearson Education, Inc. Publishing as Prentice Hall.
No one questions that Microsoft can write great software. Customers want to know if we can be innovative, scalable, reliable in the cloud. (1996) 450M+
Information Security Technological Security Implementation and Privacy Protection.
UNDERSTANDING THE RISKS & CHALLENGES OF Cyber Security DAVID NIMMO InDepth IT Solutions DAVID HIGGINS WatchGuard NEIL PARKER BridgePoint Group A BridgePoint.
Information Security and YOU!. Information Assurance Outreach Information Security Online Security Remote Access with Demonstration The Cloud Social.
Protecting Your Information Assets
Web Site Content Protection Solution. Protecting Web Site Content with.
What to do “After” your IT guy gets hit by a truck! April 1, 2005.
GOLD UNIT 4 - IT SECURITY FOR USERS (2 CREDITS) Thomas Jenkins.
GOLD UNIT 4 - IT SECURITY FOR USERS (2 CREDITS). SELECT AND USE APPROPRIATE METHODS TO MINIMISE SECURITY RISK TO IT SYSTEMS AND DATA 1.1 I can describe.
Environment for Information Security n Distributed computing n Decentralization of IS function n Outsourcing.
CYBER CRIME.
Cloud Computing Characteristics A service provided by large internet-based specialised data centres that offers storage, processing and computer resources.
GOLD UNIT 4 - IT SECURITY FOR USERS (2 CREDITS) Rebecca Pritchard.
Ragib Hasan University of Alabama at Birmingham CS 491/691/791 Fall 2011 Lecture 11 09/27/2011 Security and Privacy in Cloud Computing.
COMP1321 Networks in Organisations Richard Henson March 2014.
Cloud Computing Security Keep Your Head and Other Data Secure in the Cloud Lynne Pizzini, CISSP, CISM, CIPP Information Systems Security Officer Information.
Cloud Computing Presented by Alicia Wallis and Kerri Warf.
Viruses Hackers Backups Stuxnet Portfolio Computer viruses are small programs or scripts that can negatively affect the health of your computer. A.
Cloud Computing Project By:Jessica, Fadiah, and Bill.
For brownies this PowerPoint will help you understand computer viruses and help stop them!!!!
Joel Rosenblatt Director, Computer and Network Security September 10, 2013.
Slides copyright 2010 by Paladin Group, LLC used with permission by UMBC Training Centers, LLC.
Chapter 12: How Private are Web Interactions?. Why we care? How much of your personal info was released to the Internet each time you view a Web page?
Vendor Management from a Vendor’s Perspective. Agenda Regulatory Updates and Trends Examiner Trends Technology and Solution Trends Common Issues and Misconceptions.
Develop your Legal Practice using “Cloud” applications, but … Make sure your data is safe! Tuesday 17 November 2015 The Law Society, London Allan Carton,
MANAGING RISK. CYBER CRIME The use of the internet and developments in IT bring with it a risk of cyber crime. Credit card details are stolen, hackers.
Engineering and Management of Secure Computer Networks School of Engineering © Steve Woodhead 2009 Corporate Governance and Information Security (InfoSec)
Protecting Your Data With Just Get Backup, LLC. Agenda How important is your data – Acknowledging worst-case scenarios. Understanding that data backup.
Society & Computers PowerPoint
LESSON 5-2 Protecting Your Computer Lesson Contents Protecting Your Computer Best Practices for Securing Online and Network Transactions Measures for Securing.
CLOUD COMPUTING-3.
Information Security Measures Confidentiality IntegrityAccessibility Information cannot be available or disclosed to unauthorized persons, entities or.
ICT and the Law Mr Conti. Did you see anything wrong with that? Most people wouldn’t want that sort of information posted in a public place. Why? Because.
Chapter © 2012 Pearson Education, Inc. Publishing as Prentice Hall.
Chapter 6 Discovering the Scope of the Incident Spring Incident Response & Computer Forensics.
Computer Laws Data Protection Act 1998 Computer Misuse Act 1990.
1 The 28 th Annual International Computer Software and Applications Conference COMPSAC 2004 Hong Kong September 28, :30 am – 12:00 noon Session.
Data Breach ALICAP, the District Insurance Provider, is Now Offering Data Breach Coverage as Part of Our Blanket Coverage Package 1.
VIRTUALIZATION & CLOUD COMPUTING
Hot Topics:Mobility in the Cloud
Chapter 5 Electronic Commerce | Security
Cyber Attacks on Businesses 43% of cyber attacks target small business Only 14% of small business rate their ability to mitigate cyber risk highly.
Download Latest CompTIA CAS-002 Exam Dumps PDF Questions - CAS-002 Best Study Material - Realexamdumps.com
Threat Landscape for Data Security
Chapter 5 Electronic Commerce | Security
Faculty of Science IT Department By Raz Dara MA.
What is Interesting in the CCSP certification?
Presentation transcript:

Cloud Security Gregor von Laszewski Pervasive Technology Institute Indiana University Bloomington, IN U.S.A.

Acknowledgments Some pictures are taken with permission of Ian Banks from Diving the Gold Coast. Mention my name when you go.

Is Security Necessary? Even google has issues – July 2004: Gmail security issue allows unauthorized access to others’ registration information. – January 2005: Gmail security flaw allows unathorized viewing of others’ s. – November 2005: Gmail bug allowed hackers to take complete control of a victim’s Gmail account. – March 2006: Google accidentally deletes its main official blog. They write “We’ve determined the cause of tonight’s outage. The blog was mistakenly deleted by us (d’oh!)” – July 2006: Writely document appears that seems to show internal confidential Google information on the Platypus project. – October 2006: Google blog hacked and fake post published, quickly taken down. – October 2006: User complains that blog posts through the Blogger API are being published on someone else’s blog. – October 2006: Google accidentally releases Google Platypus software. – … – June 2008: Google fixes several site security issues – March 2009: Security issues with Google Docs – Disclaimer: I spend 30 seconds on this via a google query

Does it Happen in Science? 2004: HACKERS PUT TERAGRID ON QUARANTINE – Security experts are concerned over recent attacks on supercomputers at colleges, universities and research institutions which have resulted in online network research crashes. 2005: Energy Dept. Discloses Data Theft – Victims, Top Officials Were Not Told About 2005 Hacking, Saturday, June 10, 2006, A hacker stole a file containing the names and Social Security numbers of 1,500 people working for the Energy Department's nuclear weapons agency.

E-Science Security Why do we want security Protect data Protect infrastructure Protect intellectual property …. Protect data Protect infrastructure Protect intellectual property …. Why do we not want security Data is in public domain Security is slow Security is inconvenient …

Cloud Security Issues Governing the Cloud Governing in the Cloud Governance & Risk Mgt Legal Electronic Discovery Compliance & Audit Information Lifecycle Mgt Portability & Interoperability Operating in the Cloud Governing in the Cloud Governance & Risk Mgt Legal Electronic Discovery Compliance & Audit Information Lifecycle Mgt Portability & Interoperability Operating in the Cloud Operating in the Cloud Traditional, BCM, DR Data Center Operations Incident Response Application Security Encryption & Key Mgt Identity & Access Mgt Storage Virtualization Source: Cloud Security Alliance

I hide well

Do not come close to me

If you come close to me I sting you

I am really tough to crack

Use Mobility to Increase Security

It does not matter if you catch me, I have many brothers and sisters

Symbiotic relationship: I have a good friend that protects me

Separation Firewall Selection of users You can see, but can not touch There is another fish smaller to go through my net

Where do we start and stop? Bare Metal

Slides from here on are backup slides in case questions arise.

Is Security necessary? Gartner Report: Assessing the Security Risks of Cloud Computing, 3 June 2008, Jay Heiser Mark Nicolett, 'In The Cloud' Security Services Hit the Peak of the Gartner Hype Cycle in 2009 – Analysts Present Major Developments in IT Security, Privacy, Risk and Compliance at the Gartner Information Security Summit in Sydney Today – Sydney, Australia, September 15, 2009

Commercial motivated security challanges Gartner: Seven cloud-computing security risks, Data integrity, recovery, privacy and regulatory compliance are key issues to consider, By Jon Brodkin, Network World, 07/02/ Privileged user access. Sensitive data processed outside the enterprise brings with it an inherent level of risk, because outsourced services bypass the “physical, logical and personnel controls” IT shops exert over in-house programs. Get as much information as you can about the people who manage your data. “Ask providers to supply specific information on the hiring and oversight of privileged administrators, and the controls over their access,” Gartner says. 2. Regulatory compliance. Customers are ultimately responsible for the security and integrity of their own data, even when it is held by a service provider. Traditional service providers are subjected to external audits and security certifications. Cloud computing providers who refuse to undergo this scrutiny are “signaling that customers can only use them for the most trivial functions,” according to Gartner. 3. Data location. When you use the cloud, you probably won’t know exactly where your data is hosted. In fact, you might not even know what country it will be stored in. Ask providers if they will commit to storing and processing data in specific jurisdictions, and whether they will make a contractual commitment to obey local privacy requirements on behalf of their customers, Gartner advises. 4. Data segregation. Data in the cloud is typically in a shared environment alongside data from other customers. Encryption is effective but isn’t a cure-all. “Find out what is done to segregate data at rest,” Gartner advises. The cloud provider should provide evidence that encryption schemes were designed and tested by experienced specialists. “Encryption accidents can make data totally unusable, and even normal encryption can complicate availability,” Gartner says. 5. Recovery. Even if you don’t know where your data is, a cloud provider should tell you what will happen to your data and service in case of a disaster. “Any offering that does not replicate the data and application infrastructure across multiple sites is vulnerable to a total failure,” Gartner says. Ask your provider if it has “the ability to do a complete restoration, and how long it will take.” 6. Investigative support. Investigating inappropriate or illegal activity may be impossible in cloud computing, Gartner warns. “Cloud services are especially difficult to investigate, because logging and data for multiple customers may be co-located and may also be spread across an ever-changing set of hosts and data centers. If you cannot get a contractual commitment to support specific forms of investigation, along with evidence that the vendor has already successfully supported such activities, then your only safe assumption is that investigation and discovery requests will be impossible.” 7. Long-term viability. Ideally, your cloud computing provider will never go broke or get acquired and swallowed up by a larger company. But you must be sure your data will remain available even after such an event. “Ask potential providers how you would get your data back and if it would be in a format that you could import into a replacement application,” Gartner says.

Top five security Issues Source: web&ct=res&cd=11&ved=0CDEQFjAK&url=htt p%3A%2F%2Fwww.computerweekly.com%2F Articles%2F2009%2F04%2F24%2F235782%2Ft op-five-cloud-computing-security- issues.htm&ei=wf7dStfbA9yCkAXXk_wk&usg= AFQjCNGBadak6dDo-jmh52w0k_sdr_vyHg