CLOUDS. Online applications What is cloud computing Common, Location-independent, Online Utility on Demand Common implies multi-tenancy, not single or.

Slides:



Advertisements
Similar presentations
Cloud Computing From Different Perspective. but first, What is cloud? Why is it called cloud?
Advertisements

Security, Privacy and the Cloud Connecticut Community Providers’ Association June 20, 2014 Steven R Bulmer, VP of Professional Services.
Research in Cloud Security and Privacy
Turning Policy Into Reality Tony S Krzyżewski Director, Chief Technical Officer Protocol Policy Systems.
1 Miami-Dade County Public Schools. 2 From the Data Center to the Cloud: Manny Castañeda Miami-Dade County Public Schools.
Lesson 8.5 Identity Theft July 2011Copyright © … REMTECH, inc … All Rights Reserved1 Introduction Identity theft occurs when someone steals some.
INTRODUCTION TO CLOUD COMPUTING CS 595 LECTURE 6 2/13/2015.
Cloud Computing PRESENTED BY- Rajat Dixit (rd2392)
Supervisor : Mr. Hadi Salimi Advanced Topics in Information Systems Mazandaran University of Science and Technology February 4, 2011 Survey on Cloud Computing.
Bharat Bhargava Computer Science Purdue University Research in Cloud Computing YounSun Cho Computer Science Purdue.
Security Issues in Cloud Computing
CLOUD PRIVACY AND SECURITY CS 595 LECTURE 15 4/15/2015.
Cloud Usability Framework
Security Issues in Cloud Computing
WORKFLOWS IN CLOUD COMPUTING. CLOUD COMPUTING  Delivering applications or services in on-demand environment  Hundreds of thousands of users / applications.
Cloud Computing Stuart Dillon-Roberts. “In the simplest terms, cloud computing means storing & accessing data & programs over the Internet instead of.
Addition to Networking.  There is no unique and standard definition out there  Cloud Computing is a general term used to describe a new class of network.
Cloud Computing Cloud Security– an overview Keke Chen.
Clouds on IT horizon Faculty of Maritime Studies University of Rijeka Sanja Mohorovičić INFuture 2009, Zagreb, 5 November 2009.
Security and Privacy: Can we trust the cloud?
Jordan Wissel Eric Lewis Sarah Basile. Introduction This presentation will analyze: Overview/History Implementation Advantages/Disadvantages Security.
Cloud computing Rhubanii Sukumaran Ali Haider Omar Al kaf Tan Wen Hao
Security and Privacy Services Cloud computing point of view October 2012.
GIS and Cloud Computing. Flickr  Upload and manage your photos online  Share your photos with your family and friends  Post your photos everywhere.
Cloud Computing. What is it? Cloud computing is the concept of where a large number of computers are connected to a large storage computer, where each.
Computing on the Cloud Jason Detchevery March 4 th 2009.
In the name of God :).
Cloud Computing Characteristics A service provided by large internet-based specialised data centres that offers storage, processing and computer resources.
ISO17799 Maturity. Confidentiality Confidentiality relates to the protection of sensitive data from unauthorized use and distribution. Examples include:
Introduction Thomson Chan Rosaryhill School
© Sogeti Sogeti-Microsoft Alliance Cloud Computing Barriers and Benefits.
Cloud Computing John Engates CTO, Rackspace Presented: Rackspace Customer Conference, 2008 October 29, 2008.
An Approach To Automate a Process of Detecting Unauthorised Accesses M. Chmielewski, A. Gowdiak, N. Meyer, T. Ostwald, M. Stroiński
Privacy, Personal Data and the Cloud Billy Hawkes Data Protection Commissioner Public Affairs Ireland Conference Dublin, 30 June 2011.
What is the cloud ? IT as a service Cloud allows access to services without user technical knowledge or control of supporting infrastructure Best described.
Future ICT Landscapes – Security and Privacy Challenges & Requirements Simone Fischer-Hübner IVA Workshop, Stockholm 24th May 2012.
1 Cloud Computing and Security Prof. Ravi Sandhu Executive Director and Endowed Chair April 19, © Ravi Sandhu.
Copyright © The OWASP Foundation Permission is granted to copy, distribute and/or modify this document under the terms of the OWASP License. The OWASP.
Federal Trade Commission U.S. Rules on Privacy and Data Security Organization for International Investment General Counsel Conference October 16, 2009.
BEN ROBINSON, ACCOUNT EXECUTIVE, PALO ALTO NETWORKS SAFELY ENABLE YOUR SAAS APPLICATIONS.
M. Alexander Helen J. Wang Yunxin Liu Microsoft Research 1 Presented by Zhaoliang Duan.
CLOUD COMPUTING RICH SANGPROM. What is cloud computing? “Cloud computing is a model for enabling ubiquitous, convenient, on-demand network access to a.
3/12/2013Computer Engg, IIT(BHU)1 CLOUD COMPUTING-1.
What’s New Data Loss Prevention 14. Information is Everywhere Brings Productivity, Agility, Convenience ……and Problems Copyright © 2015 Symantec Corporation.
A CISO’s Perspective on Cloud Compliance Everything for the CISO to understand J. Hybinette, CISM, CISSP, NSA-IEM, NSA-IAM, ISSAP, ISSMP 1.
4a. Aula 2o. Período de Livro texto Copyright © 2012, Elsevier Inc. All rights reserved March 5, 2012 Prof. Kai Hwang, USC Cloud Roles in.
By Hajira Fatima Safa Mohammed Zaheer Abid Ali. Cloud computing is a result of evolving and adopting existing technologies. The goal of cloud computing.
Windows 7 Ultimate
Unit 3 Virtualization.
Azure-Based Project Management App Helps Creative Agencies Run Their Projects Efficiently “With Microsoft Azure PaaS, we can focus on our app and offer.
Understanding The Computer Login Account
Cloud Security– an overview Keke Chen
Data and database administration
TASHKENT UNIVERSITY OF INFORMATION TECHNOLOGIES NAMED AFTER MUHAMMAD AL-KHWARIZMI THE SMART HOME IS A BASIC OF SMART CITIES: SECURITY AND METHODS OF.
9/4/2018 6:45 PM Secure your Office 365 environment with best practices recommended for political campaigns Ethan Chumley Campaign Technology Advisor Civic.
Replace with Application Image
Cloud Computing Background
Cloud Computing B. Ramamurthy 9/19/2018 B. Ramamurthy.
CLOUD COMPUTING Presented By:- EduTechlearners
Financial Services Firms Can Leverage Cloud
Azure AD Deployment Are you maximising your Azure AD investment?
Weather Forecast for IT Futures
Office 365 Security & Compliance: Exchange Online Protection
Protecting your data with Azure AD
Views of Cloud Computing
Information Protection
Exchange Online Assessment Results
Information Protection
Basic Systems Management Employing Security Policies
Presentation transcript:

CLOUDS

Online applications

What is cloud computing Common, Location-independent, Online Utility on Demand Common implies multi-tenancy, not single or isolated tenancy Utility implies pay-for-use pricing on Demand implies ~infinite, ~immediate, ~invisible scalability

Cloud Computing: A Massive Concentration of Resources Also a massive concentration of risk – expected loss from a single breach can be significantly larger – concentration of “users” represents a concentration of threats “Ultimately, you can outsource responsibility but you can’t outsource accountability.”

Cloud Computing: who should use it? Cloud computing definitely makes sense if your own security is weak, missing features, or below average. Ultimately, if – the cloud provider’s security people are “better” than yours (and leveraged at least as efficiently), – the web-services interfaces don’t introduce too many new vulnerabilities, and – the cloud provider aims at least as high as you do, at security goals, then cloud computing has better security.

Loss of Control in the Cloud Consumer’s loss of control –Data, applications, resources are located with provider –User identity management is handled by the cloud –User access control rules, security policies and enforcement are managed by the cloud provider –Consumer relies on provider to ensure Data security and privacy Resource availability Monitoring and repairing of services/resources

Workshop Collaborate on a document using a CLOUD, e.g. Google Apps, Microsoft 365.