What are the current security techniques in cloud computing - PowerPoint PPT Presentation

About This Presentation
Title:

What are the current security techniques in cloud computing

Description:

In the traditional time, the data was shared only between the user and host in an on-premises level. However, with the involvement of Cloud Computing Services, it has become possible to share data among different parties in a cloud environment. – PowerPoint PPT presentation

Number of Views:201

less

Transcript and Presenter's Notes

Title: What are the current security techniques in cloud computing


1
What are the current security techniques in CLOUD
COMPUTING
2
INTRODUCTION
  • One of the most essential things that comes up
    when it is about security is responsibilities
    that it holds while sharing data. In the
    traditional time, the data was shared only
    between the user and host in an on-premises
    level. However, with the involvement of Cloud
    Computing Services, it has become possible to
    share data among different parties in a cloud
    environment.

3
INTRODUCTION
  • The multiple tenancies sharing data among
    customer(s) and host is a vital part of
    clouding. This adds up a security and unique
    dynamic to the complication of data to offer a
    safe environment. The security services differ
    with its type so it is different to tackle it.
  • Different practices that are followed for
    clouding security

4
Infrastructure
  • There are two areas that will fall under this
    Cloud Computing Solutions of infrastructure.
  • Physical security In this, the data center is
    secured with the help of facilities restriction.
    The access can only be given to the one that
    hasthe authority to do so. It will include
    specific steps that will help in providing access
    to the system and provide 24/7 support to the
    security team, surveillance monitoring, etc.
  • Network security Another of the essential
    security measure is done with the help of virtual
    machines. It helps in accessing control and
    filtering along with proper monitoring of the
    network. This will also help in the mitigation of
    distributed denial of service and suspicious
    login or access.

5
Virtualization Security
  • Next one to fall in line is the virtualization
    security goals that help in the API application
    programming interfaces. It will provide security
    to API along with containers and virtual
    machines. The cyber security services take care
    to keep the network security that can be attained
    with the help of anti-DDoS and firewalls. it also
    includes intrusion prevention systems and
    anti-virus gateways.

6
Middleware Security
  • In this type of clouding security, the middle
    part of the overall system is included such as
  • Containers It is one of the most vital parts of
    the primary goal of clouding that helps in
    restricting any repositories access. This will
    help in preventing vulnerabilities and errors
    along with correcting configurations.
  • API It is another thing that works on
    processes, policies, and systems working up in a
    manner. This includes authentication of API,
    monitor API, and log management.

7
Middleware Security
  • Databases The database audits are a vital part
    to be added when it comes to securing databases.
    This helps in getting a hang of any security risk
    with the help of the monitoring system and
    sending out alerts.
  • Resource management platform This will include
    different things such as monitoring, detecting
    and responding to the overall system. It works to
    get an idea about unauthorized and suspicious
    activities while implementing any internal
    information and event management.

8
Conclusion
  • These are the major security options opted by
    the Cloud Integration Services for systems and
    tasks in a resource. It will require main tools
    to work on the following aspects in a better way
    that can easily secure the overall processes with
    expertise. However, it depends on the cost as
    well that will be added for the business.

9
(No Transcript)
10
(No Transcript)
Write a Comment
User Comments (0)
About PowerShow.com