RaviNamboori on Cloud Computing Security Risks - PowerPoint PPT Presentation

About This Presentation
Title:

RaviNamboori on Cloud Computing Security Risks

Description:

Ravi Namboori says advisable to opt for cloud security solutions that adhere to regulations, such as PCI DSS, EU data protection laws, HIPAA, etc. learn few more things from him on security issues and conclusions on respective risks. – PowerPoint PPT presentation

Number of Views:45

less

Transcript and Presenter's Notes

Title: RaviNamboori on Cloud Computing Security Risks


1
Issues Of Cloud Computing Security
  • Presentation by
  • Presented By
  • Ravi Namboori
  • Visit us _at_ http//ravinamboori.net

2
What is Cloud computing?
  • Cloud computing is nothing but accessing and
    using applications and files
  • over the Internet rather than on your own
    computing devices.
  • How To Secure Cloud Services
  • Before an organization shifts some of its
    resources to the cloud
  • Certain measures it should take to ensure that
    its data will be secure

3
How To Secure Cloud Services
  • If opting for software-as-a-service (SaaS), the
    firm has to collect as much information as
    possible about that service provider's
    infrastructure and security provisions.
  • Infrastructure-as-a-service (IaaS) service
    providers should be asked about the tools they
    provide for the protection of data in virtual
    space.

4
Advantages of Cloud Computing
  • Businesses of all kinds are appreciating the
    advantages that cloud computing offers.
  • Few are
  • Scalability to expand
  • decrease the size of operations
  • speed with which you can effect changes
  • cost savings

5
Disadvantages Are
  • Water hole attacks
  • Water hole attacks are those that stealthily make
    way through the hackers' toolkits to compromise
    the privacy of the users' web applications of a
    company through their web browsers.
  • In the initial phase
  • hackers carry out the investigation and
    examination of the websites
  • Next move would be to slip an exploit into these
    sites
  • The exploit abuses the vulnerabilities of the
    systems, when the employees visit these sites

6
Few Risks Conclusion
  • From the governmental organizations,
  • The governmental agencies come directly to the
    cloud, where it is transparent. Then, they move
    to the cloud service provider and detach the
    organization's link.
  • Conclusion
  • Cloud must be encrypted and you only must have
    access to the encryption keys.
  • So that even the governmental agencies will not
    be able to enter your cloud.
  • In order to prevent water hole attacks, it is
    recommended protecting the vulnerability by
    updating and patching all software frequently to
    restrict potential access points.

7
Conclusions
  • The way your cloud's architecture is designed is
    crucial.
  • Advisable to opt for cloud security solutions
    that adhere to regulations, such as PCI DSS, EU
    data protection laws, HIPAA, etc.
  • Your organization has to bear the responsibility
    for breaches.
  • While the cloud vendor secures the basic
    infrastructure, it is up to you to protect the
    security of all data you have hosted on the
    cloud.
  • If you use split-key encryption technologies,
    your organization should ensure that only your
    users have control over the data, which includes
    all your apps.

8
Thanks!!!
  • Presentation by
  • Ravi Namboori
  • Visit us _at_ http//ravinamboori.net
Write a Comment
User Comments (0)
About PowerShow.com