cloud computing risks by ravi namboori cisco evangelist
TRANSCRIPT
Issues Of Cloud Computing Security
Presentation by
Presented By
Ravi Namboori
Visit us @ http://ravinamboori.net
What is Cloud computing?Cloud computing is nothing but accessing and using applications and files
over the Internet rather than on your own computing devices.
How To Secure Cloud Services: Before an organization shifts some of its resources to the cloud Certain measures it should take to ensure that its data will be secure
How To Secure Cloud Services
If opting for software-as-a-service (SaaS), the firm has to collect as much information as possible about that service provider's infrastructure and security provisions.
Infrastructure-as-a-service (IaaS) service providers should be asked about the tools they provide for the protection of data in virtual space.
Advantages of Cloud Computing
Businesses of all kinds are appreciating the advantages that cloud computing offers.
Few are: Scalability to expand decrease the size of operations speed with which you can effect changes cost savings
Disadvantages Are: Water hole attacks
Water hole attacks are those that stealthily make way through the hackers' toolkits to compromise the privacy of the users' web applications of a company through their web browsers.In the initial phase hackers carry out the investigation and examination of the websites Next move would be to slip an exploit into these sites The exploit abuses the vulnerabilities of the systems, when the
employees visit these sites
Few Risks & Conclusion:From the governmental organizations,
The governmental agencies come directly to the cloud, where it is transparent. Then, they move to the cloud service provider and detach the organization's link.
Conclusion: Cloud must be encrypted and you only must have access to the encryption
keys. So that even the governmental agencies will not be able to enter your cloud. In order to prevent water hole attacks, it is recommended protecting the
vulnerability by updating and patching all software frequently to restrict potential access points.
Conclusions
The way your cloud's architecture is designed is crucial. Advisable to opt for cloud security solutions that adhere to
regulations, such as PCI DSS, EU data protection laws, HIPAA, etc. Your organization has to bear the responsibility for breaches. While the cloud vendor secures the basic infrastructure, it is up to
you to protect the security of all data you have hosted on the cloud. If you use split-key encryption technologies, your organization
should ensure that only your users have control over the data, which includes all your apps.
Thanks!!!Presentation by
Ravi Namboori
Visit us @ http://ravinamboori.net