cloud computing & security presentation

32
About me & Submission details Parveen Yadav Security Researcher aka Ethical Hacker . Working as a Freelancer . White Hat Hacking work. Few Recognitions :- Got listed my name in Google Hall of fame,Amazon,Paypal,Adobe & Few others. Paper Title :- Cloud Computing & Security .

Upload: parveen-yadav

Post on 06-May-2015

396 views

Category:

Education


0 download

TRANSCRIPT

Page 1: Cloud computing & Security presentation

About me & Submission details

� Parveen Yadav

� Security Researcher aka Ethical Hacker .

� Working as a Freelancer .

� White Hat Hacking work.

� Few Recognitions :-

� Got listed my name in Google Hall of fame,Amazon,Paypal,Adobe

& Few others.

� Paper Title :- Cloud Computing & Security .

Page 2: Cloud computing & Security presentation

Cloud Computing

Page 3: Cloud computing & Security presentation

What is Cloud Computing ?

� Cloud Computing is a technology used to provide:

� Ease of access to user data, programs and security

� Services anytime and anywhere� Services anytime and anywhere

� Ensuring complete reliability and security

� Reduces the cost of work..least possible expenditure

Page 4: Cloud computing & Security presentation

BASIC Characteristics of Cloud Computing

� Multi-tenancy� Resources in cloud systems can be

shared among a large number of users.

� Improve the efficiency of cloud systems

and save cost for cloud service

providers.

Page 5: Cloud computing & Security presentation

..

� Scalability

� Even when the total work load for a cloud

system increases dramatically, the system

could improve its capacity by adding more

hardware to handle the increased load hardware to handle the increased load

effectively

Page 6: Cloud computing & Security presentation

..

� Elasticity

� A cloud system only delivers the minimum

amount of computing resources that meet

users’ need. The amount of resources provided

to users increase when they need more, and to users increase when they need more, and

decrease when they need less. Users only pay

for whatever they consumed.

Page 7: Cloud computing & Security presentation

..

� Device Independent

� Users can utilize cloud services using

whatever device they have, should it be a

laptop, an iPad or a smartphone, as long as

they have access to the Internet.they have access to the Internet.

Page 8: Cloud computing & Security presentation

..

�Low-cost

� Computing resources are provided by cloud systems.

Users do not need to purchase expensive computers

to perform tasks that need high performanceto perform tasks that need high performance

computing.

Page 9: Cloud computing & Security presentation

..

� Reliability

� Multiple redundant sites are used in cloud systems.

There are always backups available when one or

more sites are down.more sites are down.

Page 10: Cloud computing & Security presentation

History of cloud computing

Evolution� The idea of cloud computing dates as far back as the 1960’s

when John McCarthy envisioned a time when computation

may someday be orgainsed as a public organisation.

� Cloud computing has evolved through a number of phases

which include grid and utility computing ,application service

processing(ASP),software as a service (Saas)

Page 11: Cloud computing & Security presentation

� Grid Computing a form of distributed computing,acting in concert to perform very large

tasks.

� Utility Computing a metered service similar to a traditional public utility such as electricity.

Page 12: Cloud computing & Security presentation

Cloud Computing is an Evolution in IT

4

Page 13: Cloud computing & Security presentation

Major services

Major Services

� Few other types of Clouds�Network as a Service (NaaS)

�Storage as a Service (STaaS)

�Security as a Service (SECaaS)

�Data as a Service (DaaS)

�API as a Service (APIaaS)

Page 14: Cloud computing & Security presentation

Cloud Service Models

� Software as a Service (SaaS)

� Service provider’s apps

� User’s do not manage the Network, Servers, OS, Storage or applications by the user

� Platform as a Service (PaaS)

� User deploys their apps on the cloud� User deploys their apps on the cloud

� Controls their apps

� User’s do not manage Servers, IS, Storage

� Infrastructure as a Service (IaaS)

� User’s get access to the infrastructure to deploy their content

� Doesn’t manage or control the infrastructure

� Does manage or control the OS, storage, apps, selected network components.

Page 15: Cloud computing & Security presentation

Cloud Deployment models

� Public Cloud computing environment are open for

use to anyone who wants to sign up and use them.

� These are run by vendors and applications from

different customers are likely to be mixed together on different customers are likely to be mixed together on

the cloud’s servers, storage systems, and networks.

� Examples of a public cloud: Amazon Web Services and Google's AppEngine .

Page 16: Cloud computing & Security presentation

� A private cloud is basically an organization that

needs more control over their data than they can get

by using a vendor hosted service.

� A hybrid cloud combine both public and private

cloud modelscloud models.

Page 17: Cloud computing & Security presentation

Google Docs

�A cloud based online Office

�Allow you to create, edit and share documents online using web browsers, iPads or even smart phones.even smart phones.

https://docs.google.com/demo/edit?id=scAAVln2yf3it2VCiVf-DUzGg&dt=document#document

Page 18: Cloud computing & Security presentation

Amazon Cloud Drive

�Amazon Cloud Drive is an personal hard drive in a cloud system.

� Store music, videos, photos, and documents on Amazon's servers.

https://www.amazon.com/clouddrive

documents on Amazon's servers.

Page 19: Cloud computing & Security presentation

Dropbox cloud provider

� Dropbox is a file hosting service that offers cloud

storage,file synchronization & client software.

� It allows users to create a special folder on each of their

computers,which dropbox then synchronizes so that it computers,which dropbox then synchronizes so that it

appears to be in the same folder regardless of which

computer is used to view it.

Page 20: Cloud computing & Security presentation

Rate/Price of Cloud Services

Page 21: Cloud computing & Security presentation

How Cloud Works :-

Page 22: Cloud computing & Security presentation

Opportunities and Challenges

� The use of the cloud provides a number of

opportunities:

� It enables services to be used without any

understanding of their infrastructure.

� It potentially lowers the outlay expense for start up � It potentially lowers the outlay expense for start up

companies, as they would no longer need to buy

their own software or servers.

� Cost would be by on-demand pricing.

� Data and services are stored remotely but accessible

from “anywhere”.

22

Page 23: Cloud computing & Security presentation

Advantages Of Cloud Computing

� Lower total cost of ownership.

� Always on, Always available.

� Faster application delivery.

� Improved business continuity.

Platform for easier and faster sharing, mobile� Platform for easier and faster sharing, mobile

workforce.

� Rental pricing model.

� Pay-as–you-go, Try before you buy.

� Lower Infrastructure Cost .

Page 24: Cloud computing & Security presentation

Disadvantages Of Cloud computing

� Security issue

� Data Loss Risks

� Privacy policies

But can we tackle it……How???43% of current cloud users reported a security incident in the past 12 months

Page 25: Cloud computing & Security presentation

Cloud Computing-Attacking methods

� Distributed Denial of Service Attacks (DDoS) .

� Authenticated Risks.

� Data Segregation Risks.

� Web-application Attacking methods.� Web-application Attacking methods.

Page 26: Cloud computing & Security presentation

Distributed Denial of Service Attacks

� Distributed Denial of service (DDoS) attacks means

many node systems attacking one node all at the same

time with a Flood of useless messages to exhaust Web

Server’s resources .

Page 27: Cloud computing & Security presentation

Authenticated Risks

� Authentication is a weak point in a hosted & virtual service’s and

frequently targeted.

� Ways to check the Authenticity of the client :

� Leverage strong two –factor authentication techniques.

� Use of static I.P, Virtual I.P techniques .

� Designated Emplyoee’s Access .

Page 28: Cloud computing & Security presentation

Data Segregation Risks

� Data segregation is not easily facilitated in all cloud enviornments

as all the data can’t be segregated acc. To the user needs.Some

customers do not encrypt the data as there are chances for the

encryption itself to destroy the data .

� The compromised servers are shut down whenever a data is

needed to be recovered.The available data is not correctly sent to needed to be recovered.The available data is not correctly sent to

the customer at all times of need.

� When recovering the data there could be instances of replication

of data in multiple sites.

Page 29: Cloud computing & Security presentation

How to safeguard your Cloud Database

Page 30: Cloud computing & Security presentation

Cloud computing & parameter security

firewall .

Page 31: Cloud computing & Security presentation

Few things to know before choosing

.....

� Select the right Cloud service provider .

� Cloud provider Location.

� Market value of cloud provider.

� Pre-Examination Test .

Page 32: Cloud computing & Security presentation

Q & A

• Parveen Yadav

• Contact me :-

[email protected]

• https://www.facebook.com/proxy.test