Final Cloud Computing Security (1)

Category: Education

Presentation Description

No description available.


By: chgurav (62 month(s) ago)

can u pls share ur ppt wid me m in need of it......pls send it on

Presentation Transcript

Slide 1:

Philip Green Summer Roseborough Tim Blair Stephen Stanford

Slide 2:

What is Cloud Computing? Refers to a technology that allows the user to access data and software resources on-demand through a network rather than from a local computer.

Slide 6:

Issues Sensitive data processed outside the enterprise brings with it an inherent level of risk, because outsourced services bypass the "physical, logical and personnel controls" IT shops exert over in-house programs. Customers are ultimately responsible for the security and integrity of their own data, even when it is held by a service provider. Data in the cloud is typically in a shared environment alongside data from other customers. Risk of a disaster at the service provider’s data storage. Investigating inappropriate or illegal activity may be impossible in cloud computing.,1

Slide 7:

In an effort to increase government adoption of cloud computing, the National Institute of Standards and Technology (NIST) is attempting to create the Guidelines on Security and Privacy in Public Cloud Computing . Companies need to be sure that policies and standards for app development include cloud computing as well. Must assure “a risk management program…that is flexible enough to deal with the continuously evolving and shifting risk landscape.” NIST’s report recommends an identity federation, or else single sign-on or cross-domain single sign-on to deal with the problem of identification and authentication systems not translating into the cloud accompanied by hesitation to employ two separate authentication systems. Steps for Cloud Computing Security Guidelines on Security and Privacy in Public Cloud Computing


Firewalls Encryption Authentication Intrusion Detection Prevention Systems Virtualized Private Networks File Integrity Monitoring Vulnerability Scanning CLOUD SECURTY TECHNIQUES


This resulted in the release of names and email addresses, of an estimated 60 million customers from 75 highly recognized companies .

Slide 11:

Spear Phishing Targets are identified in advance and the emails that attempt to trick them into handing over personal data can be highly specific.

Slide 12:

Encryption Segregation of company data Better security training of employees

Slide 13:

*estimates from CyberFactors , a cyber risk analytics and intelligence company How did this impact the Business, People and Processes? $45 million in lost customers.* Potential loss of $3 - $4 billion total in litigation, settlements, forensic investigation and loss of business. * Lost trust with customers and potential customers. * CyberFactors


* estimates from CyberFactors Clients $412 Million Lost Business* Lack of trust on behalf of customers and potential customers.* Client Customers Spear phishing attacks* Potential identity theft and credit card fraud* * estimates from CyberFactors , a cyber risk analytics and intelligence company


Yelp was able to save $55,000 in upfront hardware costs and get up and running in a matter of days not months.

Slide 19:

The Impact of Cloud Security Loyal Customer Following Automated Security Filter

Slide 20:

Cloud Security

Slide 21:

Cloud Security Primary Concerns Data Exposure Data located externally Reliance on security measures of others Reliability Many clouds do not have back-ups or replicate data for emergency retrieval Network Complexity Multiple companies can use one cloud

Slide 22:

Credits Epsilon Response.pdf F:\Epsilon security breach exposes thousands of email addresses [].mp4 Philip Green Summer Roseborough Tim Blair Stephen Stanford,1 /,1 os -so-secure-we-don’t-need-security/

authorStream Live Help