logging in or signing up Final Cloud Computing Security (1) Saurabh0750 Download Post to : URL : Related Presentations : Let's Connect Share Add to Flag Embed Email Send to Blogs and Networks Add to Channel Copy embed code: Embed: Flash iPad Dynamic Copy Does not support media & animations Automatically changes to Flash or non-Flash embed WordPress Embed Customize Embed URL: Copy Thumbnail: Copy The presentation is successfully added In Your Favorites. Views: 2327 Category: Education License: All Rights Reserved Like it (3) Dislike it (0) Added: June 09, 2011 This Presentation is Public Favorites: 6 Presentation Description No description available. Comments Posting comment... By: chgurav (12 month(s) ago) can u pls share ur ppt wid me m in need of it......pls send it on email@example.com...... Saving..... Post Reply Close Saving..... Edit Comment Close Premium member Presentation Transcript Slide 1: Philip Green Summer Roseborough Tim Blair Stephen StanfordSlide 2: What is Cloud Computing? Refers to a technology that allows the user to access data and software resources on-demand through a network rather than from a local computer.Slide 6: Issues Sensitive data processed outside the enterprise brings with it an inherent level of risk, because outsourced services bypass the "physical, logical and personnel controls" IT shops exert over in-house programs. Customers are ultimately responsible for the security and integrity of their own data, even when it is held by a service provider. Data in the cloud is typically in a shared environment alongside data from other customers. Risk of a disaster at the service provider’s data storage. Investigating inappropriate or illegal activity may be impossible in cloud computing. www.infoworld.com/d/security-central/gartner-seven-cloud-computing-security-risks-853?page=0,1Slide 7: In an effort to increase government adoption of cloud computing, the National Institute of Standards and Technology (NIST) is attempting to create the Guidelines on Security and Privacy in Public Cloud Computing . Companies need to be sure that policies and standards for app development include cloud computing as well. Must assure “a risk management program…that is flexible enough to deal with the continuously evolving and shifting risk landscape.” NIST’s report recommends an identity federation, or else single sign-on or cross-domain single sign-on to deal with the problem of identification and authentication systems not translating into the cloud accompanied by hesitation to employ two separate authentication systems. http://itknowledgeexchange.techtarget.com/IT-watch-blog/cloud-security-standards-commissioned-from-the-nist-by-americas-cio/ Steps for Cloud Computing Security Guidelines on Security and Privacy in Public Cloud ComputingCLOUD SECURTY TECHNIQUES: Firewalls Encryption Authentication Intrusion Detection Prevention Systems Virtualized Private Networks File Integrity Monitoring Vulnerability Scanning CLOUD SECURTY TECHNIQUES: This resulted in the release of names and email addresses, of an estimated 60 million customers from 75 highly recognized companies .Slide 11: Spear Phishing Targets are identified in advance and the emails that attempt to trick them into handing over personal data can be highly specific.Slide 12: Encryption Segregation of company data Better security training of employeesSlide 13: *estimates from CyberFactors , a cyber risk analytics and intelligence company How did this impact the Business, People and Processes? $45 million in lost customers.* Potential loss of $3 - $4 billion total in litigation, settlements, forensic investigation and loss of business. * Lost trust with customers and potential customers. * CyberFactors: * estimates from CyberFactors Clients $412 Million Lost Business* Lack of trust on behalf of customers and potential customers.* Client Customers Spear phishing attacks* Potential identity theft and credit card fraud* * estimates from CyberFactors , a cyber risk analytics and intelligence company: Yelp was able to save $55,000 in upfront hardware costs and get up and running in a matter of days not months.Slide 19: The Impact of Cloud Security Loyal Customer Following Automated Security FilterSlide 20: Cloud SecuritySlide 21: Cloud Security Primary Concerns Data Exposure Data located externally Reliance on security measures of others Reliability Many clouds do not have back-ups or replicate data for emergency retrieval Network Complexity Multiple companies can use one cloudSlide 22: Credits http://www.google.com/imghp?hl=en&tab=wi www.yelp.com Epsilon Response.pdf F:\Epsilon security breach exposes thousands of email addresses [www.keepvid.com].mp4 Philip Green Summer Roseborough Tim Blair Stephen Stanford www.infoworld.com/d/security-central/gartner-seven-cloud-computing-security-risks-853?page=0,1 http://itknowledgeexchange.techtarget.com/IT-watch-blog/cloud-security-standards-commissioned-from-the-nist-by-americas-cio / www.infoworld.com/d/security-central/gartner-seven-cloud-computing-security-risks-853?page=0,1 cloudsecurity.trendmicro.com/chrome- os -so-secure-we-don’t-need-security/ http://www.thewhir.com/web-hosting-news/052511_Security_Firm_StillSecure_Launches_Cloud_Security_Platform http://www.informationweek.com/news/security/attacks/229401372 You do not have the permission to view this presentation. In order to view it, please contact the author of the presentation.