SlideShare a Scribd company logo
1 of 30
NAME - SOURODEEP CHAKRABORTY
ROLL - 9210
SEMESTER – V
STUDENT ID – BGC201120
REGISTRATION NO - 1072011400167
CLOUD COMPUTING
 CLOUD SECURITY SERVICES
 AUTHENTICATION
 AUTHORIZATON
 AUDITING
 ACCOUNTABILITY
 CONCLUSION
GLANCE
CLOUD SECURITY, ALSO KNOWN AS CLOUD COMPUTING SECURITY, IS A
COLLECTION OF SECURITY MEASURES DESIGNED TO PROTECT CLOUD-BASED
INFRASTRUCTURE, APPLICATIONS, AND DATA. THESE MEASURES ENSURE
USER AND DEVICE AUTHENTICATION, DATA AND RESOURCE ACCESS
CONTROL, AND DATA PRIVACY PROTECTION.
CLOUD SECURITY SERVICES
CLOUD SOFTWARE ASSURANCE INCLUDE…….
4A
AUTHENTICATION
AUTHORIZATION
AUDITING
ACCOUNTABILITY
CLOUD SECURITY SERVICES
AUTHENTICATION
HOW DO YOU PROVE TO SOMEONE THAT YOU ARE
WHO YOU CLAIM TO BE ?????
AUTHENTICATION CAN BE DEFINED AS DETERMINING
AN IDENTITY TO THE REQUIRED LEVEL OF
ASSURANCE……
AUTHENTICATION IS THE FIRST STEP IN ANY
CRYPTOGRAPHIC SOLUTION
- BECAUSE UNLESS WE KNOW WHO IS
COMMUNICATING, THERE IS NO POINT IN ENCRYPTION
WHAT IS BEING COMMUNICATED.
AUTHENTICATION
 AUTHENTICATION IS ANY PROCESS BY WHICH A
SYSTEM VERIFIES THE IDENTITY OF A USER WHO
WISHES TO ACCESS IT…
 AUTHENTICATION MAY BE IMPLEMENTED USING
CREDENTIAL, EACH OF WHICH IS COMPOSED OF AN
USER-ID AND PASSWORD. ALTERNATELY
AUTHENTICATION MAY BE IMPLEMENTED WITH
SMARD CARD, AN AUTHENTICATION SERVER OR
EVEN A PUBLIC KEY INFRASTRUCTURE…..
AUTHENTICATION
MANY WAYS TO PROVE WHO YOU ARE:
 WHAT YOU KNOW
--PASSWORD / SECRET KEY
 WHERE YOU ARE
-- IP ADDRESS < INTERNET PROTOCOL >
 WHAT YOU ARE
BIOMETRICS IS AN AUTHENTICATION METHOD THAT IDENTIFIES
AND RECOGNIZES PEOPLE.
AUTHENTICATION
BIOMETRICS
PHYSIOLOGICAL BEHAVIOURAL
FACE
FINGER VOICE SIGNATURE
IRIS
DNA
HAND
AUTHENTICATION
PASSWORD
A PASSWORD IS A STRING OF ALPHABET, NUMBERS
AND SPECIAL CHARACTERS WHICH IS SUPPOSED TO BE
KNOWN ONLY TO BE ENTITY THAT IS BEING
AUTHENTICATE…
AUTHENTICATION
 GIVEN WHO YOU ARE, WHAT CAN YOU DO???
 HOW DO WE CONTROL PRIVILEGE???
AUTHORIZATION
THE PROCESS OF GIVING THE USER PERMISSON TO
ACCESS A SPECIFIC RESOURCE OR FUNCTIONS…..
AUTHORIZATION
ACCESS CONTROL TYPES
ROLE BASED ACCESS CONTROL (RBAC)
CONTEXT BASED ACCESS CONTROL (CBAC)
CONTEXT AWARE ACCESS CONTROL (CAAC)
AUTHORIZATION
ROLE BASED ACCESS CONTROL(RBAC)
 SANDHU ETAL FORMALIZED RBAC IN 1996.
USER U ACTING IN ROLE R IS GRANTED PERMISSON P.
 ADVANTAGES: GREATLY IMPROVED EFFICIENCY
DISADVANTAGES: CAN’T SPECIFY FINEGRAINED RULE
AUTHORIZATION
CONTEXT BASED ACCESS CONTROL(CBAC)
WHAT IS CONTEXT?
CIRCUMSTANCES IN WHICH AN EVENT OCCURS.
SUBJECT OBJECT SYSTEM
NAME TYPE TIME
AGE OWNER DATE
ID CPU SPEED
LOCATION
AUTHORIZATION
CONTEXT BASED ACCESS CONTROL(CBAC)
 ADVANTAGES:
ACCESS CONTROL IN CONTEXT-AWARE.
 DISADVANTAGE:
THIS IS STILL A STATIC MODEL.
AUTHORIZATION
CONTEXT AWARE ACCESS CONTROL(CAAC)
 DYNAMIC SPECIFICATION & ENFORCEMENT OF
ARBITARY ACCESS RULES…
 SEPARATION OF OBJECT AND THE MAIN BUISNESS
LOGIC OF TARGET APPLICATION
AUTHORIZATION
Auditing is essentially the action of making sure someone
complies with a rule or follows safety procedures...
AUDITING
 WHY DO WE NEED A CLOUD COMPUTING
AUDIT?????
The primary goal of a Cloud Audit Checklist is to assure
that all data requests, access, processing and storage are
properly documented for regulatory compliance.
A secondary goal of this Cloud Audit Checklist is to
establish a process which will allow an auditor to
document compliance with the security standards
required by law or regulation.
AUDITING
 TYPES OF AUDIT
SYSTEM AUDIT
A SYSTEM AUDIT IS A ONE-TIME OR
PERIODIC EVENT TO EVALUATE SECURITY.
MONITORING
MONITORING IS AN ONGOING
ACTIVITY THAT EXAMINES THE EITHER THE
SYSTEM OR THE USERS
AUDITING
CLOUD AUDITOR
∆ A cloud auditor is a third party who examines
controls of cloud computing service providers.
∆ Cloud auditor performs an audit to verify compliance
with the standards and expressed his opinion through
a report.
AUDITING
INFORMATION TECHNOLOGY AUDITORS TYPICALLY
AUDIT THE FOLLOWING FUNCTIONS :-----
 SYSTEM CONTROLS
 SYSTEM DEVELOPMENT STANDARDS
 BACKUP CONTROL
 DATA DISPLAY PROCEDURES
 DATA CENTER SECURITY
 CONTINGENCY PLANS
AUDITING
ACCOUNTABILITY IS ALL ABOUT DEVELOPING A
HOLISTIC APPROACH TO ACHIEVING TRUST AND
SECURITY IN THE CLOUD, ENCOMPASSING
LEGAL
REGULATORY
TECHNICAL MECHANISMS
ACCOUNTABILITY
ACCOUNTABILITY
RESPONSIBILITY
YOU ARE RESPONSIBLE FOR PROTECTING THE SECURITY OF YOUR
DATA AND IDENTITIES, ON-PREMISES RESOURCES, AND THE
CLOUD COMPONENTS YOU CONTROL (WHICH VARIES BY SERVICE
TYPE).
ACCOUNTABILITY
REMEDIATION
 The ability to detail the origin of policy violations in order to
provide appropriate responses.
 The ability to suggest
response actions to ease
the process for customers
responding to the event.
ACCOUNTABILITY
ASSURANCE
THE CONTROLS INSIDE OF CLOUD ASSURANCE ARE
BUILT TO HELP BUILD STRONGER VALUE IN YOUR
BUSINESS SYSTEMS.
ACCOUNTABILITY
 WITH THE HELP OF CLOUD SECURITY, YOU CAN CENTRALIZE THE
COMPANY’S SECURITY INFRASTRUCTURE FOR ENHANCED
PROTECTION.
 TIME TO SAY GOODBYE TO HARDWARE
 MINIMIZED CAPITAL EXPENDITURE HELPING YOU MANAGE
FINANCES.
 LIMITS THE STAFF LOAD AND ADMINISTRATIVE OVERHEADS
 NO NEED FOR MANUAL SECURITY CONFIGURATIONS
 IT IS SCALABLE AS YOU ARE WELCOME TO ADD ADDITIONAL
FEATURES AND OFFERING ACCESS TO AS MANY USERS AS YOU
WANT WITHOUT BREACHING YOUR SECURITY
WHY DO WE NEED CLOUD SECURITY
????????????
 THE CLOUDS ARE ACCESSIBLE BY THE TEAM AND DEVICES OUTSIDE
THE CORPORATE NETWORK THAT ARE NOT SUPERVISED BY IT
COMPROMISING THE ALL-TIME AND EXTENSIVE MONITORING. THIS
LOOPHOLE CAN LEAD TO CYBER-ATTACKS OR INFORMATION LEAKS.
 AN EMPLOYEE WITH ACCESS TO THE CLOUD CAN GO ROGUE
EXPOSING OR EXPLOITING THE ORGANIZATION IN A THIRD-PARTY
CLOUD SERVICE PROVIDER’S SITUATION
 HUMAN ERRORS CAN CAUSE MISCONFIGURATION OF USER ACCESS
CONTROLS.
 THE CHIEF RISK OF USING THE CLOUD IS THAT THERE IS NO
PERIMETER AS ALL CLOUD ENVIRONMENTS SEEM EXCEEDINGLY
CONNECTED AND ACCOUNT HIJACKS CAN GET YOU INTO SERIOUS
PROBLEMS
CLOUD SECURITY CHALLENGES
cloud security.pptx

More Related Content

Similar to cloud security.pptx

The Art of Cloud Auditing - ISACA ID
The Art of Cloud Auditing - ISACA IDThe Art of Cloud Auditing - ISACA ID
The Art of Cloud Auditing - ISACA IDEryk Budi Pratama
 
NIS-CH 1-PART 1 (1).pptx
NIS-CH 1-PART 1 (1).pptxNIS-CH 1-PART 1 (1).pptx
NIS-CH 1-PART 1 (1).pptxchandutidake
 
Why CCSK with InfosecTrain (1).pdf
Why CCSK with InfosecTrain (1).pdfWhy CCSK with InfosecTrain (1).pdf
Why CCSK with InfosecTrain (1).pdfinfosec train
 
TrustBuilder IBM TAMeb sales presentation v2.3
TrustBuilder IBM TAMeb sales presentation v2.3TrustBuilder IBM TAMeb sales presentation v2.3
TrustBuilder IBM TAMeb sales presentation v2.3Pieter Noorlander
 
Insurance Innovation Award - Metlife Innovation Centre
Insurance Innovation Award - Metlife Innovation CentreInsurance Innovation Award - Metlife Innovation Centre
Insurance Innovation Award - Metlife Innovation CentreThe Digital Insurer
 
AWS Cloud Governance & Security through Automation - Atlanta AWS Builders
AWS Cloud Governance & Security through Automation - Atlanta AWS BuildersAWS Cloud Governance & Security through Automation - Atlanta AWS Builders
AWS Cloud Governance & Security through Automation - Atlanta AWS BuildersJames Strong
 
Cloud-Based Customer Experience Management Solutions For Government Agencies
Cloud-Based Customer Experience Management Solutions For Government AgenciesCloud-Based Customer Experience Management Solutions For Government Agencies
Cloud-Based Customer Experience Management Solutions For Government AgenciesRightNow Technologies
 
ISO 27017 – What are the Business Advantages of Cloud Security?
ISO 27017 – What are the Business Advantages of Cloud Security?ISO 27017 – What are the Business Advantages of Cloud Security?
ISO 27017 – What are the Business Advantages of Cloud Security?Alvin Integrated Services [AIS]
 
Let's Get Start Your Preparation for CSA Certificate of Cloud Security Knowle...
Let's Get Start Your Preparation for CSA Certificate of Cloud Security Knowle...Let's Get Start Your Preparation for CSA Certificate of Cloud Security Knowle...
Let's Get Start Your Preparation for CSA Certificate of Cloud Security Knowle...Amaaira Johns
 
Insurance Innovation Award-Metlife Innovation Centre
Insurance Innovation Award-Metlife Innovation CentreInsurance Innovation Award-Metlife Innovation Centre
Insurance Innovation Award-Metlife Innovation CentreThe Digital Insurer
 
Twin Cities IAM Meet Up - May 2014 - The latest in authorization trends and s...
Twin Cities IAM Meet Up - May 2014 - The latest in authorization trends and s...Twin Cities IAM Meet Up - May 2014 - The latest in authorization trends and s...
Twin Cities IAM Meet Up - May 2014 - The latest in authorization trends and s...ggebel
 
Whitepaper: Moving to Clouds? Simplify your approach to understand the risks ...
Whitepaper: Moving to Clouds? Simplify your approach to understand the risks ...Whitepaper: Moving to Clouds? Simplify your approach to understand the risks ...
Whitepaper: Moving to Clouds? Simplify your approach to understand the risks ...Happiest Minds Technologies
 
Everything Practice Management - June 16 2015 CCLA Conference
Everything Practice Management -  June 16 2015 CCLA ConferenceEverything Practice Management -  June 16 2015 CCLA Conference
Everything Practice Management - June 16 2015 CCLA ConferenceuLawPractice Jillian Lim
 
Building security from scratch
Building security from scratchBuilding security from scratch
Building security from scratchRoman Zelenko
 
The Cloud Crossover
The Cloud CrossoverThe Cloud Crossover
The Cloud CrossoverArmor
 
Simplify Your Approach To_Assess The Risks Of Moving Into The Cloud
Simplify Your Approach To_Assess The Risks Of Moving Into The CloudSimplify Your Approach To_Assess The Risks Of Moving Into The Cloud
Simplify Your Approach To_Assess The Risks Of Moving Into The CloudHappiest Minds Technologies
 

Similar to cloud security.pptx (20)

Issa 042711
Issa 042711Issa 042711
Issa 042711
 
The Art of Cloud Auditing - ISACA ID
The Art of Cloud Auditing - ISACA IDThe Art of Cloud Auditing - ISACA ID
The Art of Cloud Auditing - ISACA ID
 
NIS-CH 1-PART 1 (1).pptx
NIS-CH 1-PART 1 (1).pptxNIS-CH 1-PART 1 (1).pptx
NIS-CH 1-PART 1 (1).pptx
 
Why CCSK with InfosecTrain (1).pdf
Why CCSK with InfosecTrain (1).pdfWhy CCSK with InfosecTrain (1).pdf
Why CCSK with InfosecTrain (1).pdf
 
TrustBuilder IBM TAMeb sales presentation v2.3
TrustBuilder IBM TAMeb sales presentation v2.3TrustBuilder IBM TAMeb sales presentation v2.3
TrustBuilder IBM TAMeb sales presentation v2.3
 
Patrick armstrong athens
Patrick armstrong athensPatrick armstrong athens
Patrick armstrong athens
 
HPE SPACE Poster
HPE SPACE PosterHPE SPACE Poster
HPE SPACE Poster
 
Insurance Innovation Award - Metlife Innovation Centre
Insurance Innovation Award - Metlife Innovation CentreInsurance Innovation Award - Metlife Innovation Centre
Insurance Innovation Award - Metlife Innovation Centre
 
AWS Cloud Governance & Security through Automation - Atlanta AWS Builders
AWS Cloud Governance & Security through Automation - Atlanta AWS BuildersAWS Cloud Governance & Security through Automation - Atlanta AWS Builders
AWS Cloud Governance & Security through Automation - Atlanta AWS Builders
 
Cloud-Based Customer Experience Management Solutions For Government Agencies
Cloud-Based Customer Experience Management Solutions For Government AgenciesCloud-Based Customer Experience Management Solutions For Government Agencies
Cloud-Based Customer Experience Management Solutions For Government Agencies
 
ISO 27017 – What are the Business Advantages of Cloud Security?
ISO 27017 – What are the Business Advantages of Cloud Security?ISO 27017 – What are the Business Advantages of Cloud Security?
ISO 27017 – What are the Business Advantages of Cloud Security?
 
Let's Get Start Your Preparation for CSA Certificate of Cloud Security Knowle...
Let's Get Start Your Preparation for CSA Certificate of Cloud Security Knowle...Let's Get Start Your Preparation for CSA Certificate of Cloud Security Knowle...
Let's Get Start Your Preparation for CSA Certificate of Cloud Security Knowle...
 
Insurance Innovation Award-Metlife Innovation Centre
Insurance Innovation Award-Metlife Innovation CentreInsurance Innovation Award-Metlife Innovation Centre
Insurance Innovation Award-Metlife Innovation Centre
 
Twin Cities IAM Meet Up - May 2014 - The latest in authorization trends and s...
Twin Cities IAM Meet Up - May 2014 - The latest in authorization trends and s...Twin Cities IAM Meet Up - May 2014 - The latest in authorization trends and s...
Twin Cities IAM Meet Up - May 2014 - The latest in authorization trends and s...
 
Whitepaper: Moving to Clouds? Simplify your approach to understand the risks ...
Whitepaper: Moving to Clouds? Simplify your approach to understand the risks ...Whitepaper: Moving to Clouds? Simplify your approach to understand the risks ...
Whitepaper: Moving to Clouds? Simplify your approach to understand the risks ...
 
Everything Practice Management - June 16 2015 CCLA Conference
Everything Practice Management -  June 16 2015 CCLA ConferenceEverything Practice Management -  June 16 2015 CCLA Conference
Everything Practice Management - June 16 2015 CCLA Conference
 
Building security from scratch
Building security from scratchBuilding security from scratch
Building security from scratch
 
The Cloud Crossover
The Cloud CrossoverThe Cloud Crossover
The Cloud Crossover
 
Silicon Valley IDSA Meetup October 2018
Silicon Valley IDSA Meetup October 2018 Silicon Valley IDSA Meetup October 2018
Silicon Valley IDSA Meetup October 2018
 
Simplify Your Approach To_Assess The Risks Of Moving Into The Cloud
Simplify Your Approach To_Assess The Risks Of Moving Into The CloudSimplify Your Approach To_Assess The Risks Of Moving Into The Cloud
Simplify Your Approach To_Assess The Risks Of Moving Into The Cloud
 

More from SourodeepChakraborty3

More from SourodeepChakraborty3 (7)

types of cloud.pptx
types of cloud.pptxtypes of cloud.pptx
types of cloud.pptx
 
scaling.pptx
scaling.pptxscaling.pptx
scaling.pptx
 
Deployment Model.pptx
Deployment Model.pptxDeployment Model.pptx
Deployment Model.pptx
 
cloud computing advantages.pptx
cloud computing advantages.pptxcloud computing advantages.pptx
cloud computing advantages.pptx
 
cloud computing architecture.pptx
cloud computing architecture.pptxcloud computing architecture.pptx
cloud computing architecture.pptx
 
Service level agreement.pptx
Service level agreement.pptxService level agreement.pptx
Service level agreement.pptx
 
CLOUD SECURITY_CIA (1).pptx
CLOUD SECURITY_CIA (1).pptxCLOUD SECURITY_CIA (1).pptx
CLOUD SECURITY_CIA (1).pptx
 

Recently uploaded

Arduino_CSE ece ppt for working and principal of arduino.ppt
Arduino_CSE ece ppt for working and principal of arduino.pptArduino_CSE ece ppt for working and principal of arduino.ppt
Arduino_CSE ece ppt for working and principal of arduino.pptSAURABHKUMAR892774
 
Study on Air-Water & Water-Water Heat Exchange in a Finned Tube Exchanger
Study on Air-Water & Water-Water Heat Exchange in a Finned Tube ExchangerStudy on Air-Water & Water-Water Heat Exchange in a Finned Tube Exchanger
Study on Air-Water & Water-Water Heat Exchange in a Finned Tube ExchangerAnamika Sarkar
 
Unit7-DC_Motors nkkjnsdkfnfcdfknfdgfggfg
Unit7-DC_Motors nkkjnsdkfnfcdfknfdgfggfgUnit7-DC_Motors nkkjnsdkfnfcdfknfdgfggfg
Unit7-DC_Motors nkkjnsdkfnfcdfknfdgfggfgsaravananr517913
 
UNIT III ANALOG ELECTRONICS (BASIC ELECTRONICS)
UNIT III ANALOG ELECTRONICS (BASIC ELECTRONICS)UNIT III ANALOG ELECTRONICS (BASIC ELECTRONICS)
UNIT III ANALOG ELECTRONICS (BASIC ELECTRONICS)Dr SOUNDIRARAJ N
 
Gurgaon ✡️9711147426✨Call In girls Gurgaon Sector 51 escort service
Gurgaon ✡️9711147426✨Call In girls Gurgaon Sector 51 escort serviceGurgaon ✡️9711147426✨Call In girls Gurgaon Sector 51 escort service
Gurgaon ✡️9711147426✨Call In girls Gurgaon Sector 51 escort servicejennyeacort
 
INFLUENCE OF NANOSILICA ON THE PROPERTIES OF CONCRETE
INFLUENCE OF NANOSILICA ON THE PROPERTIES OF CONCRETEINFLUENCE OF NANOSILICA ON THE PROPERTIES OF CONCRETE
INFLUENCE OF NANOSILICA ON THE PROPERTIES OF CONCRETEroselinkalist12
 
Introduction-To-Agricultural-Surveillance-Rover.pptx
Introduction-To-Agricultural-Surveillance-Rover.pptxIntroduction-To-Agricultural-Surveillance-Rover.pptx
Introduction-To-Agricultural-Surveillance-Rover.pptxk795866
 
TechTAC® CFD Report Summary: A Comparison of Two Types of Tubing Anchor Catchers
TechTAC® CFD Report Summary: A Comparison of Two Types of Tubing Anchor CatchersTechTAC® CFD Report Summary: A Comparison of Two Types of Tubing Anchor Catchers
TechTAC® CFD Report Summary: A Comparison of Two Types of Tubing Anchor Catcherssdickerson1
 
Why does (not) Kafka need fsync: Eliminating tail latency spikes caused by fsync
Why does (not) Kafka need fsync: Eliminating tail latency spikes caused by fsyncWhy does (not) Kafka need fsync: Eliminating tail latency spikes caused by fsync
Why does (not) Kafka need fsync: Eliminating tail latency spikes caused by fsyncssuser2ae721
 
Vishratwadi & Ghorpadi Bridge Tender documents
Vishratwadi & Ghorpadi Bridge Tender documentsVishratwadi & Ghorpadi Bridge Tender documents
Vishratwadi & Ghorpadi Bridge Tender documentsSachinPawar510423
 
Sachpazis Costas: Geotechnical Engineering: A student's Perspective Introduction
Sachpazis Costas: Geotechnical Engineering: A student's Perspective IntroductionSachpazis Costas: Geotechnical Engineering: A student's Perspective Introduction
Sachpazis Costas: Geotechnical Engineering: A student's Perspective IntroductionDr.Costas Sachpazis
 
CCS355 Neural Network & Deep Learning Unit II Notes with Question bank .pdf
CCS355 Neural Network & Deep Learning Unit II Notes with Question bank .pdfCCS355 Neural Network & Deep Learning Unit II Notes with Question bank .pdf
CCS355 Neural Network & Deep Learning Unit II Notes with Question bank .pdfAsst.prof M.Gokilavani
 
Solving The Right Triangles PowerPoint 2.ppt
Solving The Right Triangles PowerPoint 2.pptSolving The Right Triangles PowerPoint 2.ppt
Solving The Right Triangles PowerPoint 2.pptJasonTagapanGulla
 
Call Girls Delhi {Jodhpur} 9711199012 high profile service
Call Girls Delhi {Jodhpur} 9711199012 high profile serviceCall Girls Delhi {Jodhpur} 9711199012 high profile service
Call Girls Delhi {Jodhpur} 9711199012 high profile servicerehmti665
 
Architect Hassan Khalil Portfolio for 2024
Architect Hassan Khalil Portfolio for 2024Architect Hassan Khalil Portfolio for 2024
Architect Hassan Khalil Portfolio for 2024hassan khalil
 
Risk Assessment For Installation of Drainage Pipes.pdf
Risk Assessment For Installation of Drainage Pipes.pdfRisk Assessment For Installation of Drainage Pipes.pdf
Risk Assessment For Installation of Drainage Pipes.pdfROCENODodongVILLACER
 
welding defects observed during the welding
welding defects observed during the weldingwelding defects observed during the welding
welding defects observed during the weldingMuhammadUzairLiaqat
 
Correctly Loading Incremental Data at Scale
Correctly Loading Incremental Data at ScaleCorrectly Loading Incremental Data at Scale
Correctly Loading Incremental Data at ScaleAlluxio, Inc.
 
Oxy acetylene welding presentation note.
Oxy acetylene welding presentation note.Oxy acetylene welding presentation note.
Oxy acetylene welding presentation note.eptoze12
 

Recently uploaded (20)

Arduino_CSE ece ppt for working and principal of arduino.ppt
Arduino_CSE ece ppt for working and principal of arduino.pptArduino_CSE ece ppt for working and principal of arduino.ppt
Arduino_CSE ece ppt for working and principal of arduino.ppt
 
Study on Air-Water & Water-Water Heat Exchange in a Finned Tube Exchanger
Study on Air-Water & Water-Water Heat Exchange in a Finned Tube ExchangerStudy on Air-Water & Water-Water Heat Exchange in a Finned Tube Exchanger
Study on Air-Water & Water-Water Heat Exchange in a Finned Tube Exchanger
 
Unit7-DC_Motors nkkjnsdkfnfcdfknfdgfggfg
Unit7-DC_Motors nkkjnsdkfnfcdfknfdgfggfgUnit7-DC_Motors nkkjnsdkfnfcdfknfdgfggfg
Unit7-DC_Motors nkkjnsdkfnfcdfknfdgfggfg
 
UNIT III ANALOG ELECTRONICS (BASIC ELECTRONICS)
UNIT III ANALOG ELECTRONICS (BASIC ELECTRONICS)UNIT III ANALOG ELECTRONICS (BASIC ELECTRONICS)
UNIT III ANALOG ELECTRONICS (BASIC ELECTRONICS)
 
Gurgaon ✡️9711147426✨Call In girls Gurgaon Sector 51 escort service
Gurgaon ✡️9711147426✨Call In girls Gurgaon Sector 51 escort serviceGurgaon ✡️9711147426✨Call In girls Gurgaon Sector 51 escort service
Gurgaon ✡️9711147426✨Call In girls Gurgaon Sector 51 escort service
 
INFLUENCE OF NANOSILICA ON THE PROPERTIES OF CONCRETE
INFLUENCE OF NANOSILICA ON THE PROPERTIES OF CONCRETEINFLUENCE OF NANOSILICA ON THE PROPERTIES OF CONCRETE
INFLUENCE OF NANOSILICA ON THE PROPERTIES OF CONCRETE
 
Introduction-To-Agricultural-Surveillance-Rover.pptx
Introduction-To-Agricultural-Surveillance-Rover.pptxIntroduction-To-Agricultural-Surveillance-Rover.pptx
Introduction-To-Agricultural-Surveillance-Rover.pptx
 
TechTAC® CFD Report Summary: A Comparison of Two Types of Tubing Anchor Catchers
TechTAC® CFD Report Summary: A Comparison of Two Types of Tubing Anchor CatchersTechTAC® CFD Report Summary: A Comparison of Two Types of Tubing Anchor Catchers
TechTAC® CFD Report Summary: A Comparison of Two Types of Tubing Anchor Catchers
 
Why does (not) Kafka need fsync: Eliminating tail latency spikes caused by fsync
Why does (not) Kafka need fsync: Eliminating tail latency spikes caused by fsyncWhy does (not) Kafka need fsync: Eliminating tail latency spikes caused by fsync
Why does (not) Kafka need fsync: Eliminating tail latency spikes caused by fsync
 
Vishratwadi & Ghorpadi Bridge Tender documents
Vishratwadi & Ghorpadi Bridge Tender documentsVishratwadi & Ghorpadi Bridge Tender documents
Vishratwadi & Ghorpadi Bridge Tender documents
 
Sachpazis Costas: Geotechnical Engineering: A student's Perspective Introduction
Sachpazis Costas: Geotechnical Engineering: A student's Perspective IntroductionSachpazis Costas: Geotechnical Engineering: A student's Perspective Introduction
Sachpazis Costas: Geotechnical Engineering: A student's Perspective Introduction
 
CCS355 Neural Network & Deep Learning Unit II Notes with Question bank .pdf
CCS355 Neural Network & Deep Learning Unit II Notes with Question bank .pdfCCS355 Neural Network & Deep Learning Unit II Notes with Question bank .pdf
CCS355 Neural Network & Deep Learning Unit II Notes with Question bank .pdf
 
Solving The Right Triangles PowerPoint 2.ppt
Solving The Right Triangles PowerPoint 2.pptSolving The Right Triangles PowerPoint 2.ppt
Solving The Right Triangles PowerPoint 2.ppt
 
Call Girls Delhi {Jodhpur} 9711199012 high profile service
Call Girls Delhi {Jodhpur} 9711199012 high profile serviceCall Girls Delhi {Jodhpur} 9711199012 high profile service
Call Girls Delhi {Jodhpur} 9711199012 high profile service
 
Architect Hassan Khalil Portfolio for 2024
Architect Hassan Khalil Portfolio for 2024Architect Hassan Khalil Portfolio for 2024
Architect Hassan Khalil Portfolio for 2024
 
Risk Assessment For Installation of Drainage Pipes.pdf
Risk Assessment For Installation of Drainage Pipes.pdfRisk Assessment For Installation of Drainage Pipes.pdf
Risk Assessment For Installation of Drainage Pipes.pdf
 
Design and analysis of solar grass cutter.pdf
Design and analysis of solar grass cutter.pdfDesign and analysis of solar grass cutter.pdf
Design and analysis of solar grass cutter.pdf
 
welding defects observed during the welding
welding defects observed during the weldingwelding defects observed during the welding
welding defects observed during the welding
 
Correctly Loading Incremental Data at Scale
Correctly Loading Incremental Data at ScaleCorrectly Loading Incremental Data at Scale
Correctly Loading Incremental Data at Scale
 
Oxy acetylene welding presentation note.
Oxy acetylene welding presentation note.Oxy acetylene welding presentation note.
Oxy acetylene welding presentation note.
 

cloud security.pptx

  • 1. NAME - SOURODEEP CHAKRABORTY ROLL - 9210 SEMESTER – V STUDENT ID – BGC201120 REGISTRATION NO - 1072011400167 CLOUD COMPUTING
  • 2.  CLOUD SECURITY SERVICES  AUTHENTICATION  AUTHORIZATON  AUDITING  ACCOUNTABILITY  CONCLUSION GLANCE
  • 3. CLOUD SECURITY, ALSO KNOWN AS CLOUD COMPUTING SECURITY, IS A COLLECTION OF SECURITY MEASURES DESIGNED TO PROTECT CLOUD-BASED INFRASTRUCTURE, APPLICATIONS, AND DATA. THESE MEASURES ENSURE USER AND DEVICE AUTHENTICATION, DATA AND RESOURCE ACCESS CONTROL, AND DATA PRIVACY PROTECTION. CLOUD SECURITY SERVICES
  • 4. CLOUD SOFTWARE ASSURANCE INCLUDE……. 4A AUTHENTICATION AUTHORIZATION AUDITING ACCOUNTABILITY CLOUD SECURITY SERVICES
  • 5. AUTHENTICATION HOW DO YOU PROVE TO SOMEONE THAT YOU ARE WHO YOU CLAIM TO BE ?????
  • 6. AUTHENTICATION CAN BE DEFINED AS DETERMINING AN IDENTITY TO THE REQUIRED LEVEL OF ASSURANCE…… AUTHENTICATION IS THE FIRST STEP IN ANY CRYPTOGRAPHIC SOLUTION - BECAUSE UNLESS WE KNOW WHO IS COMMUNICATING, THERE IS NO POINT IN ENCRYPTION WHAT IS BEING COMMUNICATED. AUTHENTICATION
  • 7.  AUTHENTICATION IS ANY PROCESS BY WHICH A SYSTEM VERIFIES THE IDENTITY OF A USER WHO WISHES TO ACCESS IT…  AUTHENTICATION MAY BE IMPLEMENTED USING CREDENTIAL, EACH OF WHICH IS COMPOSED OF AN USER-ID AND PASSWORD. ALTERNATELY AUTHENTICATION MAY BE IMPLEMENTED WITH SMARD CARD, AN AUTHENTICATION SERVER OR EVEN A PUBLIC KEY INFRASTRUCTURE….. AUTHENTICATION
  • 8. MANY WAYS TO PROVE WHO YOU ARE:  WHAT YOU KNOW --PASSWORD / SECRET KEY  WHERE YOU ARE -- IP ADDRESS < INTERNET PROTOCOL >  WHAT YOU ARE BIOMETRICS IS AN AUTHENTICATION METHOD THAT IDENTIFIES AND RECOGNIZES PEOPLE. AUTHENTICATION
  • 9. BIOMETRICS PHYSIOLOGICAL BEHAVIOURAL FACE FINGER VOICE SIGNATURE IRIS DNA HAND AUTHENTICATION
  • 10. PASSWORD A PASSWORD IS A STRING OF ALPHABET, NUMBERS AND SPECIAL CHARACTERS WHICH IS SUPPOSED TO BE KNOWN ONLY TO BE ENTITY THAT IS BEING AUTHENTICATE… AUTHENTICATION
  • 11.  GIVEN WHO YOU ARE, WHAT CAN YOU DO???  HOW DO WE CONTROL PRIVILEGE??? AUTHORIZATION
  • 12. THE PROCESS OF GIVING THE USER PERMISSON TO ACCESS A SPECIFIC RESOURCE OR FUNCTIONS….. AUTHORIZATION
  • 13. ACCESS CONTROL TYPES ROLE BASED ACCESS CONTROL (RBAC) CONTEXT BASED ACCESS CONTROL (CBAC) CONTEXT AWARE ACCESS CONTROL (CAAC) AUTHORIZATION
  • 14. ROLE BASED ACCESS CONTROL(RBAC)  SANDHU ETAL FORMALIZED RBAC IN 1996. USER U ACTING IN ROLE R IS GRANTED PERMISSON P.  ADVANTAGES: GREATLY IMPROVED EFFICIENCY DISADVANTAGES: CAN’T SPECIFY FINEGRAINED RULE AUTHORIZATION
  • 15. CONTEXT BASED ACCESS CONTROL(CBAC) WHAT IS CONTEXT? CIRCUMSTANCES IN WHICH AN EVENT OCCURS. SUBJECT OBJECT SYSTEM NAME TYPE TIME AGE OWNER DATE ID CPU SPEED LOCATION AUTHORIZATION
  • 16. CONTEXT BASED ACCESS CONTROL(CBAC)  ADVANTAGES: ACCESS CONTROL IN CONTEXT-AWARE.  DISADVANTAGE: THIS IS STILL A STATIC MODEL. AUTHORIZATION
  • 17. CONTEXT AWARE ACCESS CONTROL(CAAC)  DYNAMIC SPECIFICATION & ENFORCEMENT OF ARBITARY ACCESS RULES…  SEPARATION OF OBJECT AND THE MAIN BUISNESS LOGIC OF TARGET APPLICATION AUTHORIZATION
  • 18. Auditing is essentially the action of making sure someone complies with a rule or follows safety procedures... AUDITING
  • 19.  WHY DO WE NEED A CLOUD COMPUTING AUDIT????? The primary goal of a Cloud Audit Checklist is to assure that all data requests, access, processing and storage are properly documented for regulatory compliance. A secondary goal of this Cloud Audit Checklist is to establish a process which will allow an auditor to document compliance with the security standards required by law or regulation. AUDITING
  • 20.  TYPES OF AUDIT SYSTEM AUDIT A SYSTEM AUDIT IS A ONE-TIME OR PERIODIC EVENT TO EVALUATE SECURITY. MONITORING MONITORING IS AN ONGOING ACTIVITY THAT EXAMINES THE EITHER THE SYSTEM OR THE USERS AUDITING
  • 21. CLOUD AUDITOR ∆ A cloud auditor is a third party who examines controls of cloud computing service providers. ∆ Cloud auditor performs an audit to verify compliance with the standards and expressed his opinion through a report. AUDITING
  • 22. INFORMATION TECHNOLOGY AUDITORS TYPICALLY AUDIT THE FOLLOWING FUNCTIONS :-----  SYSTEM CONTROLS  SYSTEM DEVELOPMENT STANDARDS  BACKUP CONTROL  DATA DISPLAY PROCEDURES  DATA CENTER SECURITY  CONTINGENCY PLANS AUDITING
  • 23. ACCOUNTABILITY IS ALL ABOUT DEVELOPING A HOLISTIC APPROACH TO ACHIEVING TRUST AND SECURITY IN THE CLOUD, ENCOMPASSING LEGAL REGULATORY TECHNICAL MECHANISMS ACCOUNTABILITY
  • 25. RESPONSIBILITY YOU ARE RESPONSIBLE FOR PROTECTING THE SECURITY OF YOUR DATA AND IDENTITIES, ON-PREMISES RESOURCES, AND THE CLOUD COMPONENTS YOU CONTROL (WHICH VARIES BY SERVICE TYPE). ACCOUNTABILITY
  • 26. REMEDIATION  The ability to detail the origin of policy violations in order to provide appropriate responses.  The ability to suggest response actions to ease the process for customers responding to the event. ACCOUNTABILITY
  • 27. ASSURANCE THE CONTROLS INSIDE OF CLOUD ASSURANCE ARE BUILT TO HELP BUILD STRONGER VALUE IN YOUR BUSINESS SYSTEMS. ACCOUNTABILITY
  • 28.  WITH THE HELP OF CLOUD SECURITY, YOU CAN CENTRALIZE THE COMPANY’S SECURITY INFRASTRUCTURE FOR ENHANCED PROTECTION.  TIME TO SAY GOODBYE TO HARDWARE  MINIMIZED CAPITAL EXPENDITURE HELPING YOU MANAGE FINANCES.  LIMITS THE STAFF LOAD AND ADMINISTRATIVE OVERHEADS  NO NEED FOR MANUAL SECURITY CONFIGURATIONS  IT IS SCALABLE AS YOU ARE WELCOME TO ADD ADDITIONAL FEATURES AND OFFERING ACCESS TO AS MANY USERS AS YOU WANT WITHOUT BREACHING YOUR SECURITY WHY DO WE NEED CLOUD SECURITY ????????????
  • 29.  THE CLOUDS ARE ACCESSIBLE BY THE TEAM AND DEVICES OUTSIDE THE CORPORATE NETWORK THAT ARE NOT SUPERVISED BY IT COMPROMISING THE ALL-TIME AND EXTENSIVE MONITORING. THIS LOOPHOLE CAN LEAD TO CYBER-ATTACKS OR INFORMATION LEAKS.  AN EMPLOYEE WITH ACCESS TO THE CLOUD CAN GO ROGUE EXPOSING OR EXPLOITING THE ORGANIZATION IN A THIRD-PARTY CLOUD SERVICE PROVIDER’S SITUATION  HUMAN ERRORS CAN CAUSE MISCONFIGURATION OF USER ACCESS CONTROLS.  THE CHIEF RISK OF USING THE CLOUD IS THAT THERE IS NO PERIMETER AS ALL CLOUD ENVIRONMENTS SEEM EXCEEDINGLY CONNECTED AND ACCOUNT HIJACKS CAN GET YOU INTO SERIOUS PROBLEMS CLOUD SECURITY CHALLENGES