SlideShare una empresa de Scribd logo
1 de 12
SECURITY AND PRIVACY
IN CLOUD COMPUTING
AGENDA
SECURITY
AND
PRIVACY
2
INTRODUCTION OF CLOUD
COMPUTING
TYPES OF CLOUD
COMPUTING
GOOD SECURITY
PRACTICES
ENSURING PRIVACY
TAKEAWAY
INTRODUCTION
SECURITY
AND
PRIVACY
3
Cloud computing is on-demand access, via the internet,
to computing resources—applications, servers (physical
servers and virtual servers), data storage, development
tools, networking capabilities, and more—hosted at a
remote data centre managed by a cloud services provider
(or CSP).
The CSP makes these resources available for a monthly
subscription fee or bills them according to usage.
INTRODUCTION
Cloud computing helps in the following:
1. Lower IT costs: Cloud lets you offload some or most of
the costs and effort of purchasing, installing, configuring,
and managing your own on-premises infrastructure.
2. Improve agility and time-to-value: With cloud, your
organization can start using enterprise applications in
minutes, instead of waiting weeks or months for IT to
respond to a request, purchase and configure supporting
hardware, and install software.
3. Scale more easily and cost-effectively: Cloud provides
elasticity—instead of purchasing excess capacity that sits
unused during slow periods, you can scale capacity up
and down in response to spikes and dips in traffic.
4
SECURITY
AND
PRIVACY
TYPES OF CLOUD
COMPUTING
1. Public cloud
2. Private cloud
3. Hybrid cloud
4. Multicloud
5. Hybrid multicloud
5
SECURITY
AND
PRIVACY
GOOD SECURITY
PRACTICES
1. Protection against internal and external threats
Security monitoring services help to improve the effectiveness of the
security infrastructure of a customer by actively analysing logs and alerts
from infrastructure devices around the clock and in real time. Usually the
skills required to maintain the level of service of an organization is very
high.
2. Early detection
An early detection service detects and reports new security
vulnerabilities shortly after they appear. Security vulnerability reports
include information on the impact the exploitation of this vulnerability
would have on the system or applications previously selected by the
company receiving the report.
6
SECURITY
AND
PRIVACY
GOOD SECURITY
PRACTICES
3. Vulnerabilities detection and management
Vulnerability detection and management enables automated
verification and management of the security level of information
system. The service performs periodic follow-up of tasks
performed by security professional managing information
systems security and provides reports that can be used to
implement a plan for continuous improvement of the system’s
security level.
4. Intervention, forensics, and help desk services
Quick intervention when a threat is detected is crucial to
mitigating the effects of a thread. This requires security
engineers with ample knowledge in the various technologies and
with the ability to support applications as well as infrastructures
7
SECURITY
AND
PRIVACY
ENSURING
PRIVACY
Privacy protection in cloud computing environment is less
of a technical issue and more of a policy and legal issue.
Policies are required to be framed to conform to the legal
framework protecting the privacy of individuals and
organization. Policies have to empower people to control
the collections, use, and distribution of their personal
information.
8
SECURITY
AND
PRIVACY
7 PRINCIPLES OF
PRIVACY PROTECTION
 Notice: individuals must be informed that data is being
collected and about how it will be used.
 Choice: individuals must have the ability to opt out of
the collection and forward transfer of data to third
parties.
 Onward transfer: transfer of data third parties may
only occur to other organizations that follow adequate
data protection principles.
 Security: reasonable efforts must be made to prevent
loss of collected information.
9
SECURITY
AND
PRIVACY
7 PRINCIPLES OF
PRIVACY PROTECTION
 Data integrity: data must be relevant and
reliable for the purpose it was collected for.
 Access: individuals must be able to access
information held about them, and correct or
delete it if it is inaccurate.
 Enforcement: there must be effective means of
enforcing these rules.
1 0
SECURITY
AND
PRIVACY
SECURITY VS PRIVACY
SECURITY
• Protects data
• Keeps you safe from potential
threats.
• Long been deemed essential
PRIVACY
• Involves how data is used and
controlled.
• Refers to details about you directly
and how you wish to share them.
• Considered a luxury and not for
everyone.
1 1
SECURITY
AND
PRIVACY
SUMMARY
SECURITY
AND
PRIVACY
1 2
Cloud computing is the on-demand delivery of it
resources over the internet with pay-as-you-go
pricing.
Cloud security is a collection of procedures and
technology designed to address external and
internal threats to business security.
Cloud privacy is the concept of sharing data
while protecting certain personal information.

Más contenido relacionado

La actualidad más candente

Active directory
Active directory Active directory
Active directory
deshvikas
 
CS8791 Cloud Computing - Question Bank
CS8791 Cloud Computing - Question BankCS8791 Cloud Computing - Question Bank
CS8791 Cloud Computing - Question Bank
pkaviya
 

La actualidad más candente (20)

Active directory slides
Active directory slidesActive directory slides
Active directory slides
 
OSI Security Architecture
OSI Security ArchitectureOSI Security Architecture
OSI Security Architecture
 
Access Controls
Access ControlsAccess Controls
Access Controls
 
Cloud Service Models
Cloud Service ModelsCloud Service Models
Cloud Service Models
 
Cloud security
Cloud security Cloud security
Cloud security
 
Legal issues in cloud computing
Legal issues in cloud computingLegal issues in cloud computing
Legal issues in cloud computing
 
Cloud computing security issues and challenges
Cloud computing security issues and challengesCloud computing security issues and challenges
Cloud computing security issues and challenges
 
ACTIVE-DIRECTORY.ppt
ACTIVE-DIRECTORY.pptACTIVE-DIRECTORY.ppt
ACTIVE-DIRECTORY.ppt
 
Cloud Security
Cloud SecurityCloud Security
Cloud Security
 
Introduction to Cloud computing
Introduction to Cloud computingIntroduction to Cloud computing
Introduction to Cloud computing
 
Dmz
Dmz Dmz
Dmz
 
Cloud Computing
Cloud ComputingCloud Computing
Cloud Computing
 
Authentication service security
Authentication service securityAuthentication service security
Authentication service security
 
Active directory
Active directory Active directory
Active directory
 
Linux Network Management
Linux Network ManagementLinux Network Management
Linux Network Management
 
CS8791 Cloud Computing - Question Bank
CS8791 Cloud Computing - Question BankCS8791 Cloud Computing - Question Bank
CS8791 Cloud Computing - Question Bank
 
Firewall in Network Security
Firewall in Network SecurityFirewall in Network Security
Firewall in Network Security
 
Data security and Integrity
Data security and IntegrityData security and Integrity
Data security and Integrity
 
Network security
Network securityNetwork security
Network security
 
Operating system security
Operating system securityOperating system security
Operating system security
 

Similar a Security and privacy in cloud computing.pptx

Fundamentals of-information-security
Fundamentals of-information-security Fundamentals of-information-security
Fundamentals of-information-security
madunix
 
Top Cyber Security Interview Questions and Answers 2022.pdf
Top Cyber Security Interview Questions and Answers 2022.pdfTop Cyber Security Interview Questions and Answers 2022.pdf
Top Cyber Security Interview Questions and Answers 2022.pdf
Careerera
 

Similar a Security and privacy in cloud computing.pptx (20)

Chapter_5_Security_CC.pptx
Chapter_5_Security_CC.pptxChapter_5_Security_CC.pptx
Chapter_5_Security_CC.pptx
 
Top Cloud Infrastructure Practices And Strategies For Maximum Security.pdf
Top Cloud Infrastructure Practices And Strategies For Maximum Security.pdfTop Cloud Infrastructure Practices And Strategies For Maximum Security.pdf
Top Cloud Infrastructure Practices And Strategies For Maximum Security.pdf
 
Fundamentals of-information-security
Fundamentals of-information-security Fundamentals of-information-security
Fundamentals of-information-security
 
Data Privacy And Security Issues In Cloud Computing.pdf
Data Privacy And Security Issues In Cloud Computing.pdfData Privacy And Security Issues In Cloud Computing.pdf
Data Privacy And Security Issues In Cloud Computing.pdf
 
Security and Privacy Issues of Cloud Computing; Solutions and Secure Framework
Security and Privacy Issues of Cloud Computing; Solutions and Secure FrameworkSecurity and Privacy Issues of Cloud Computing; Solutions and Secure Framework
Security and Privacy Issues of Cloud Computing; Solutions and Secure Framework
 
GDPR Part 2: Quest Relevance
GDPR Part 2: Quest RelevanceGDPR Part 2: Quest Relevance
GDPR Part 2: Quest Relevance
 
internet security and cyber lawUnit1
internet security and  cyber lawUnit1internet security and  cyber lawUnit1
internet security and cyber lawUnit1
 
Data security
Data securityData security
Data security
 
Ais Romney 2006 Slides 08 Is Control2
Ais Romney 2006 Slides 08 Is Control2Ais Romney 2006 Slides 08 Is Control2
Ais Romney 2006 Slides 08 Is Control2
 
Ais Romney 2006 Slides 08 Is Control2
Ais Romney 2006 Slides 08 Is Control2Ais Romney 2006 Slides 08 Is Control2
Ais Romney 2006 Slides 08 Is Control2
 
the_role_of_resilience_data_in_ensuring_cloud_security.pptx
the_role_of_resilience_data_in_ensuring_cloud_security.pptxthe_role_of_resilience_data_in_ensuring_cloud_security.pptx
the_role_of_resilience_data_in_ensuring_cloud_security.pptx
 
Security Ch-1.pptx
Security Ch-1.pptxSecurity Ch-1.pptx
Security Ch-1.pptx
 
the_role_of_resilience_data_in_ensuring_cloud_security.pdf
the_role_of_resilience_data_in_ensuring_cloud_security.pdfthe_role_of_resilience_data_in_ensuring_cloud_security.pdf
the_role_of_resilience_data_in_ensuring_cloud_security.pdf
 
A Cybersecurity Planning Guide for CFOs
A Cybersecurity Planning Guide for CFOsA Cybersecurity Planning Guide for CFOs
A Cybersecurity Planning Guide for CFOs
 
Security Management in Cloud Computing by Shivani Gogia - Aravali College of ...
Security Management in Cloud Computing by Shivani Gogia - Aravali College of ...Security Management in Cloud Computing by Shivani Gogia - Aravali College of ...
Security Management in Cloud Computing by Shivani Gogia - Aravali College of ...
 
Data Security and Compliance in Enterprise Cloud Migration.pdf
Data Security and Compliance in Enterprise Cloud Migration.pdfData Security and Compliance in Enterprise Cloud Migration.pdf
Data Security and Compliance in Enterprise Cloud Migration.pdf
 
Top Cyber Security Interview Questions and Answers 2022.pdf
Top Cyber Security Interview Questions and Answers 2022.pdfTop Cyber Security Interview Questions and Answers 2022.pdf
Top Cyber Security Interview Questions and Answers 2022.pdf
 
Information security group presentation ppt
Information security group presentation   pptInformation security group presentation   ppt
Information security group presentation ppt
 
Security Considerations When Using Cloud Infrastructure Services.pdf
Security Considerations When Using Cloud Infrastructure Services.pdfSecurity Considerations When Using Cloud Infrastructure Services.pdf
Security Considerations When Using Cloud Infrastructure Services.pdf
 
Introduction to security
Introduction to securityIntroduction to security
Introduction to security
 

Último

Salient Features of India constitution especially power and functions
Salient Features of India constitution especially power and functionsSalient Features of India constitution especially power and functions
Salient Features of India constitution especially power and functions
KarakKing
 
Jual Obat Aborsi Hongkong ( Asli No.1 ) 085657271886 Obat Penggugur Kandungan...
Jual Obat Aborsi Hongkong ( Asli No.1 ) 085657271886 Obat Penggugur Kandungan...Jual Obat Aborsi Hongkong ( Asli No.1 ) 085657271886 Obat Penggugur Kandungan...
Jual Obat Aborsi Hongkong ( Asli No.1 ) 085657271886 Obat Penggugur Kandungan...
ZurliaSoop
 

Último (20)

2024-NATIONAL-LEARNING-CAMP-AND-OTHER.pptx
2024-NATIONAL-LEARNING-CAMP-AND-OTHER.pptx2024-NATIONAL-LEARNING-CAMP-AND-OTHER.pptx
2024-NATIONAL-LEARNING-CAMP-AND-OTHER.pptx
 
ICT Role in 21st Century Education & its Challenges.pptx
ICT Role in 21st Century Education & its Challenges.pptxICT Role in 21st Century Education & its Challenges.pptx
ICT Role in 21st Century Education & its Challenges.pptx
 
Understanding Accommodations and Modifications
Understanding  Accommodations and ModificationsUnderstanding  Accommodations and Modifications
Understanding Accommodations and Modifications
 
Holdier Curriculum Vitae (April 2024).pdf
Holdier Curriculum Vitae (April 2024).pdfHoldier Curriculum Vitae (April 2024).pdf
Holdier Curriculum Vitae (April 2024).pdf
 
NO1 Top Black Magic Specialist In Lahore Black magic In Pakistan Kala Ilam Ex...
NO1 Top Black Magic Specialist In Lahore Black magic In Pakistan Kala Ilam Ex...NO1 Top Black Magic Specialist In Lahore Black magic In Pakistan Kala Ilam Ex...
NO1 Top Black Magic Specialist In Lahore Black magic In Pakistan Kala Ilam Ex...
 
How to setup Pycharm environment for Odoo 17.pptx
How to setup Pycharm environment for Odoo 17.pptxHow to setup Pycharm environment for Odoo 17.pptx
How to setup Pycharm environment for Odoo 17.pptx
 
Salient Features of India constitution especially power and functions
Salient Features of India constitution especially power and functionsSalient Features of India constitution especially power and functions
Salient Features of India constitution especially power and functions
 
COMMUNICATING NEGATIVE NEWS - APPROACHES .pptx
COMMUNICATING NEGATIVE NEWS - APPROACHES .pptxCOMMUNICATING NEGATIVE NEWS - APPROACHES .pptx
COMMUNICATING NEGATIVE NEWS - APPROACHES .pptx
 
Jual Obat Aborsi Hongkong ( Asli No.1 ) 085657271886 Obat Penggugur Kandungan...
Jual Obat Aborsi Hongkong ( Asli No.1 ) 085657271886 Obat Penggugur Kandungan...Jual Obat Aborsi Hongkong ( Asli No.1 ) 085657271886 Obat Penggugur Kandungan...
Jual Obat Aborsi Hongkong ( Asli No.1 ) 085657271886 Obat Penggugur Kandungan...
 
SOC 101 Demonstration of Learning Presentation
SOC 101 Demonstration of Learning PresentationSOC 101 Demonstration of Learning Presentation
SOC 101 Demonstration of Learning Presentation
 
TỔNG ÔN TẬP THI VÀO LỚP 10 MÔN TIẾNG ANH NĂM HỌC 2023 - 2024 CÓ ĐÁP ÁN (NGỮ Â...
TỔNG ÔN TẬP THI VÀO LỚP 10 MÔN TIẾNG ANH NĂM HỌC 2023 - 2024 CÓ ĐÁP ÁN (NGỮ Â...TỔNG ÔN TẬP THI VÀO LỚP 10 MÔN TIẾNG ANH NĂM HỌC 2023 - 2024 CÓ ĐÁP ÁN (NGỮ Â...
TỔNG ÔN TẬP THI VÀO LỚP 10 MÔN TIẾNG ANH NĂM HỌC 2023 - 2024 CÓ ĐÁP ÁN (NGỮ Â...
 
Google Gemini An AI Revolution in Education.pptx
Google Gemini An AI Revolution in Education.pptxGoogle Gemini An AI Revolution in Education.pptx
Google Gemini An AI Revolution in Education.pptx
 
How to Create and Manage Wizard in Odoo 17
How to Create and Manage Wizard in Odoo 17How to Create and Manage Wizard in Odoo 17
How to Create and Manage Wizard in Odoo 17
 
Sensory_Experience_and_Emotional_Resonance_in_Gabriel_Okaras_The_Piano_and_Th...
Sensory_Experience_and_Emotional_Resonance_in_Gabriel_Okaras_The_Piano_and_Th...Sensory_Experience_and_Emotional_Resonance_in_Gabriel_Okaras_The_Piano_and_Th...
Sensory_Experience_and_Emotional_Resonance_in_Gabriel_Okaras_The_Piano_and_Th...
 
Wellbeing inclusion and digital dystopias.pptx
Wellbeing inclusion and digital dystopias.pptxWellbeing inclusion and digital dystopias.pptx
Wellbeing inclusion and digital dystopias.pptx
 
Python Notes for mca i year students osmania university.docx
Python Notes for mca i year students osmania university.docxPython Notes for mca i year students osmania university.docx
Python Notes for mca i year students osmania university.docx
 
On_Translating_a_Tamil_Poem_by_A_K_Ramanujan.pptx
On_Translating_a_Tamil_Poem_by_A_K_Ramanujan.pptxOn_Translating_a_Tamil_Poem_by_A_K_Ramanujan.pptx
On_Translating_a_Tamil_Poem_by_A_K_Ramanujan.pptx
 
Towards a code of practice for AI in AT.pptx
Towards a code of practice for AI in AT.pptxTowards a code of practice for AI in AT.pptx
Towards a code of practice for AI in AT.pptx
 
Interdisciplinary_Insights_Data_Collection_Methods.pptx
Interdisciplinary_Insights_Data_Collection_Methods.pptxInterdisciplinary_Insights_Data_Collection_Methods.pptx
Interdisciplinary_Insights_Data_Collection_Methods.pptx
 
FSB Advising Checklist - Orientation 2024
FSB Advising Checklist - Orientation 2024FSB Advising Checklist - Orientation 2024
FSB Advising Checklist - Orientation 2024
 

Security and privacy in cloud computing.pptx

  • 1. SECURITY AND PRIVACY IN CLOUD COMPUTING
  • 2. AGENDA SECURITY AND PRIVACY 2 INTRODUCTION OF CLOUD COMPUTING TYPES OF CLOUD COMPUTING GOOD SECURITY PRACTICES ENSURING PRIVACY TAKEAWAY
  • 3. INTRODUCTION SECURITY AND PRIVACY 3 Cloud computing is on-demand access, via the internet, to computing resources—applications, servers (physical servers and virtual servers), data storage, development tools, networking capabilities, and more—hosted at a remote data centre managed by a cloud services provider (or CSP). The CSP makes these resources available for a monthly subscription fee or bills them according to usage.
  • 4. INTRODUCTION Cloud computing helps in the following: 1. Lower IT costs: Cloud lets you offload some or most of the costs and effort of purchasing, installing, configuring, and managing your own on-premises infrastructure. 2. Improve agility and time-to-value: With cloud, your organization can start using enterprise applications in minutes, instead of waiting weeks or months for IT to respond to a request, purchase and configure supporting hardware, and install software. 3. Scale more easily and cost-effectively: Cloud provides elasticity—instead of purchasing excess capacity that sits unused during slow periods, you can scale capacity up and down in response to spikes and dips in traffic. 4 SECURITY AND PRIVACY
  • 5. TYPES OF CLOUD COMPUTING 1. Public cloud 2. Private cloud 3. Hybrid cloud 4. Multicloud 5. Hybrid multicloud 5 SECURITY AND PRIVACY
  • 6. GOOD SECURITY PRACTICES 1. Protection against internal and external threats Security monitoring services help to improve the effectiveness of the security infrastructure of a customer by actively analysing logs and alerts from infrastructure devices around the clock and in real time. Usually the skills required to maintain the level of service of an organization is very high. 2. Early detection An early detection service detects and reports new security vulnerabilities shortly after they appear. Security vulnerability reports include information on the impact the exploitation of this vulnerability would have on the system or applications previously selected by the company receiving the report. 6 SECURITY AND PRIVACY
  • 7. GOOD SECURITY PRACTICES 3. Vulnerabilities detection and management Vulnerability detection and management enables automated verification and management of the security level of information system. The service performs periodic follow-up of tasks performed by security professional managing information systems security and provides reports that can be used to implement a plan for continuous improvement of the system’s security level. 4. Intervention, forensics, and help desk services Quick intervention when a threat is detected is crucial to mitigating the effects of a thread. This requires security engineers with ample knowledge in the various technologies and with the ability to support applications as well as infrastructures 7 SECURITY AND PRIVACY
  • 8. ENSURING PRIVACY Privacy protection in cloud computing environment is less of a technical issue and more of a policy and legal issue. Policies are required to be framed to conform to the legal framework protecting the privacy of individuals and organization. Policies have to empower people to control the collections, use, and distribution of their personal information. 8 SECURITY AND PRIVACY
  • 9. 7 PRINCIPLES OF PRIVACY PROTECTION  Notice: individuals must be informed that data is being collected and about how it will be used.  Choice: individuals must have the ability to opt out of the collection and forward transfer of data to third parties.  Onward transfer: transfer of data third parties may only occur to other organizations that follow adequate data protection principles.  Security: reasonable efforts must be made to prevent loss of collected information. 9 SECURITY AND PRIVACY
  • 10. 7 PRINCIPLES OF PRIVACY PROTECTION  Data integrity: data must be relevant and reliable for the purpose it was collected for.  Access: individuals must be able to access information held about them, and correct or delete it if it is inaccurate.  Enforcement: there must be effective means of enforcing these rules. 1 0 SECURITY AND PRIVACY
  • 11. SECURITY VS PRIVACY SECURITY • Protects data • Keeps you safe from potential threats. • Long been deemed essential PRIVACY • Involves how data is used and controlled. • Refers to details about you directly and how you wish to share them. • Considered a luxury and not for everyone. 1 1 SECURITY AND PRIVACY
  • 12. SUMMARY SECURITY AND PRIVACY 1 2 Cloud computing is the on-demand delivery of it resources over the internet with pay-as-you-go pricing. Cloud security is a collection of procedures and technology designed to address external and internal threats to business security. Cloud privacy is the concept of sharing data while protecting certain personal information.