4. Highly fragmented market
Lack of sufficient standards
Data lock-in
Security threats
Service outedges
5.
6. 1. Select the Right Apps for the Public
Cloud.
2. Evaluate and Add Security, If Necessary
3. Identify and Use the Right Third-Party
Auditing Services
4. Add Authentication Layers
5. Consider How Additional Security Will
Affect Integration
6.IDS
7. Definition
An IDS is a software or hardware based system that
monitors network traffic and monitors for
suspicious activity and alerts the system or network
administrator
Types
1. Host-Based Intrusion Detection
system (HIDS)
2. Network-Based Intrusion Detection
system (NIDS)
10. Snort is an example of an IDS
Snort is a very flexible network IDS that has
a large set of preconfigured rules. It also
allows you to write your own rule set
Functions:
1. It can serve as a packet sniffer
2. It can work as a packet logger
3. It can work as a NIDS
10
11. Run unattended for extended
periods of time
Stay active and secure
Recognize unusual activity
Operate without unduly affecting
the system’s activity
Configurable
11