Topic
Cloud Computing
+
Security
Presented by:
Awais Mansoor
Topic 1
Cloud Computing
Cloud Computing
 “The use of computing recourses (hardware
and software) that are delivered as a services
over a network”
Models of Cloud Computing
 1. Infrastructure as a service
(IAAS)
 2. Platform as a service (PAAS)
 3. Software as a service (SAAS):
Diagram
1. Infrastructure as a service
(IAAS)
 Providing resources (memory, processing) as
a service to the requesters is called
Infrastructure as a service.
 Here cloud service providers only provide
infrastructure while users have to their own
OS + Software.
 For Example In hotel we take a hall and pay
it, Decoration + Catering to guest our own.
2. Platform as a service (PAAS)
 Providing environment or platform OS along
with Infrastructure, as a service to the
requesters is called as a Platform as a
service.
 Here user have only a software.
 Example In hotel we take a marriage hall +
decoration we pay and catering to guest our
own.
3.Software as a services (SAAS):  
 Providing ready made software's along with
infrastructure + platform OS to requesters as
a service is called a Software as a service.
 Here user have all services Infrastructure +
OS + Software
 Example In hotel we take a marriage hall,
they also provide us decoration + catering we
only pay on it.
Advantages
 Convenience. You can access your data
anywhere you can connect to the Internet.
 Backups. You have a backup of your data
in case your local computer crashes.
 Collaboration. With your permission,
others can access, view, and modify your
documents.
Disadvantages
 Storage limits. While your local hard drive may be
able to hold 500GB or more of data, unfortunately a
remote server may only allow you to freely store
about 5GB. If you want more room, you’ll have to
pay.
 Security breaches. Remember, I said that remote
server security makes it harder, but not impossible,
for hackers to reach your data. If there is a
compromise of the server's) where your data is
stored, your personal information may be exposed to
the world.
 Slow speeds. Uploading and downloading of large
documents may take a long time.
Topic 2
Security
Security
 The Security Problem
 Program Threats
 System and Network Threats
 Implementing Security Defenses
The Security ProblemThe Security Problem
 Security must consider external environment
of the system, and protect the system
resources
 Intruders (crackers) attempt to breach
security
 Threat is potential security violation
 Attack is attempt to breach security
 Attack can be accidental or malicious
 Easier to protect against accidental than
malicious misuse
Security ViolationsSecurity Violations
 Categories
 Breach of confidentiality
 Breach of integrity
 Breach of availability
 Theft of service
 Denial of service
 Methods
 Masquerading (breach authentication)
 Replay attack

Message modification
 Man-in-the-middle attack
 Session hijacking
Standard Security AttacksStandard Security Attacks
Program ThreatsProgram Threats
 Trojan Horse
 Code segment that misuses its environment
 Exploits mechanisms for allowing programs written by users to be
executed by other users
 Spy ware, pop-up browser windows, covert channels
 Trap Door
 Specific user identifier or password that circumvents normal
security procedures
 Could be included in a compiler
 Logic Bomb
 Program that initiates a security incident under certain
circumstances
 Stack and Buffer Overflow
 Exploits a bug in a program (overflow either the stack or memory
buffers)
Program Threats (Cont.)Program Threats (Cont.)
 Viruses
 Code fragment embedded in legitimate program
 Very specific to CPU architecture, operating
system, applications
 Usually borne via email or as a macro
System and Network ThreatsSystem and Network Threats
 Worms – use spawn mechanism; standalone program
 Internet worm
 Exploited UNIX networking features (remote access) and
bugs in finger and sendmail programs
 Grappling hook program uploaded main worm program
 Port scanning
 Automated attempt to connect to a range of ports on one or
a range of IP addresses
 Denial of Service
 Overload the targeted computer preventing it from doing any
useful work
 Distributed denial-of-service (DDOS) come from multiple
sites at once
Implementing SecurityImplementing Security
DefensesDefenses
 Defense in depth is most common security theory – multiple layers
of security
 Security policy describes what is being secured
 Vulnerability assessment compares real state of system / network
compared to security policy
 Intrusion detection endeavors to detect attempted or successful
intrusions
 Signature-based detection spots known bad patterns
 Anomaly detection spots differences from normal behavior

Can detect zero-day attacks
 False-positives and false-negatives a problem
 Virus protection
 Auditing, accounting, and logging of all or specific system or network
activities
Fire walling to ProtectFire walling to Protect
Systems and NetworksSystems and Networks
 A network firewall is placed between trusted and untrusted hosts
 The firewall limits network access between these two security
domains
 Can be tunneled or spoofed
 Tunneling allows disallowed protocol to travel within allowed
protocol (i.e. telnet inside of HTTP)
 Firewall rules typically based on host name or IP address which can
be spoofed
 Personal firewall is software layer on given host
 Can monitor / limit traffic to and from the host
 Application proxy firewall understands application protocol and can
control them (i.e. SMTP)
 System-call firewall monitors all important system calls and apply
rules to them (i.e. this program can execute that system call)
Cloud Computing & Security
The End

More Related Content

ODP
Cloud Computing
PPTX
Cloud Computing Security
PPTX
Cloud deployment models
PPTX
Cloud computing
PDF
Cloud Deployment Models
PPT
Cloud Computing & Security Concerns
PPTX
Cloud computing architecture
Cloud Computing
Cloud Computing Security
Cloud deployment models
Cloud computing
Cloud Deployment Models
Cloud Computing & Security Concerns
Cloud computing architecture

What's hot (20)

PPTX
Debunking common cloud hosting myths
PPTX
Cloud computing security
PDF
AWS Cloud | Public Cloud | Private Cloud | Google Cloud Hosting
ODP
Cloud computing
PDF
Cloud Computing Architecture
PDF
PPTX
Cloud computing
PPTX
Data Confidentiality in Cloud Computing
PPTX
Cloud Computing
PDF
Cloud computing
PPTX
Cloud computing presentation
PPT
Cloud deployment models
PPT
Cloud computing security
PPSX
Key Challenges In CLOUD COMPUTING
PPT
What Everyone Ought To Know About Cloud Security
PPTX
Introduction to cloud Computing
PPT
Cloud Computing - Security Benefits and Risks
PPT
Cloud Computing and the Datacenter of the Future
PDF
A Seminar on Cloud Computing
PPTX
Cloud computing security
Debunking common cloud hosting myths
Cloud computing security
AWS Cloud | Public Cloud | Private Cloud | Google Cloud Hosting
Cloud computing
Cloud Computing Architecture
Cloud computing
Data Confidentiality in Cloud Computing
Cloud Computing
Cloud computing
Cloud computing presentation
Cloud deployment models
Cloud computing security
Key Challenges In CLOUD COMPUTING
What Everyone Ought To Know About Cloud Security
Introduction to cloud Computing
Cloud Computing - Security Benefits and Risks
Cloud Computing and the Datacenter of the Future
A Seminar on Cloud Computing
Cloud computing security
Ad

Viewers also liked (19)

PPTX
Cloud Computing Security
PPTX
Working in the Cloud: An Overview
PDF
Cloud Computing and Security - ISACA Hyderabad Chapter Presentation
PPT
Cloud Computing - Benefits and Risks
PPTX
Security in Cloud Computing
PPT
Security Issues of Cloud Computing
PPTX
Green cloud computing
PPTX
Mobile Cloud Computing Challenges and Security
PPTX
I'm Cloud Confused!
PPT
Cloud Computing Security Issues
PPTX
Cloud Computing by AGDMOUN Khalid
PPTX
Cloud security ppt
PPTX
Cloud computing security issues and challenges
PDF
Green Cloud Computing
PDF
Cloud computing Basics
PPTX
Microsoft Cloud Computing - Windows Azure Platform
PPT
Cloud computing ppt
PPT
Cloud computing simple ppt
PPTX
Introduction of Cloud computing
Cloud Computing Security
Working in the Cloud: An Overview
Cloud Computing and Security - ISACA Hyderabad Chapter Presentation
Cloud Computing - Benefits and Risks
Security in Cloud Computing
Security Issues of Cloud Computing
Green cloud computing
Mobile Cloud Computing Challenges and Security
I'm Cloud Confused!
Cloud Computing Security Issues
Cloud Computing by AGDMOUN Khalid
Cloud security ppt
Cloud computing security issues and challenges
Green Cloud Computing
Cloud computing Basics
Microsoft Cloud Computing - Windows Azure Platform
Cloud computing ppt
Cloud computing simple ppt
Introduction of Cloud computing
Ad

Similar to Cloud Computing & Security (20)

PPTX
Chapter 12 - Securing a Network CompTIA Network+
PPT
Essentials Of Security
 
PDF
Module 3.Infrastructure and Network Security:
PPTX
Honeypots for Cloud Providers - SDN World Congress
DOCX
PROJECT REPORT.docx
PPT
New internet security
PPT
NewIinternet security
PPT
Ne Course Part Two
PPTX
امن نظم المعلومات وامن الشبكات
DOCX
Network security
DOCX
CMST&210 Pillow talk Position 1 Why do you think you may.docx
DOCX
Running head Assignment 1 Identifying Potential Malicious Attack.docx
PDF
CLOUD & ETHICAL HACKING INTRODUCTION PDF
PDF
Information Security Lecture Notes
PDF
Linux Security best Practices with Fedora
PPT
Chapter 4.ppt
PDF
Network Security Fundamentals
PDF
Intercept product
Chapter 12 - Securing a Network CompTIA Network+
Essentials Of Security
 
Module 3.Infrastructure and Network Security:
Honeypots for Cloud Providers - SDN World Congress
PROJECT REPORT.docx
New internet security
NewIinternet security
Ne Course Part Two
امن نظم المعلومات وامن الشبكات
Network security
CMST&210 Pillow talk Position 1 Why do you think you may.docx
Running head Assignment 1 Identifying Potential Malicious Attack.docx
CLOUD & ETHICAL HACKING INTRODUCTION PDF
Information Security Lecture Notes
Linux Security best Practices with Fedora
Chapter 4.ppt
Network Security Fundamentals
Intercept product

Recently uploaded (20)

PPTX
Thinking Routines and Learning Engagements.pptx
PDF
Civil Department's presentation Your score increases as you pick a category
PDF
Myanmar Dental Journal, The Journal of the Myanmar Dental Association (2015).pdf
PDF
Journal of Dental Science - UDMY (2021).pdf
PDF
fundamentals-of-heat-and-mass-transfer-6th-edition_incropera.pdf
PDF
Disorder of Endocrine system (1).pdfyyhyyyy
PPT
REGULATION OF RESPIRATION lecture note 200L [Autosaved]-1-1.ppt
PPTX
ELIAS-SEZIURE AND EPilepsy semmioan session.pptx
PDF
1.Salivary gland disease.pdf 3.Bleeding and Clotting Disorders.pdf important
PDF
plant tissues class 6-7 mcqs chatgpt.pdf
PDF
MA in English at Shiv Nadar University – Advanced Literature, Language & Rese...
PDF
LEARNERS WITH ADDITIONAL NEEDS ProfEd Topic
PDF
Comprehensive Lecture on the Appendix.pdf
PPTX
Module on health assessment of CHN. pptx
PDF
Skin Care and Cosmetic Ingredients Dictionary ( PDFDrive ).pdf
PDF
MBA _Common_ 2nd year Syllabus _2021-22_.pdf
PPTX
What’s under the hood: Parsing standardized learning content for AI
PDF
Compact First Student's Book Cambridge Official
PDF
MICROENCAPSULATION_NDDS_BPHARMACY__SEM VII_PCI Syllabus.pdf
PPTX
Integrated Management of Neonatal and Childhood Illnesses (IMNCI) – Unit IV |...
Thinking Routines and Learning Engagements.pptx
Civil Department's presentation Your score increases as you pick a category
Myanmar Dental Journal, The Journal of the Myanmar Dental Association (2015).pdf
Journal of Dental Science - UDMY (2021).pdf
fundamentals-of-heat-and-mass-transfer-6th-edition_incropera.pdf
Disorder of Endocrine system (1).pdfyyhyyyy
REGULATION OF RESPIRATION lecture note 200L [Autosaved]-1-1.ppt
ELIAS-SEZIURE AND EPilepsy semmioan session.pptx
1.Salivary gland disease.pdf 3.Bleeding and Clotting Disorders.pdf important
plant tissues class 6-7 mcqs chatgpt.pdf
MA in English at Shiv Nadar University – Advanced Literature, Language & Rese...
LEARNERS WITH ADDITIONAL NEEDS ProfEd Topic
Comprehensive Lecture on the Appendix.pdf
Module on health assessment of CHN. pptx
Skin Care and Cosmetic Ingredients Dictionary ( PDFDrive ).pdf
MBA _Common_ 2nd year Syllabus _2021-22_.pdf
What’s under the hood: Parsing standardized learning content for AI
Compact First Student's Book Cambridge Official
MICROENCAPSULATION_NDDS_BPHARMACY__SEM VII_PCI Syllabus.pdf
Integrated Management of Neonatal and Childhood Illnesses (IMNCI) – Unit IV |...

Cloud Computing & Security

  • 4. Cloud Computing  “The use of computing recourses (hardware and software) that are delivered as a services over a network”
  • 5. Models of Cloud Computing  1. Infrastructure as a service (IAAS)  2. Platform as a service (PAAS)  3. Software as a service (SAAS):
  • 7. 1. Infrastructure as a service (IAAS)  Providing resources (memory, processing) as a service to the requesters is called Infrastructure as a service.  Here cloud service providers only provide infrastructure while users have to their own OS + Software.  For Example In hotel we take a hall and pay it, Decoration + Catering to guest our own.
  • 8. 2. Platform as a service (PAAS)  Providing environment or platform OS along with Infrastructure, as a service to the requesters is called as a Platform as a service.  Here user have only a software.  Example In hotel we take a marriage hall + decoration we pay and catering to guest our own.
  • 9. 3.Software as a services (SAAS):    Providing ready made software's along with infrastructure + platform OS to requesters as a service is called a Software as a service.  Here user have all services Infrastructure + OS + Software  Example In hotel we take a marriage hall, they also provide us decoration + catering we only pay on it.
  • 10. Advantages  Convenience. You can access your data anywhere you can connect to the Internet.  Backups. You have a backup of your data in case your local computer crashes.  Collaboration. With your permission, others can access, view, and modify your documents.
  • 11. Disadvantages  Storage limits. While your local hard drive may be able to hold 500GB or more of data, unfortunately a remote server may only allow you to freely store about 5GB. If you want more room, you’ll have to pay.  Security breaches. Remember, I said that remote server security makes it harder, but not impossible, for hackers to reach your data. If there is a compromise of the server's) where your data is stored, your personal information may be exposed to the world.  Slow speeds. Uploading and downloading of large documents may take a long time.
  • 13. Security  The Security Problem  Program Threats  System and Network Threats  Implementing Security Defenses
  • 14. The Security ProblemThe Security Problem  Security must consider external environment of the system, and protect the system resources  Intruders (crackers) attempt to breach security  Threat is potential security violation  Attack is attempt to breach security  Attack can be accidental or malicious  Easier to protect against accidental than malicious misuse
  • 15. Security ViolationsSecurity Violations  Categories  Breach of confidentiality  Breach of integrity  Breach of availability  Theft of service  Denial of service  Methods  Masquerading (breach authentication)  Replay attack  Message modification  Man-in-the-middle attack  Session hijacking
  • 17. Program ThreatsProgram Threats  Trojan Horse  Code segment that misuses its environment  Exploits mechanisms for allowing programs written by users to be executed by other users  Spy ware, pop-up browser windows, covert channels  Trap Door  Specific user identifier or password that circumvents normal security procedures  Could be included in a compiler  Logic Bomb  Program that initiates a security incident under certain circumstances  Stack and Buffer Overflow  Exploits a bug in a program (overflow either the stack or memory buffers)
  • 18. Program Threats (Cont.)Program Threats (Cont.)  Viruses  Code fragment embedded in legitimate program  Very specific to CPU architecture, operating system, applications  Usually borne via email or as a macro
  • 19. System and Network ThreatsSystem and Network Threats  Worms – use spawn mechanism; standalone program  Internet worm  Exploited UNIX networking features (remote access) and bugs in finger and sendmail programs  Grappling hook program uploaded main worm program  Port scanning  Automated attempt to connect to a range of ports on one or a range of IP addresses  Denial of Service  Overload the targeted computer preventing it from doing any useful work  Distributed denial-of-service (DDOS) come from multiple sites at once
  • 20. Implementing SecurityImplementing Security DefensesDefenses  Defense in depth is most common security theory – multiple layers of security  Security policy describes what is being secured  Vulnerability assessment compares real state of system / network compared to security policy  Intrusion detection endeavors to detect attempted or successful intrusions  Signature-based detection spots known bad patterns  Anomaly detection spots differences from normal behavior  Can detect zero-day attacks  False-positives and false-negatives a problem  Virus protection  Auditing, accounting, and logging of all or specific system or network activities
  • 21. Fire walling to ProtectFire walling to Protect Systems and NetworksSystems and Networks  A network firewall is placed between trusted and untrusted hosts  The firewall limits network access between these two security domains  Can be tunneled or spoofed  Tunneling allows disallowed protocol to travel within allowed protocol (i.e. telnet inside of HTTP)  Firewall rules typically based on host name or IP address which can be spoofed  Personal firewall is software layer on given host  Can monitor / limit traffic to and from the host  Application proxy firewall understands application protocol and can control them (i.e. SMTP)  System-call firewall monitors all important system calls and apply rules to them (i.e. this program can execute that system call)