2
Most read
3
Most read
4
Most read
Course : Virtualization and Cloud Computing
Course Code : CSE423
Presented by :
Rishi Sharma, 12003011
A REVIEW OF THE SECURITY ISSUES IN CLOUD
COMPUTING AND ITS REMEDIAL ACTIONS
Introduction-
Cloud computing has changed the way organizations manage data by storing it on
remote servers, leading to cost savings and better accessibility. However, security
concerns have arisen due to the increasing reliance on cloud computing. This
presentation examines various security issues in cloud computing.
And suggests measures to improve security and privacy. It also emphasizes the
importance of addressing security concerns to protect the privacy, integrity, and
availability of organizational data.
Security Risks in Cloud Computing
There are multiple security threats that can negatively affect the
organization’s data. Below are some of the most prevalent security risks
associated with cloud computing:
 Data Breaches
 Insider Threats
 Third Party Risks
Data Breaches :- A data breach in cloud computing refers to the unauthorized access of sensitive
information stored in a cloud-based system. It can occur due to various reasons, such as weak
passwords, inadequate encryption, or human error. The consequences of a data breach can be
severe, including financial loss, damage to reputation, and legal consequences.
Insider Threats:- It refers to the risks posed by employees, contractors, or other insiders who have
authorized access to a cloud-based system. These insiders can intentionally or unintentionally misuse
their privileges and compromise sensitive data stored in the cloud. Examples of insider threats in
cloud computing include employees accessing data outside their job responsibilities, sharing login
credentials with unauthorized individuals, etc
Third-party risks :- It refers to the security risks that arise due to the involvement of third-party
service providers, such as cloud hosting providers or software vendors. The security of the cloud-
based system depends on the security practices of these third-party providers. If the providers are
not following adequate security measures, it can compromise the security of the entire system.
Remedial Actions
Organizations can take several remedial actions to abate security issues in cloud
computing. The following are some of the most effective remedial actions:
 Encryption
 Access Controls
 Regular Audits
 Disaster Recovery
Encryption:- Data encryption in cloud computing refers to the process of converting plain text data
into an unreadable format using cryptographic algorithms. It is an essential security measure that
helps protect sensitive data stored in the cloud from unauthorized access like
encrypting sensitive financial data such as credit card numbers.
Access Controls:- Access controls in cloud computing refer to the methods used to manage and
restrict access to cloud-based resources, applications, and data. Access controls ensure that only
authorized users can access the resources and perform specific actions, thereby reducing the risk
of data breaches and insider threats.
Regular Audits:- Regular audits in cloud computing refer to the periodic assessments of cloud-
based systems to ensure compliance with security policies and regulations. Audits help identify
security vulnerabilities, ensure proper access controls and encryption, and assess the
effectiveness of disaster recovery plans.
Disaster Recovery:- It refers to the process of restoring the availability and functionality of cloud-based
systems in the event of a natural or human-made disaster. Cloud-based disaster recovery solutions offer
improved scalability, reliability, and cost-effectiveness compared to traditional disaster recovery methods.
Conclusion
Cloud computing is a popular way for organizations to store and manage data,
but it also presents new security challenges. The security risks such as data
breaches, insider threats, and third-party risks can compromise sensitive
information. To address these issues, organizations must implement security
measures.
Failing to address these concerns can lead to severe consequences, including the
loss of privacy of integrity of data. Therefore, it is crucial for organizations to
prioritize security measures in cloud computing to keep their data safe.

More Related Content

PDF
Cloud Security Challenges, Types, and Best Practises.pdf
PDF
Cyber Security in Cloud Computing: Challenges and Solutions
PDF
A Comprehensive Guide to Cloud Computing Security | CyberPro Magazine
PPTX
Risk mitigation of cloud computing .pptx
PDF
Cyber Cops: CloudSecurity - Safeguarding Data in the Cloud
PDF
Understanding Cloud Network Security Protecting Your Data in the Cloud
PDF
Security and Privacy Issues of Cloud Computing; Solutions and Secure Framework
PDF
Cloud Security Risks Challenges and Preventive Solutions - DigitDefence
Cloud Security Challenges, Types, and Best Practises.pdf
Cyber Security in Cloud Computing: Challenges and Solutions
A Comprehensive Guide to Cloud Computing Security | CyberPro Magazine
Risk mitigation of cloud computing .pptx
Cyber Cops: CloudSecurity - Safeguarding Data in the Cloud
Understanding Cloud Network Security Protecting Your Data in the Cloud
Security and Privacy Issues of Cloud Computing; Solutions and Secure Framework
Cloud Security Risks Challenges and Preventive Solutions - DigitDefence

Similar to Security issues in cloud computing.pptx (20)

PDF
IRJET- Security Concern: Analysis of Cloud Security Mechanism
PDF
Cloud Computing Security - Cloud Controls Security
PDF
Data Storage Issues in Cloud Computing
PDF
Top 5 Cloud Security Threats in 2025 and Ways to Avoid Them
PDF
Cloud_security_v2_chpater_9_s_version.pdf
PDF
N017259396
PDF
Internal & External Attacks in cloud computing Environment from confidentiali...
PDF
Cloud Application Security Best Practices To follow.pdf
PDF
Cloud Application Security Best Practices To follow.pdf
PDF
Introduction to Cloud Security Tools (1).pptx.pdf
PDF
All You Need to Know About 5 Biggest Cloud Security Risks and How One Can Avo...
PDF
Understanding the Essentials of Cloud Security
PPTX
the_role_of_resilience_data_in_ensuring_cloud_security.pptx
PDF
the_role_of_resilience_data_in_ensuring_cloud_security.pdf
PPTX
The Top Cloud Security Issues
PDF
Cloud Security - Types, Common Threats & Tips To Mitigate.pdf
PDF
Introduction to Cloud Computing Issues download
PPTX
What Are the Security Risks of Cloud Computing.pptx
PPTX
What Are the Security Risks of Cloud Computing.pptx
PPTX
Chapter_5_Security_CC.pptx
IRJET- Security Concern: Analysis of Cloud Security Mechanism
Cloud Computing Security - Cloud Controls Security
Data Storage Issues in Cloud Computing
Top 5 Cloud Security Threats in 2025 and Ways to Avoid Them
Cloud_security_v2_chpater_9_s_version.pdf
N017259396
Internal & External Attacks in cloud computing Environment from confidentiali...
Cloud Application Security Best Practices To follow.pdf
Cloud Application Security Best Practices To follow.pdf
Introduction to Cloud Security Tools (1).pptx.pdf
All You Need to Know About 5 Biggest Cloud Security Risks and How One Can Avo...
Understanding the Essentials of Cloud Security
the_role_of_resilience_data_in_ensuring_cloud_security.pptx
the_role_of_resilience_data_in_ensuring_cloud_security.pdf
The Top Cloud Security Issues
Cloud Security - Types, Common Threats & Tips To Mitigate.pdf
Introduction to Cloud Computing Issues download
What Are the Security Risks of Cloud Computing.pptx
What Are the Security Risks of Cloud Computing.pptx
Chapter_5_Security_CC.pptx
Ad

Recently uploaded (20)

PDF
Skin Care and Cosmetic Ingredients Dictionary ( PDFDrive ).pdf
PDF
Journal of Dental Science - UDMY (2020).pdf
PDF
Everyday Spelling and Grammar by Kathi Wyldeck
DOCX
Ibrahim Suliman Mukhtar CV5AUG2025.docx
PPTX
ACFE CERTIFICATION TRAINING ON LAW.pptx
PDF
Nurlina - Urban Planner Portfolio (english ver)
PPTX
CAPACITY BUILDING PROGRAMME IN ADOLESCENT EDUCATION
PDF
Controlled Drug Delivery System-NDDS UNIT-1 B.Pharm 7th sem
PDF
LIFE & LIVING TRILOGY- PART (1) WHO ARE WE.pdf
PDF
Journal of Dental Science - UDMY (2021).pdf
PDF
THE CHILD AND ADOLESCENT LEARNERS & LEARNING PRINCIPLES
PDF
The TKT Course. Modules 1, 2, 3.for self study
PDF
Civil Department's presentation Your score increases as you pick a category
PDF
0520_Scheme_of_Work_(for_examination_from_2021).pdf
PPTX
Integrated Management of Neonatal and Childhood Illnesses (IMNCI) – Unit IV |...
PPTX
Macbeth play - analysis .pptx english lit
PPTX
Thinking Routines and Learning Engagements.pptx
PDF
Environmental Education MCQ BD2EE - Share Source.pdf
PDF
PUBH1000 - Module 6: Global Health Tute Slides
PPTX
Climate Change and Its Global Impact.pptx
Skin Care and Cosmetic Ingredients Dictionary ( PDFDrive ).pdf
Journal of Dental Science - UDMY (2020).pdf
Everyday Spelling and Grammar by Kathi Wyldeck
Ibrahim Suliman Mukhtar CV5AUG2025.docx
ACFE CERTIFICATION TRAINING ON LAW.pptx
Nurlina - Urban Planner Portfolio (english ver)
CAPACITY BUILDING PROGRAMME IN ADOLESCENT EDUCATION
Controlled Drug Delivery System-NDDS UNIT-1 B.Pharm 7th sem
LIFE & LIVING TRILOGY- PART (1) WHO ARE WE.pdf
Journal of Dental Science - UDMY (2021).pdf
THE CHILD AND ADOLESCENT LEARNERS & LEARNING PRINCIPLES
The TKT Course. Modules 1, 2, 3.for self study
Civil Department's presentation Your score increases as you pick a category
0520_Scheme_of_Work_(for_examination_from_2021).pdf
Integrated Management of Neonatal and Childhood Illnesses (IMNCI) – Unit IV |...
Macbeth play - analysis .pptx english lit
Thinking Routines and Learning Engagements.pptx
Environmental Education MCQ BD2EE - Share Source.pdf
PUBH1000 - Module 6: Global Health Tute Slides
Climate Change and Its Global Impact.pptx
Ad

Security issues in cloud computing.pptx

  • 1. Course : Virtualization and Cloud Computing Course Code : CSE423 Presented by : Rishi Sharma, 12003011 A REVIEW OF THE SECURITY ISSUES IN CLOUD COMPUTING AND ITS REMEDIAL ACTIONS
  • 2. Introduction- Cloud computing has changed the way organizations manage data by storing it on remote servers, leading to cost savings and better accessibility. However, security concerns have arisen due to the increasing reliance on cloud computing. This presentation examines various security issues in cloud computing. And suggests measures to improve security and privacy. It also emphasizes the importance of addressing security concerns to protect the privacy, integrity, and availability of organizational data.
  • 3. Security Risks in Cloud Computing There are multiple security threats that can negatively affect the organization’s data. Below are some of the most prevalent security risks associated with cloud computing:  Data Breaches  Insider Threats  Third Party Risks
  • 4. Data Breaches :- A data breach in cloud computing refers to the unauthorized access of sensitive information stored in a cloud-based system. It can occur due to various reasons, such as weak passwords, inadequate encryption, or human error. The consequences of a data breach can be severe, including financial loss, damage to reputation, and legal consequences. Insider Threats:- It refers to the risks posed by employees, contractors, or other insiders who have authorized access to a cloud-based system. These insiders can intentionally or unintentionally misuse their privileges and compromise sensitive data stored in the cloud. Examples of insider threats in cloud computing include employees accessing data outside their job responsibilities, sharing login credentials with unauthorized individuals, etc Third-party risks :- It refers to the security risks that arise due to the involvement of third-party service providers, such as cloud hosting providers or software vendors. The security of the cloud- based system depends on the security practices of these third-party providers. If the providers are not following adequate security measures, it can compromise the security of the entire system.
  • 5. Remedial Actions Organizations can take several remedial actions to abate security issues in cloud computing. The following are some of the most effective remedial actions:  Encryption  Access Controls  Regular Audits  Disaster Recovery
  • 6. Encryption:- Data encryption in cloud computing refers to the process of converting plain text data into an unreadable format using cryptographic algorithms. It is an essential security measure that helps protect sensitive data stored in the cloud from unauthorized access like encrypting sensitive financial data such as credit card numbers. Access Controls:- Access controls in cloud computing refer to the methods used to manage and restrict access to cloud-based resources, applications, and data. Access controls ensure that only authorized users can access the resources and perform specific actions, thereby reducing the risk of data breaches and insider threats. Regular Audits:- Regular audits in cloud computing refer to the periodic assessments of cloud- based systems to ensure compliance with security policies and regulations. Audits help identify security vulnerabilities, ensure proper access controls and encryption, and assess the effectiveness of disaster recovery plans. Disaster Recovery:- It refers to the process of restoring the availability and functionality of cloud-based systems in the event of a natural or human-made disaster. Cloud-based disaster recovery solutions offer improved scalability, reliability, and cost-effectiveness compared to traditional disaster recovery methods.
  • 7. Conclusion Cloud computing is a popular way for organizations to store and manage data, but it also presents new security challenges. The security risks such as data breaches, insider threats, and third-party risks can compromise sensitive information. To address these issues, organizations must implement security measures. Failing to address these concerns can lead to severe consequences, including the loss of privacy of integrity of data. Therefore, it is crucial for organizations to prioritize security measures in cloud computing to keep their data safe.