Cloud computing security

13
CLOUD COMPUTING SECURITY Presented By: Ms Mamta

description

 

Transcript of Cloud computing security

Page 1: Cloud computing security

CLOUD COMPUTING SECURITY

Presented By:

Ms Mamta

Page 2: Cloud computing security

Introduction

Cloud computing is a type of computing that relies on sharing computing resources rather than having local servers or personal devices to handle applications.

In cloud computing, the word cloud(also phrased as "the cloud") is used as a metaphor for "the Internet," so the phrase cloud computing means "a type of Internet-based computing," where different services — such as servers, storage and applications —are delivered to an organization's computers and devices through the Internet.

Page 3: Cloud computing security

Cloud computing security also known as Cloud Security.

It refers to a broad set of policies, technologies, and controls deployed to protect data, applications, and the associated infrastructure of  cloud computing .

Page 4: Cloud computing security

Security issues associated with the cloud

1.Security issues faced by cloud providers

2.Security issues faced by their customers

Page 5: Cloud computing security

Concept of Virtualization

The extensive use of virtualization in implementing cloud infrastructure brings unique security concerns for customers or tenants of a public cloud service

Virtualization alters the relationship between the OS and underlying hardware , be it computing, storage or even networking.

Page 6: Cloud computing security
Page 7: Cloud computing security

Types of Cloud

1. Internal Cloud An internal cloud is a cloud computing

service model that is implemented within an organization's dedicated resources and infrastructure.

Key Benefits are:

Total cloud securityReduced infrastructure costsReduced hardware requirements

Page 8: Cloud computing security

2. External Cloud

An external cloud is a cloud solution that exists outside of an organization's physical boundaries. It can be private, public or community-based, as long as it is not located on an organization's property.

Page 9: Cloud computing security

Cloud Security Controls

Cloud Security Controls

Deterrent

Controls

Preventive

Controls

Detective

Controls

Corrective

Controls

Page 10: Cloud computing security

Dimensions of cloud security

Correct security controls should be implemented according to asset, threat, and vulnerability risk assessment matrices. While cloud security concerns can be grouped into any number of dimensions these dimensions have been aggregated into following general areas:

Page 11: Cloud computing security

•Security and Privacy•Compliance•Legal issues•Contractual Issues

Page 12: Cloud computing security

Conclusion

Cloud computing offers clear and powerful benefits to IT organizations of all sizes, but the path to cloud computing is often cloudy.With cloud computing, IT resources can scale almost immediately in response to business needs and can be delivered under a predictable (and budget friendly) pay-as-you-go model.

Page 13: Cloud computing security

THANK YOU