SlideShare a Scribd company logo
Topic
Cloud Computing
+
Security
Presented by:
Awais Mansoor
Topic 1
Cloud Computing
Cloud Computing
 “The use of computing recourses (hardware
and software) that are delivered as a services
over a network”
Models of Cloud Computing
 1. Infrastructure as a service
(IAAS)
 2. Platform as a service (PAAS)
 3. Software as a service (SAAS):
Diagram
1. Infrastructure as a service
(IAAS)
 Providing resources (memory, processing) as
a service to the requesters is called
Infrastructure as a service.
 Here cloud service providers only provide
infrastructure while users have to their own
OS + Software.
 For Example In hotel we take a hall and pay
it, Decoration + Catering to guest our own.
2. Platform as a service (PAAS)
 Providing environment or platform OS along
with Infrastructure, as a service to the
requesters is called as a Platform as a
service.
 Here user have only a software.
 Example In hotel we take a marriage hall +
decoration we pay and catering to guest our
own.
3.Software as a services (SAAS):  
 Providing ready made software's along with
infrastructure + platform OS to requesters as
a service is called a Software as a service.
 Here user have all services Infrastructure +
OS + Software
 Example In hotel we take a marriage hall,
they also provide us decoration + catering we
only pay on it.
Advantages
 Convenience. You can access your data
anywhere you can connect to the Internet.
 Backups. You have a backup of your data
in case your local computer crashes.
 Collaboration. With your permission,
others can access, view, and modify your
documents.
Disadvantages
 Storage limits. While your local hard drive may be
able to hold 500GB or more of data, unfortunately a
remote server may only allow you to freely store
about 5GB. If you want more room, you’ll have to
pay.
 Security breaches. Remember, I said that remote
server security makes it harder, but not impossible,
for hackers to reach your data. If there is a
compromise of the server's) where your data is
stored, your personal information may be exposed to
the world.
 Slow speeds. Uploading and downloading of large
documents may take a long time.
Topic 2
Security
Security
 The Security Problem
 Program Threats
 System and Network Threats
 Implementing Security Defenses
The Security ProblemThe Security Problem
 Security must consider external environment
of the system, and protect the system
resources
 Intruders (crackers) attempt to breach
security
 Threat is potential security violation
 Attack is attempt to breach security
 Attack can be accidental or malicious
 Easier to protect against accidental than
malicious misuse
Security ViolationsSecurity Violations
 Categories
 Breach of confidentiality
 Breach of integrity
 Breach of availability
 Theft of service
 Denial of service
 Methods
 Masquerading (breach authentication)
 Replay attack

Message modification
 Man-in-the-middle attack
 Session hijacking
Standard Security AttacksStandard Security Attacks
Program ThreatsProgram Threats
 Trojan Horse
 Code segment that misuses its environment
 Exploits mechanisms for allowing programs written by users to be
executed by other users
 Spy ware, pop-up browser windows, covert channels
 Trap Door
 Specific user identifier or password that circumvents normal
security procedures
 Could be included in a compiler
 Logic Bomb
 Program that initiates a security incident under certain
circumstances
 Stack and Buffer Overflow
 Exploits a bug in a program (overflow either the stack or memory
buffers)
Program Threats (Cont.)Program Threats (Cont.)
 Viruses
 Code fragment embedded in legitimate program
 Very specific to CPU architecture, operating
system, applications
 Usually borne via email or as a macro
System and Network ThreatsSystem and Network Threats
 Worms – use spawn mechanism; standalone program
 Internet worm
 Exploited UNIX networking features (remote access) and
bugs in finger and sendmail programs
 Grappling hook program uploaded main worm program
 Port scanning
 Automated attempt to connect to a range of ports on one or
a range of IP addresses
 Denial of Service
 Overload the targeted computer preventing it from doing any
useful work
 Distributed denial-of-service (DDOS) come from multiple
sites at once
Implementing SecurityImplementing Security
DefensesDefenses
 Defense in depth is most common security theory – multiple layers
of security
 Security policy describes what is being secured
 Vulnerability assessment compares real state of system / network
compared to security policy
 Intrusion detection endeavors to detect attempted or successful
intrusions
 Signature-based detection spots known bad patterns
 Anomaly detection spots differences from normal behavior

Can detect zero-day attacks
 False-positives and false-negatives a problem
 Virus protection
 Auditing, accounting, and logging of all or specific system or network
activities
Fire walling to ProtectFire walling to Protect
Systems and NetworksSystems and Networks
 A network firewall is placed between trusted and untrusted hosts
 The firewall limits network access between these two security
domains
 Can be tunneled or spoofed
 Tunneling allows disallowed protocol to travel within allowed
protocol (i.e. telnet inside of HTTP)
 Firewall rules typically based on host name or IP address which can
be spoofed
 Personal firewall is software layer on given host
 Can monitor / limit traffic to and from the host
 Application proxy firewall understands application protocol and can
control them (i.e. SMTP)
 System-call firewall monitors all important system calls and apply
rules to them (i.e. this program can execute that system call)
Cloud Computing & Security
The End

More Related Content

ODP
Cloud Computing
PPTX
Cloud Computing Security
PPTX
Cloud deployment models
PPTX
Cloud computing
PDF
Cloud Deployment Models
PPT
Cloud Computing & Security Concerns
PPTX
Cloud computing architecture
Cloud Computing
Cloud Computing Security
Cloud deployment models
Cloud computing
Cloud Deployment Models
Cloud Computing & Security Concerns
Cloud computing architecture

What's hot (20)

PPTX
Debunking common cloud hosting myths
PPTX
Cloud computing security
PDF
AWS Cloud | Public Cloud | Private Cloud | Google Cloud Hosting
ODP
Cloud computing
PDF
Cloud Computing Architecture
PDF
PPTX
Cloud computing
PPTX
Data Confidentiality in Cloud Computing
PPTX
Cloud Computing
PDF
Cloud computing
PPTX
Cloud computing presentation
PPT
Cloud deployment models
PPT
Cloud computing security
PPSX
Key Challenges In CLOUD COMPUTING
PPT
What Everyone Ought To Know About Cloud Security
PPTX
Introduction to cloud Computing
PPT
Cloud Computing - Security Benefits and Risks
PPT
Cloud Computing and the Datacenter of the Future
PDF
A Seminar on Cloud Computing
PPTX
Cloud computing security
Debunking common cloud hosting myths
Cloud computing security
AWS Cloud | Public Cloud | Private Cloud | Google Cloud Hosting
Cloud computing
Cloud Computing Architecture
Cloud computing
Data Confidentiality in Cloud Computing
Cloud Computing
Cloud computing
Cloud computing presentation
Cloud deployment models
Cloud computing security
Key Challenges In CLOUD COMPUTING
What Everyone Ought To Know About Cloud Security
Introduction to cloud Computing
Cloud Computing - Security Benefits and Risks
Cloud Computing and the Datacenter of the Future
A Seminar on Cloud Computing
Cloud computing security
Ad

Viewers also liked (19)

PPTX
Cloud Computing Security
PPTX
Working in the Cloud: An Overview
PDF
Cloud Computing and Security - ISACA Hyderabad Chapter Presentation
PPT
Cloud Computing - Benefits and Risks
PPTX
Security in Cloud Computing
PPT
Security Issues of Cloud Computing
PPTX
Green cloud computing
PPTX
Mobile Cloud Computing Challenges and Security
PPTX
I'm Cloud Confused!
PPT
Cloud Computing Security Issues
PPTX
Cloud Computing by AGDMOUN Khalid
PPTX
Cloud security ppt
PPTX
Cloud computing security issues and challenges
PDF
Green Cloud Computing
PDF
Cloud computing Basics
PPTX
Microsoft Cloud Computing - Windows Azure Platform
PPT
Cloud computing ppt
PPT
Cloud computing simple ppt
PPTX
Introduction of Cloud computing
Cloud Computing Security
Working in the Cloud: An Overview
Cloud Computing and Security - ISACA Hyderabad Chapter Presentation
Cloud Computing - Benefits and Risks
Security in Cloud Computing
Security Issues of Cloud Computing
Green cloud computing
Mobile Cloud Computing Challenges and Security
I'm Cloud Confused!
Cloud Computing Security Issues
Cloud Computing by AGDMOUN Khalid
Cloud security ppt
Cloud computing security issues and challenges
Green Cloud Computing
Cloud computing Basics
Microsoft Cloud Computing - Windows Azure Platform
Cloud computing ppt
Cloud computing simple ppt
Introduction of Cloud computing
Ad

Similar to Cloud Computing & Security (20)

PDF
Cloud Security:Threats & Mitgations
PPT
Network security
PPT
Essentials Of Security
 
PDF
Cloud Security Introduction
PDF
COMP 424 Computer System Security Fall 2016
PDF
004_Cybersecurity Fundamentals Network Security.pdf
PPT
Lecture 2
PDF
Lecture26 cc-security1
PDF
Ch14 security
PDF
Cybersecurity Interview Questions and Answers.pdf
PPTX
chapitre1-cloud security basics-23 (1).pptx
PPTX
Web & Cloud Security in the real world
PPT
CyberCrime in the Cloud and How to defend Yourself
PPTX
OpenSouthCode '19 - Application Security Fundamentals [2019-May-25]
PPTX
Security in the cloud Workshop HSTC 2014
PPTX
Security on Cloud Computing
PPT
NewIinternet security
PPTX
chapter1 Introduction to Software Security.pptx
PPT
New internet security
PPTX
Cloud Security.pptx
Cloud Security:Threats & Mitgations
Network security
Essentials Of Security
 
Cloud Security Introduction
COMP 424 Computer System Security Fall 2016
004_Cybersecurity Fundamentals Network Security.pdf
Lecture 2
Lecture26 cc-security1
Ch14 security
Cybersecurity Interview Questions and Answers.pdf
chapitre1-cloud security basics-23 (1).pptx
Web & Cloud Security in the real world
CyberCrime in the Cloud and How to defend Yourself
OpenSouthCode '19 - Application Security Fundamentals [2019-May-25]
Security in the cloud Workshop HSTC 2014
Security on Cloud Computing
NewIinternet security
chapter1 Introduction to Software Security.pptx
New internet security
Cloud Security.pptx

Recently uploaded (20)

PDF
O7-L3 Supply Chain Operations - ICLT Program
PPTX
Introduction to Child Health Nursing – Unit I | Child Health Nursing I | B.Sc...
PPTX
Final Presentation General Medicine 03-08-2024.pptx
PPTX
PPH.pptx obstetrics and gynecology in nursing
PDF
Pre independence Education in Inndia.pdf
PDF
Abdominal Access Techniques with Prof. Dr. R K Mishra
PPTX
Renaissance Architecture: A Journey from Faith to Humanism
PPTX
BOWEL ELIMINATION FACTORS AFFECTING AND TYPES
PDF
Supply Chain Operations Speaking Notes -ICLT Program
PPTX
The Healthy Child – Unit II | Child Health Nursing I | B.Sc Nursing 5th Semester
PPTX
Pharma ospi slides which help in ospi learning
PDF
Anesthesia in Laparoscopic Surgery in India
PDF
Physiotherapy_for_Respiratory_and_Cardiac_Problems WEBBER.pdf
PDF
ANTIBIOTICS.pptx.pdf………………… xxxxxxxxxxxxx
PDF
Origin of periodic table-Mendeleev’s Periodic-Modern Periodic table
PDF
RMMM.pdf make it easy to upload and study
PDF
Basic Mud Logging Guide for educational purpose
PDF
VCE English Exam - Section C Student Revision Booklet
PDF
Module 4: Burden of Disease Tutorial Slides S2 2025
PDF
Classroom Observation Tools for Teachers
O7-L3 Supply Chain Operations - ICLT Program
Introduction to Child Health Nursing – Unit I | Child Health Nursing I | B.Sc...
Final Presentation General Medicine 03-08-2024.pptx
PPH.pptx obstetrics and gynecology in nursing
Pre independence Education in Inndia.pdf
Abdominal Access Techniques with Prof. Dr. R K Mishra
Renaissance Architecture: A Journey from Faith to Humanism
BOWEL ELIMINATION FACTORS AFFECTING AND TYPES
Supply Chain Operations Speaking Notes -ICLT Program
The Healthy Child – Unit II | Child Health Nursing I | B.Sc Nursing 5th Semester
Pharma ospi slides which help in ospi learning
Anesthesia in Laparoscopic Surgery in India
Physiotherapy_for_Respiratory_and_Cardiac_Problems WEBBER.pdf
ANTIBIOTICS.pptx.pdf………………… xxxxxxxxxxxxx
Origin of periodic table-Mendeleev’s Periodic-Modern Periodic table
RMMM.pdf make it easy to upload and study
Basic Mud Logging Guide for educational purpose
VCE English Exam - Section C Student Revision Booklet
Module 4: Burden of Disease Tutorial Slides S2 2025
Classroom Observation Tools for Teachers

Cloud Computing & Security

  • 4. Cloud Computing  “The use of computing recourses (hardware and software) that are delivered as a services over a network”
  • 5. Models of Cloud Computing  1. Infrastructure as a service (IAAS)  2. Platform as a service (PAAS)  3. Software as a service (SAAS):
  • 7. 1. Infrastructure as a service (IAAS)  Providing resources (memory, processing) as a service to the requesters is called Infrastructure as a service.  Here cloud service providers only provide infrastructure while users have to their own OS + Software.  For Example In hotel we take a hall and pay it, Decoration + Catering to guest our own.
  • 8. 2. Platform as a service (PAAS)  Providing environment or platform OS along with Infrastructure, as a service to the requesters is called as a Platform as a service.  Here user have only a software.  Example In hotel we take a marriage hall + decoration we pay and catering to guest our own.
  • 9. 3.Software as a services (SAAS):    Providing ready made software's along with infrastructure + platform OS to requesters as a service is called a Software as a service.  Here user have all services Infrastructure + OS + Software  Example In hotel we take a marriage hall, they also provide us decoration + catering we only pay on it.
  • 10. Advantages  Convenience. You can access your data anywhere you can connect to the Internet.  Backups. You have a backup of your data in case your local computer crashes.  Collaboration. With your permission, others can access, view, and modify your documents.
  • 11. Disadvantages  Storage limits. While your local hard drive may be able to hold 500GB or more of data, unfortunately a remote server may only allow you to freely store about 5GB. If you want more room, you’ll have to pay.  Security breaches. Remember, I said that remote server security makes it harder, but not impossible, for hackers to reach your data. If there is a compromise of the server's) where your data is stored, your personal information may be exposed to the world.  Slow speeds. Uploading and downloading of large documents may take a long time.
  • 13. Security  The Security Problem  Program Threats  System and Network Threats  Implementing Security Defenses
  • 14. The Security ProblemThe Security Problem  Security must consider external environment of the system, and protect the system resources  Intruders (crackers) attempt to breach security  Threat is potential security violation  Attack is attempt to breach security  Attack can be accidental or malicious  Easier to protect against accidental than malicious misuse
  • 15. Security ViolationsSecurity Violations  Categories  Breach of confidentiality  Breach of integrity  Breach of availability  Theft of service  Denial of service  Methods  Masquerading (breach authentication)  Replay attack  Message modification  Man-in-the-middle attack  Session hijacking
  • 17. Program ThreatsProgram Threats  Trojan Horse  Code segment that misuses its environment  Exploits mechanisms for allowing programs written by users to be executed by other users  Spy ware, pop-up browser windows, covert channels  Trap Door  Specific user identifier or password that circumvents normal security procedures  Could be included in a compiler  Logic Bomb  Program that initiates a security incident under certain circumstances  Stack and Buffer Overflow  Exploits a bug in a program (overflow either the stack or memory buffers)
  • 18. Program Threats (Cont.)Program Threats (Cont.)  Viruses  Code fragment embedded in legitimate program  Very specific to CPU architecture, operating system, applications  Usually borne via email or as a macro
  • 19. System and Network ThreatsSystem and Network Threats  Worms – use spawn mechanism; standalone program  Internet worm  Exploited UNIX networking features (remote access) and bugs in finger and sendmail programs  Grappling hook program uploaded main worm program  Port scanning  Automated attempt to connect to a range of ports on one or a range of IP addresses  Denial of Service  Overload the targeted computer preventing it from doing any useful work  Distributed denial-of-service (DDOS) come from multiple sites at once
  • 20. Implementing SecurityImplementing Security DefensesDefenses  Defense in depth is most common security theory – multiple layers of security  Security policy describes what is being secured  Vulnerability assessment compares real state of system / network compared to security policy  Intrusion detection endeavors to detect attempted or successful intrusions  Signature-based detection spots known bad patterns  Anomaly detection spots differences from normal behavior  Can detect zero-day attacks  False-positives and false-negatives a problem  Virus protection  Auditing, accounting, and logging of all or specific system or network activities
  • 21. Fire walling to ProtectFire walling to Protect Systems and NetworksSystems and Networks  A network firewall is placed between trusted and untrusted hosts  The firewall limits network access between these two security domains  Can be tunneled or spoofed  Tunneling allows disallowed protocol to travel within allowed protocol (i.e. telnet inside of HTTP)  Firewall rules typically based on host name or IP address which can be spoofed  Personal firewall is software layer on given host  Can monitor / limit traffic to and from the host  Application proxy firewall understands application protocol and can control them (i.e. SMTP)  System-call firewall monitors all important system calls and apply rules to them (i.e. this program can execute that system call)