SlideShare a Scribd company logo
2
Most read
5
Most read
7
Most read
Prepared by,
Ms.SRIPRIYA,
Assistant professor,
Bon secours college for women,
Thanjavur-6
 1.cloud service providers/Saas & Paas
provider
 2.Cloud Infrastructure provider/ IaaS
provider
 1.Infrastructure
 2.Storage
 3.Platform
 4.Application
 5.Services
 6.Client
 1.Secure data transfer
 2. Secure programs interfaces
 3. Secure retained data
 4.user access to control
 5.data separation
 It’s a significant part of business planning.
 Risk management believe to reduce the risk
 R.M method for recognizing, considering risk.
 Some of risk administrations are ISO,NIT
 A disaster at a cloud provider can affect every one of
its customers.
 And hackers and malware are not the only ones who
may target a cloud service provider.
 Cloud computing risks are also presented by insider
threats.
 Cloud computing provide all types of possibilities to
reduce the risk in IT .
 Over 2-3 years IT organization evolving better
concentrated on
“Auditing, inspecting, reconsidering & modernizing”
 Hybrid clouds start to verify their enterprise worth.
 Risk can effect in market Authority:
 Robust development,
 premium supply charges &
 investor confidence.
 Risk management is not only buying protection for the
company, it should consider insurable & uninsurable
risk.
 Its also define cost effective during the risk
management.
Cloud computing risks
 #1. Unauthorized access to customer and
business data
Criminals do not like to work. They may
target small business networks because they
are easier to breach, and they often go after
larger companies because of the allure of
larger payouts.
 #2. Insecure interfaces & APIs
 Provider should double check that security to
their service forms
 Logging security
 #3.Vicious insider
 Large risk in cc environment.
 Gain unauthorized access to organozations
 #4. Issues related technology sharing
 It is based on IaaS
 Remember: you have many ways to protect
your data when it is in control
 #5. data loss or leakage
 Data may be deleted or loss without produce
backup
 #6. Hijacking
 Deception & exploitation of program
vulnerabilities
 #7. Unknown risk profile
 This is less engaged with h/w & s/w
maintenance.
 Malicious insiders & abusive use of login access by an
unauthorized persons.
 Identity theft
 External security Risk
 Malware infections and data breaches
 Data Protection Risk-
 Data loss risk-deletion of record, loss of
encryption key,correption of data.
Cloud computing risks
 It is a open environment security risk.
 Its have high accessibility and associated with Risk too.
 Cc provide higher service quality , security,
availability & reliability.
Current state
 Data storage & computation are offer in the single
data center(service provider)
 A single point of malfunction will not be presumed
for any data loss compare with house computing.
 How data protected?
 How code protected?
 Cc provide security,availablity & reliablity.
 Security advantages:
 Data centralization
 Incident Response
 Forensic image verification time-MD5 hash function
 Logging-benchmark logs solveing the logging problems
 Investigation-illegal cloud environment
 Data segregation –data normally distributed
 Long term viability-double check the data
accessibility
 Compromised server- backup of data
 Regularity compliance-update not in regular
 Recovery – natural and man made disasters.
 If the data is confidential ,the data can handle by the
authorized person only.
 Cc is the platform of digital matching form.
 Human-human data flow.
Cloud ,digital persona & data security:
Salesforce.com-12 year of experience-service-infrastructure
scalability to accessibility.
After get authentication only can control the cloud .
Protect data from unauthorized control
 Content level security endows Organizations to
organize data .
 Contents are the organizational level, rather than the
institutional level.
 Cloud service providers use a combination of methods
to protect your data. ... Cloud providers take steps to
protect data that's in transit.
 Data Security methods include virtual private
networks, encryption, or masking. Virtual private
networks (VPNs) allow remote employees to connect
to corporate networks.
 Data integrity strengthen by PRIVACY,SECURITY, &
RELIABLITY
 And the integrity getting damaged by
HACKERS,PROGRAM MISTAKE, comp. virus
Data availability -
Data backup plan -
Disaster Recovery plan-
 Only authorized persons only can access the resource within the system.
 Setp1- Authenticate individual
 Step2-get info. About individual
 Step3-permit
 Auditing:
 Advantage is to reduce the cost of IT services.
 Reduce the capital cost.
 Unlimited scalablity
 Pay- as-usage
 Cc establish DB in virtual environment by reveling
internal & external attacks.
 Double check the data inherently protected.
software testing:
Reducing testing cost
S/W testing tools to cc Applications

More Related Content

PPTX
Chap 6 cloud security
PPTX
Layers and types of cloud
PPT
Issues in cloud computing
PPTX
Fundamental cloud security
PPTX
Cloud Resource Management
PPTX
Security engineering
PPT
Benefits of Cloud Computing
PPT
Cloud Security
Chap 6 cloud security
Layers and types of cloud
Issues in cloud computing
Fundamental cloud security
Cloud Resource Management
Security engineering
Benefits of Cloud Computing
Cloud Security

What's hot (20)

PPTX
Cloud security and security architecture
PPTX
Cloud security
PDF
Application Security - Your Success Depends on it
PPT
Cloud security
PPTX
Cloud Computing Security
PDF
Cloud Computing Service Models | IaaS PaaS SaaS Explained | Cloud Masters Pro...
PPT
Cloud Computing Security Challenges
PPTX
PDF
Cloud Security: A New Perspective
PPT
Cloud deployment models
PDF
Microsoft Zero Trust
PPTX
Cloud computing
PPTX
Cloud computing and Cloud security fundamentals
PPTX
Cloud computing Risk management
PPTX
Cloud Delivery Model Considerations
PPT
Cloud computing security
PPT
Information Security
PPTX
Database security
PPTX
Hybrid Cloud and Its Implementation
PPT
Security models
Cloud security and security architecture
Cloud security
Application Security - Your Success Depends on it
Cloud security
Cloud Computing Security
Cloud Computing Service Models | IaaS PaaS SaaS Explained | Cloud Masters Pro...
Cloud Computing Security Challenges
Cloud Security: A New Perspective
Cloud deployment models
Microsoft Zero Trust
Cloud computing
Cloud computing and Cloud security fundamentals
Cloud computing Risk management
Cloud Delivery Model Considerations
Cloud computing security
Information Security
Database security
Hybrid Cloud and Its Implementation
Security models
Ad

Similar to Cloud computing risks (20)

PPT
Cloud computing final show
PDF
Lecture27 cc-security2
PPTX
Cloud security and services
PPT
Lecture31.ppt
PPTX
Myppt1.pptx on ics subject for 6th semester
PPTX
Securing your Cloud Deployment
PPTX
Unc charlotte prezo2016
ODP
Securing The Cloud
PPTX
Cloud computing - Assessing the Security Risks - Jared Carstensen
PPT
28_Security-Privacy-in_Cloud_AND_real.ppt
PPT
28_Security-Privacy-inxssudusd_Cloud.ppt
PPTX
Data Confidentiality in Cloud Computing
PPTX
Cloud is not an option, but is security?
PPTX
Unit -3.pptx cloud Security unit -3 notes
PPTX
Cloud Security
PPTX
Cloud Security
PPTX
Cloud computing
PPT
Cloud Computing Security Issues
PPT
Cloud computing..
PPTX
Cloud Audit and Compliance
Cloud computing final show
Lecture27 cc-security2
Cloud security and services
Lecture31.ppt
Myppt1.pptx on ics subject for 6th semester
Securing your Cloud Deployment
Unc charlotte prezo2016
Securing The Cloud
Cloud computing - Assessing the Security Risks - Jared Carstensen
28_Security-Privacy-in_Cloud_AND_real.ppt
28_Security-Privacy-inxssudusd_Cloud.ppt
Data Confidentiality in Cloud Computing
Cloud is not an option, but is security?
Unit -3.pptx cloud Security unit -3 notes
Cloud Security
Cloud Security
Cloud computing
Cloud Computing Security Issues
Cloud computing..
Cloud Audit and Compliance
Ad

Recently uploaded (20)

PDF
BÀI TẬP TEST BỔ TRỢ THEO TỪNG CHỦ ĐỀ CỦA TỪNG UNIT KÈM BÀI TẬP NGHE - TIẾNG A...
PPTX
Cardiovascular Pharmacology for pharmacy students.pptx
PDF
Introduction-to-Social-Work-by-Leonora-Serafeca-De-Guzman-Group-2.pdf
PPTX
Introduction_to_Human_Anatomy_and_Physiology_for_B.Pharm.pptx
PPTX
Open Quiz Monsoon Mind Game Prelims.pptx
PPTX
BOWEL ELIMINATION FACTORS AFFECTING AND TYPES
PDF
O7-L3 Supply Chain Operations - ICLT Program
PDF
Mark Klimek Lecture Notes_240423 revision books _173037.pdf
PDF
Origin of periodic table-Mendeleev’s Periodic-Modern Periodic table
PDF
Business Ethics Teaching Materials for college
PDF
01-Introduction-to-Information-Management.pdf
PPTX
Introduction to Child Health Nursing – Unit I | Child Health Nursing I | B.Sc...
PDF
O5-L3 Freight Transport Ops (International) V1.pdf
PDF
The Lost Whites of Pakistan by Jahanzaib Mughal.pdf
PDF
102 student loan defaulters named and shamed – Is someone you know on the list?
PPTX
Cell Structure & Organelles in detailed.
PDF
Anesthesia in Laparoscopic Surgery in India
PDF
Saundersa Comprehensive Review for the NCLEX-RN Examination.pdf
PPTX
GDM (1) (1).pptx small presentation for students
PDF
Chapter 2 Heredity, Prenatal Development, and Birth.pdf
BÀI TẬP TEST BỔ TRỢ THEO TỪNG CHỦ ĐỀ CỦA TỪNG UNIT KÈM BÀI TẬP NGHE - TIẾNG A...
Cardiovascular Pharmacology for pharmacy students.pptx
Introduction-to-Social-Work-by-Leonora-Serafeca-De-Guzman-Group-2.pdf
Introduction_to_Human_Anatomy_and_Physiology_for_B.Pharm.pptx
Open Quiz Monsoon Mind Game Prelims.pptx
BOWEL ELIMINATION FACTORS AFFECTING AND TYPES
O7-L3 Supply Chain Operations - ICLT Program
Mark Klimek Lecture Notes_240423 revision books _173037.pdf
Origin of periodic table-Mendeleev’s Periodic-Modern Periodic table
Business Ethics Teaching Materials for college
01-Introduction-to-Information-Management.pdf
Introduction to Child Health Nursing – Unit I | Child Health Nursing I | B.Sc...
O5-L3 Freight Transport Ops (International) V1.pdf
The Lost Whites of Pakistan by Jahanzaib Mughal.pdf
102 student loan defaulters named and shamed – Is someone you know on the list?
Cell Structure & Organelles in detailed.
Anesthesia in Laparoscopic Surgery in India
Saundersa Comprehensive Review for the NCLEX-RN Examination.pdf
GDM (1) (1).pptx small presentation for students
Chapter 2 Heredity, Prenatal Development, and Birth.pdf

Cloud computing risks

  • 1. Prepared by, Ms.SRIPRIYA, Assistant professor, Bon secours college for women, Thanjavur-6
  • 2.  1.cloud service providers/Saas & Paas provider  2.Cloud Infrastructure provider/ IaaS provider
  • 3.  1.Infrastructure  2.Storage  3.Platform  4.Application  5.Services  6.Client
  • 4.  1.Secure data transfer  2. Secure programs interfaces  3. Secure retained data  4.user access to control  5.data separation
  • 5.  It’s a significant part of business planning.  Risk management believe to reduce the risk  R.M method for recognizing, considering risk.  Some of risk administrations are ISO,NIT  A disaster at a cloud provider can affect every one of its customers.  And hackers and malware are not the only ones who may target a cloud service provider.  Cloud computing risks are also presented by insider threats.
  • 6.  Cloud computing provide all types of possibilities to reduce the risk in IT .  Over 2-3 years IT organization evolving better concentrated on “Auditing, inspecting, reconsidering & modernizing”  Hybrid clouds start to verify their enterprise worth.
  • 7.  Risk can effect in market Authority:  Robust development,  premium supply charges &  investor confidence.  Risk management is not only buying protection for the company, it should consider insurable & uninsurable risk.  Its also define cost effective during the risk management.
  • 9.  #1. Unauthorized access to customer and business data Criminals do not like to work. They may target small business networks because they are easier to breach, and they often go after larger companies because of the allure of larger payouts.
  • 10.  #2. Insecure interfaces & APIs  Provider should double check that security to their service forms  Logging security  #3.Vicious insider  Large risk in cc environment.  Gain unauthorized access to organozations
  • 11.  #4. Issues related technology sharing  It is based on IaaS  Remember: you have many ways to protect your data when it is in control  #5. data loss or leakage  Data may be deleted or loss without produce backup  #6. Hijacking  Deception & exploitation of program vulnerabilities
  • 12.  #7. Unknown risk profile  This is less engaged with h/w & s/w maintenance.
  • 13.  Malicious insiders & abusive use of login access by an unauthorized persons.  Identity theft  External security Risk  Malware infections and data breaches  Data Protection Risk-  Data loss risk-deletion of record, loss of encryption key,correption of data.
  • 15.  It is a open environment security risk.  Its have high accessibility and associated with Risk too.  Cc provide higher service quality , security, availability & reliability. Current state  Data storage & computation are offer in the single data center(service provider)  A single point of malfunction will not be presumed for any data loss compare with house computing.
  • 16.  How data protected?  How code protected?  Cc provide security,availablity & reliablity.  Security advantages:  Data centralization  Incident Response  Forensic image verification time-MD5 hash function  Logging-benchmark logs solveing the logging problems
  • 17.  Investigation-illegal cloud environment  Data segregation –data normally distributed  Long term viability-double check the data accessibility  Compromised server- backup of data  Regularity compliance-update not in regular  Recovery – natural and man made disasters.
  • 18.  If the data is confidential ,the data can handle by the authorized person only.  Cc is the platform of digital matching form.  Human-human data flow. Cloud ,digital persona & data security: Salesforce.com-12 year of experience-service-infrastructure scalability to accessibility. After get authentication only can control the cloud . Protect data from unauthorized control
  • 19.  Content level security endows Organizations to organize data .  Contents are the organizational level, rather than the institutional level.
  • 20.  Cloud service providers use a combination of methods to protect your data. ... Cloud providers take steps to protect data that's in transit.  Data Security methods include virtual private networks, encryption, or masking. Virtual private networks (VPNs) allow remote employees to connect to corporate networks.
  • 21.  Data integrity strengthen by PRIVACY,SECURITY, & RELIABLITY  And the integrity getting damaged by HACKERS,PROGRAM MISTAKE, comp. virus Data availability - Data backup plan - Disaster Recovery plan-
  • 22.  Only authorized persons only can access the resource within the system.  Setp1- Authenticate individual  Step2-get info. About individual  Step3-permit  Auditing:  Advantage is to reduce the cost of IT services.  Reduce the capital cost.  Unlimited scalablity  Pay- as-usage
  • 23.  Cc establish DB in virtual environment by reveling internal & external attacks.  Double check the data inherently protected. software testing: Reducing testing cost S/W testing tools to cc Applications