SlideShare a Scribd company logo
Cloud security
Introduction
Achmad Mardiansyah
Agenda
● Cyber security
● Security incidents
● Cloud Computing
● Cloud Security
● Q & A
2
Cyber Security introduction
3
What is Cyber security
Cybersecurity is the art of protecting networks, devices, and data from
unauthorized access or criminal use and the practice of ensuring confidentiality,
integrity, and availability of information.
Security is a very subjective terms.
Every person has their own definition of security, that’s why there are many
standards in security
4
Types of Security
● Computer Security - generic name for the collection of tools designed to
protect data and to thwart hackers
● Network Security - measures to protect data during their transmission
● Internet Security - measures to protect data during their transmission over a
collec)on of interconnected networks
5
Goals of Information Security (CIA)
● Confidentiality. prevents
unauthorized use or
disclosure of information
● Integrity. safeguards the
accuracy and
completeness of
information
● Availability. authorized
users have reliable and
timely access to information
6
Access Control
● Ability to permit or deny the use of an object by a
subject.
● It provides 3 essential services (AAA):
○ Authentication and Identification (who can login)
■ What you know
■ What you have
■ What you are
○ Authorization (what authorized users can do)
○ Accountability (keep track what a user did)
7
Vulnerability
A weakness in security procedures,
network design, or implementation that can
be exploited to violate a corporate security
policy
● Software bugs
● Configuration mistakes
● Network design flaw
Exploit
● Taking advantage of a vulnerability
CVE: Common Vulnerability and Exposure
(https://cve.mitre.org)
8
Threat
Any circumstance or event with the potential to cause harm to a networked system
● Denial of service (DOS): make computer resources (e.g., bandwidth, disk
space, or CPU ) unavailable to its intended users
● Unauthorised access: Access without of permission issued by a rightul
owner of devices or networks
● Impersonation
○ Identity theft
● Worms
● Viruses
● Malware
9
The possibility that a particular vulnerability will be
exploited
Risk analysis is the process of identifying:
● security risks
● determining their impact
● and identifying areas require protection
Risk
10
Security incidents
11
Customer data security breach
● https://en.wikipedia.org/wiki/Data_breach
● Is your account safe?
12
CIA espionage (vault7)
● https://wikileaks.org/ciav7p1/cms/index.html
● https://techcrunch.com/2017/03/09/names-and-d
efinitions-of-leaked-cia-hacking-tools/
● https://wikileaks.org/ciav7p1/cms/files/2014%20
10%2023%20--%20EDG%20Testing%20White
%20Paper%20--%20Rev%20Draft%20B.docx
●
13
Telkom as ads injector
● Telkom injects ads on every http
request from customer
● Around 2013 - ?
● script
14
Cloud computing
15
Can you live without them?
16
So, everything is connected?
17
New paradigm: human netwwork
From computer network -> human network
18
Cloud computing (CC) is...
A concept of using the internet/network to provide Everything as a service (EaaS)
● New paradigm: sell services instead of products
● IaaS, Infrastructure as a Service (RAM, CPU, Storage)
● PaaS, Platform as a Service (frameworks)
● SaaS, Software as a Service (eg. Text editor, cpu, storage)
19
How to achieve cloud computing
● Distributed computing
● Grid computing
● virtualisation
20
Cloud computing type
21
CC in short...
● If want you need is a milk, why do you buy a cow?
● There is no cloud, it’s just someone else’s computer
22
Cloud Security
23
Put security on your cloud
● See previous slide…
●
24
Some examples
25
Use HTTPS
● Dont use HTTP based website
● Always use https when accessing
website
● HTTPS will encrypt traffic from
browser to web server
●
26
Use DNS redirector/filter
● Nawala (www.nawala.org)
● Opendns (https://www.opendns.com)
● Local DNS filter:
○ Can be embeded onto your network devices
○ Can be external: example: pi hole
(https://pi-hole.net)
27
Use script blocker (more control)
● This plugin will block scripts until
you allow it to be executed
● More control
28
Activate Multi Factor authentication (MFA / 2FA)
● Similar to math:
○ What is the factor of 18?
■ 1 and 18
■ 2 and 9
■ 3 and 6
● How many factors to authenticate yourself to website?
29
Single factor 2 factor
Check if your account has been breached
30
Vendor support
● Security incident
● Security updates
● Always communicate with vendor to make sure always get support for
security
●
31
summary
● The strength of security depends on the weakest link of the chains
● Always upgrade skill and knowledge
● Be humble when speak about security. Do not attract attention
32
QA
33
End of slides
● Thank you for your attention
●
34

More Related Content

PDF
Microsoft Azure Security Infographic
PPTX
Cloud security
PPTX
Security for cloud native workloads
PPTX
The Top Cloud Security Issues
PPT
Cloud security
PDF
Cloud Native Security: New Approach for a New Reality
PPTX
Data Security Essentials for Cloud Computing - JavaOne 2013
PPTX
Cloud security (domain11 14)
Microsoft Azure Security Infographic
Cloud security
Security for cloud native workloads
The Top Cloud Security Issues
Cloud security
Cloud Native Security: New Approach for a New Reality
Data Security Essentials for Cloud Computing - JavaOne 2013
Cloud security (domain11 14)

What's hot (19)

PDF
Tour to Azure Security Center
PDF
Cloud Security & Cloud Encryption Explained
PDF
Microsoft Windows Azure - Security Best Practices for Developing Windows Azur...
PDF
Cyber Security and Cloud Computing
PPTX
multiple encryption in clouud computing
PDF
Cloud Security - Emerging Facets and Frontiers
PPTX
cloud security ppt
PPTX
Security on Cloud Computing
PDF
Challenges with Cloud Security by Ken Y Chan
PDF
Getting Started with Azure Security Center
PDF
Govern Your Cloud: The Foundation for Success
PPTX
Analysis-of-Security-Algorithms-in-Cloud-Computing [Autosaved]
PDF
The Share Responsibility Model of Cloud Computing - ILTA NYC
PDF
Protecting Against Web Attacks
PDF
Cloud Security Engineering - Tools and Techniques
PDF
Applying a Security Kernel Framework to Smart Meter Gateways
PPTX
(ISC)2 CCSP - Certified Cloud Security Professional
PDF
Security issue in Cloud computing
PDF
Css sf azure_8-9-17-microsoft_azure_security_overview_babak suzani_msft
Tour to Azure Security Center
Cloud Security & Cloud Encryption Explained
Microsoft Windows Azure - Security Best Practices for Developing Windows Azur...
Cyber Security and Cloud Computing
multiple encryption in clouud computing
Cloud Security - Emerging Facets and Frontiers
cloud security ppt
Security on Cloud Computing
Challenges with Cloud Security by Ken Y Chan
Getting Started with Azure Security Center
Govern Your Cloud: The Foundation for Success
Analysis-of-Security-Algorithms-in-Cloud-Computing [Autosaved]
The Share Responsibility Model of Cloud Computing - ILTA NYC
Protecting Against Web Attacks
Cloud Security Engineering - Tools and Techniques
Applying a Security Kernel Framework to Smart Meter Gateways
(ISC)2 CCSP - Certified Cloud Security Professional
Security issue in Cloud computing
Css sf azure_8-9-17-microsoft_azure_security_overview_babak suzani_msft
Ad

Similar to Cloud Security Introduction (20)

PPTX
Unit -3.pptx cloud Security unit -3 notes
PDF
Cloud Computing and Security - ISACA Hyderabad Chapter Presentation
PPTX
chapitre1-cloud security basics-23 (1).pptx
PDF
Presd1 10
PDF
CLOUD & ETHICAL HACKING INTRODUCTION PDF
PPT
Cloud computing final show
PPT
28_Security-Privacy-in_Cloud_AND_real.ppt
PPT
28_Security-Privacy-inxssudusd_Cloud.ppt
PPTX
Cloud security
PPTX
Cloud computing
PPTX
security_and_privacy_in_cloud_computing (1).pptx
ODP
Securing The Cloud
PPTX
Cloud Security.pptx
PPTX
Myppt1.pptx on ics subject for 6th semester
PDF
Cloud_security_v2_chpater_9_s_version.pdf
PDF
Lecture27 cc-security2
PPTX
3-UnitV_security.pptx
PPT
Presentation copy
PDF
Cloud Computing Security
PDF
Iaetsd cloud computing and security challenges
Unit -3.pptx cloud Security unit -3 notes
Cloud Computing and Security - ISACA Hyderabad Chapter Presentation
chapitre1-cloud security basics-23 (1).pptx
Presd1 10
CLOUD & ETHICAL HACKING INTRODUCTION PDF
Cloud computing final show
28_Security-Privacy-in_Cloud_AND_real.ppt
28_Security-Privacy-inxssudusd_Cloud.ppt
Cloud security
Cloud computing
security_and_privacy_in_cloud_computing (1).pptx
Securing The Cloud
Cloud Security.pptx
Myppt1.pptx on ics subject for 6th semester
Cloud_security_v2_chpater_9_s_version.pdf
Lecture27 cc-security2
3-UnitV_security.pptx
Presentation copy
Cloud Computing Security
Iaetsd cloud computing and security challenges
Ad

More from GLC Networks (20)

PDF
Firewall mangle PBR: steering outbound path similar to inbound
PDF
Internal BGP tuning: Mesh peering to avoid loop
PDF
BGP tuning: Peer with loopback
PDF
BGP security tuning: pull-up route
PDF
BGP troubleshooting: route origin
PDF
Steering traffic in OSPF: Interface cost
PDF
Tuning OSPF: Bidirectional Forwarding Detection (BFD)
PDF
Tuning OSPF: Prefix Aggregate
PDF
Tuning OSPF: area hierarchy, LSA, and area type
PDF
Stable OSPF: choosing network type.pdf
PDF
Controlling Access Between Devices in the same Layer 2 Segment
PDF
GIT as Mikrotik Configuration Management
PDF
RouterOS Migration From v6 to v7
PDF
Building a Web Server with NGINX
PDF
Best Current Practice (BCP) 38 Ingress Filtering for Security
PDF
EOIP Deep Dive
PDF
Policy Based Routing with Indirect BGP - Part 2
PDF
Policy Based Routing with Indirect BGP - Part 1
PDF
Internet Protocol Deep-Dive
PDF
Network Monitoring with The Dude and Whatsapp
Firewall mangle PBR: steering outbound path similar to inbound
Internal BGP tuning: Mesh peering to avoid loop
BGP tuning: Peer with loopback
BGP security tuning: pull-up route
BGP troubleshooting: route origin
Steering traffic in OSPF: Interface cost
Tuning OSPF: Bidirectional Forwarding Detection (BFD)
Tuning OSPF: Prefix Aggregate
Tuning OSPF: area hierarchy, LSA, and area type
Stable OSPF: choosing network type.pdf
Controlling Access Between Devices in the same Layer 2 Segment
GIT as Mikrotik Configuration Management
RouterOS Migration From v6 to v7
Building a Web Server with NGINX
Best Current Practice (BCP) 38 Ingress Filtering for Security
EOIP Deep Dive
Policy Based Routing with Indirect BGP - Part 2
Policy Based Routing with Indirect BGP - Part 1
Internet Protocol Deep-Dive
Network Monitoring with The Dude and Whatsapp

Recently uploaded (20)

PDF
Electronic commerce courselecture one. Pdf
PDF
Shreyas Phanse Resume: Experienced Backend Engineer | Java • Spring Boot • Ka...
PDF
Diabetes mellitus diagnosis method based random forest with bat algorithm
PDF
Building Integrated photovoltaic BIPV_UPV.pdf
PDF
Approach and Philosophy of On baking technology
PPTX
Digital-Transformation-Roadmap-for-Companies.pptx
PDF
Architecting across the Boundaries of two Complex Domains - Healthcare & Tech...
PDF
NewMind AI Monthly Chronicles - July 2025
PDF
Agricultural_Statistics_at_a_Glance_2022_0.pdf
PDF
How UI/UX Design Impacts User Retention in Mobile Apps.pdf
PPTX
PA Analog/Digital System: The Backbone of Modern Surveillance and Communication
PDF
Blue Purple Modern Animated Computer Science Presentation.pdf.pdf
PDF
Empathic Computing: Creating Shared Understanding
PPTX
Effective Security Operations Center (SOC) A Modern, Strategic, and Threat-In...
PDF
Modernizing your data center with Dell and AMD
PDF
7 ChatGPT Prompts to Help You Define Your Ideal Customer Profile.pdf
PPT
Teaching material agriculture food technology
PDF
NewMind AI Weekly Chronicles - August'25 Week I
PDF
Mobile App Security Testing_ A Comprehensive Guide.pdf
PPTX
VMware vSphere Foundation How to Sell Presentation-Ver1.4-2-14-2024.pptx
Electronic commerce courselecture one. Pdf
Shreyas Phanse Resume: Experienced Backend Engineer | Java • Spring Boot • Ka...
Diabetes mellitus diagnosis method based random forest with bat algorithm
Building Integrated photovoltaic BIPV_UPV.pdf
Approach and Philosophy of On baking technology
Digital-Transformation-Roadmap-for-Companies.pptx
Architecting across the Boundaries of two Complex Domains - Healthcare & Tech...
NewMind AI Monthly Chronicles - July 2025
Agricultural_Statistics_at_a_Glance_2022_0.pdf
How UI/UX Design Impacts User Retention in Mobile Apps.pdf
PA Analog/Digital System: The Backbone of Modern Surveillance and Communication
Blue Purple Modern Animated Computer Science Presentation.pdf.pdf
Empathic Computing: Creating Shared Understanding
Effective Security Operations Center (SOC) A Modern, Strategic, and Threat-In...
Modernizing your data center with Dell and AMD
7 ChatGPT Prompts to Help You Define Your Ideal Customer Profile.pdf
Teaching material agriculture food technology
NewMind AI Weekly Chronicles - August'25 Week I
Mobile App Security Testing_ A Comprehensive Guide.pdf
VMware vSphere Foundation How to Sell Presentation-Ver1.4-2-14-2024.pptx

Cloud Security Introduction

  • 2. Agenda ● Cyber security ● Security incidents ● Cloud Computing ● Cloud Security ● Q & A 2
  • 4. What is Cyber security Cybersecurity is the art of protecting networks, devices, and data from unauthorized access or criminal use and the practice of ensuring confidentiality, integrity, and availability of information. Security is a very subjective terms. Every person has their own definition of security, that’s why there are many standards in security 4
  • 5. Types of Security ● Computer Security - generic name for the collection of tools designed to protect data and to thwart hackers ● Network Security - measures to protect data during their transmission ● Internet Security - measures to protect data during their transmission over a collec)on of interconnected networks 5
  • 6. Goals of Information Security (CIA) ● Confidentiality. prevents unauthorized use or disclosure of information ● Integrity. safeguards the accuracy and completeness of information ● Availability. authorized users have reliable and timely access to information 6
  • 7. Access Control ● Ability to permit or deny the use of an object by a subject. ● It provides 3 essential services (AAA): ○ Authentication and Identification (who can login) ■ What you know ■ What you have ■ What you are ○ Authorization (what authorized users can do) ○ Accountability (keep track what a user did) 7
  • 8. Vulnerability A weakness in security procedures, network design, or implementation that can be exploited to violate a corporate security policy ● Software bugs ● Configuration mistakes ● Network design flaw Exploit ● Taking advantage of a vulnerability CVE: Common Vulnerability and Exposure (https://cve.mitre.org) 8
  • 9. Threat Any circumstance or event with the potential to cause harm to a networked system ● Denial of service (DOS): make computer resources (e.g., bandwidth, disk space, or CPU ) unavailable to its intended users ● Unauthorised access: Access without of permission issued by a rightul owner of devices or networks ● Impersonation ○ Identity theft ● Worms ● Viruses ● Malware 9
  • 10. The possibility that a particular vulnerability will be exploited Risk analysis is the process of identifying: ● security risks ● determining their impact ● and identifying areas require protection Risk 10
  • 12. Customer data security breach ● https://en.wikipedia.org/wiki/Data_breach ● Is your account safe? 12
  • 13. CIA espionage (vault7) ● https://wikileaks.org/ciav7p1/cms/index.html ● https://techcrunch.com/2017/03/09/names-and-d efinitions-of-leaked-cia-hacking-tools/ ● https://wikileaks.org/ciav7p1/cms/files/2014%20 10%2023%20--%20EDG%20Testing%20White %20Paper%20--%20Rev%20Draft%20B.docx ● 13
  • 14. Telkom as ads injector ● Telkom injects ads on every http request from customer ● Around 2013 - ? ● script 14
  • 16. Can you live without them? 16
  • 17. So, everything is connected? 17
  • 18. New paradigm: human netwwork From computer network -> human network 18
  • 19. Cloud computing (CC) is... A concept of using the internet/network to provide Everything as a service (EaaS) ● New paradigm: sell services instead of products ● IaaS, Infrastructure as a Service (RAM, CPU, Storage) ● PaaS, Platform as a Service (frameworks) ● SaaS, Software as a Service (eg. Text editor, cpu, storage) 19
  • 20. How to achieve cloud computing ● Distributed computing ● Grid computing ● virtualisation 20
  • 22. CC in short... ● If want you need is a milk, why do you buy a cow? ● There is no cloud, it’s just someone else’s computer 22
  • 24. Put security on your cloud ● See previous slide… ● 24
  • 26. Use HTTPS ● Dont use HTTP based website ● Always use https when accessing website ● HTTPS will encrypt traffic from browser to web server ● 26
  • 27. Use DNS redirector/filter ● Nawala (www.nawala.org) ● Opendns (https://www.opendns.com) ● Local DNS filter: ○ Can be embeded onto your network devices ○ Can be external: example: pi hole (https://pi-hole.net) 27
  • 28. Use script blocker (more control) ● This plugin will block scripts until you allow it to be executed ● More control 28
  • 29. Activate Multi Factor authentication (MFA / 2FA) ● Similar to math: ○ What is the factor of 18? ■ 1 and 18 ■ 2 and 9 ■ 3 and 6 ● How many factors to authenticate yourself to website? 29 Single factor 2 factor
  • 30. Check if your account has been breached 30
  • 31. Vendor support ● Security incident ● Security updates ● Always communicate with vendor to make sure always get support for security ● 31
  • 32. summary ● The strength of security depends on the weakest link of the chains ● Always upgrade skill and knowledge ● Be humble when speak about security. Do not attract attention 32
  • 33. QA 33
  • 34. End of slides ● Thank you for your attention ● 34