SlideShare a Scribd company logo
R ramya devi cloud computing
CLOUD COMPUTING
Data protection is a crucial
security issue for most organizations. Before
moving into the cloud, cloud users need to
clearly identify data objects to be protected
and classify data based on their implication
on security, and then define the security
policy for data protection as well as the policy
enforcement mechanisms.
The basic security services for
information security include assurance of
data Confidentiality, Integrity, and Availability
(CIA). In Cloud Computing, the issue of data
security becomes more complicated because
of the intrinsic cloud characteristics. Before
potential cloud users are able to safely move
their applications/data to the cloud, a suit of
security services would be in place
This service protects data from
malicious modification. When having
outsource their data to remote cloud servers,
cloud users must have a way to check
whether or not their data at rest or in transit
are intact.
Cloud application security (a.k.a.
cloud app security) is a system of policies,
processes, and controls that enable
enterprises to protect applications and data
in collaborative cloud environments. Cloud
solutions are ubiquitous in modern
enterprises.
Authentication, authorization,
encryption, logging, and application security
testing are all examples of application
security features. Developers can also use
code to reduce security flaws in applications.
Its final goal is to improve security
practices and, through that, to find, fix and
preferably prevent security issues within
applications. It encompasses the whole
application life cycle from requirements
analysis, design, implementation, verification
as well as maintenance.
What Does an Application Security
Architect Do? An application security architect
is required to design and manage IT systems
and programs and analyze and troubleshoot
issues related to security and access.
Virtualized security, or security
virtualization, refers to security solutions that
are software-based and designed to work
within a virtualized IT environment. This
differs from traditional, hardware-based
network security, which is static and runs on
devices such as traditional firewalls, routers,
and switches.
Users can choose from two different
types of virtual machines—process VMs and
system VMs: A process virtual machine allows
a single process to run as an application on a
host machine, providing a platform-
independent programming environment by
masking the information of the underlying
hardware or operating system.
THANK YOU

More Related Content

PPTX
Computer Security.pptx
PDF
Tools and Techniques for Cloud Security download
PDF
Cloud Security Challenges, Types, and Best Practises.pdf
PDF
Module 5-cloud computing-SECURITY IN THE CLOUD
PDF
Building a Resilient Cloud Security Architecture: Types, Challenges, and Best...
PDF
Trust based Mechanism for Secure Cloud Computing Environment: A Survey
PDF
Investigative analysis of security issues and challenges in cloud computing a...
DOC
report on Mobile security
Computer Security.pptx
Tools and Techniques for Cloud Security download
Cloud Security Challenges, Types, and Best Practises.pdf
Module 5-cloud computing-SECURITY IN THE CLOUD
Building a Resilient Cloud Security Architecture: Types, Challenges, and Best...
Trust based Mechanism for Secure Cloud Computing Environment: A Survey
Investigative analysis of security issues and challenges in cloud computing a...
report on Mobile security

Similar to R ramya devi cloud computing (20)

PPTX
SaaS Security.pptx
PDF
saassecurity-230424030940-08314322.pdf
DOCX
CSEC630 individaul assign
PDF
MBM Security Products Matrix
PPTX
Cloud Security_ Unit 4
PDF
Cloud Security POV_Final (by KM)
DOC
Security Issues in Cloud Computing by rahul abhishek
PDF
CloudWALL Profile ENG
PDF
5 Effective Ways Modern Applications Can Boost Your Security
PDF
INFORMATION SECURITY IN CLOUD COMPUTING
PDF
Manage risk by protecting apps, data and usage
PDF
the_role_of_resilience_data_in_ensuring_cloud_security.pdf
PPTX
the_role_of_resilience_data_in_ensuring_cloud_security.pptx
PDF
Top Cloud Infrastructure Practices And Strategies For Maximum Security.pdf
DOCX
UNIT -V.docx
PDF
Cloud Architect Company in India
PDF
ISACA Journal Publication - Does your Cloud have a Secure Lining? Shah Sheikh
PDF
Cloud Security Network – Definition and Best Practices.pdf
PDF
Design and implement a new cloud security method based on multi clouds on ope...
PDF
DESIGN AND IMPLEMENT A NEW CLOUD SECURITY METHOD BASED ON MULTI CLOUDS ON OPE...
SaaS Security.pptx
saassecurity-230424030940-08314322.pdf
CSEC630 individaul assign
MBM Security Products Matrix
Cloud Security_ Unit 4
Cloud Security POV_Final (by KM)
Security Issues in Cloud Computing by rahul abhishek
CloudWALL Profile ENG
5 Effective Ways Modern Applications Can Boost Your Security
INFORMATION SECURITY IN CLOUD COMPUTING
Manage risk by protecting apps, data and usage
the_role_of_resilience_data_in_ensuring_cloud_security.pdf
the_role_of_resilience_data_in_ensuring_cloud_security.pptx
Top Cloud Infrastructure Practices And Strategies For Maximum Security.pdf
UNIT -V.docx
Cloud Architect Company in India
ISACA Journal Publication - Does your Cloud have a Secure Lining? Shah Sheikh
Cloud Security Network – Definition and Best Practices.pdf
Design and implement a new cloud security method based on multi clouds on ope...
DESIGN AND IMPLEMENT A NEW CLOUD SECURITY METHOD BASED ON MULTI CLOUDS ON OPE...
Ad

More from PriyadharshiniVS (20)

PPTX
R Ramya devi digital image processing
PPTX
Ramya devi R women empowerment
PPTX
R Ramya devi artificial intelligence and machine learning
PPTX
Ramya devi R internet of things
PPTX
PPTX
PPTX
PPTX
PPTX
MOBILE APP DEVELOPMENT USING PYTHON
PPTX
Vanmathy python
PPTX
PriyaDharshini distributed operating system
PPTX
Vanmathy distributed operating system
PPTX
vanmathy cryptography network security
PPTX
vanmathy cryptography network security
PPTX
Vanmathy distributed operating system
PPTX
Vanmathy no sql
PPTX
Cryptography and network security
PPTX
PPTX
Graph, graph and network modeling, advantage of graph database
PPTX
Compiler design
R Ramya devi digital image processing
Ramya devi R women empowerment
R Ramya devi artificial intelligence and machine learning
Ramya devi R internet of things
MOBILE APP DEVELOPMENT USING PYTHON
Vanmathy python
PriyaDharshini distributed operating system
Vanmathy distributed operating system
vanmathy cryptography network security
vanmathy cryptography network security
Vanmathy distributed operating system
Vanmathy no sql
Cryptography and network security
Graph, graph and network modeling, advantage of graph database
Compiler design
Ad

Recently uploaded (20)

PDF
The Lost Whites of Pakistan by Jahanzaib Mughal.pdf
PDF
STATICS OF THE RIGID BODIES Hibbelers.pdf
PPTX
1st Inaugural Professorial Lecture held on 19th February 2020 (Governance and...
PDF
102 student loan defaulters named and shamed – Is someone you know on the list?
PDF
Physiotherapy_for_Respiratory_and_Cardiac_Problems WEBBER.pdf
PPTX
Institutional Correction lecture only . . .
PDF
2.FourierTransform-ShortQuestionswithAnswers.pdf
PDF
Classroom Observation Tools for Teachers
PPTX
master seminar digital applications in india
PPTX
IMMUNITY IMMUNITY refers to protection against infection, and the immune syst...
PDF
O7-L3 Supply Chain Operations - ICLT Program
PPTX
Cell Types and Its function , kingdom of life
PPTX
Introduction_to_Human_Anatomy_and_Physiology_for_B.Pharm.pptx
PDF
ANTIBIOTICS.pptx.pdf………………… xxxxxxxxxxxxx
PDF
Module 4: Burden of Disease Tutorial Slides S2 2025
PDF
Black Hat USA 2025 - Micro ICS Summit - ICS/OT Threat Landscape
PDF
Supply Chain Operations Speaking Notes -ICLT Program
PPTX
Final Presentation General Medicine 03-08-2024.pptx
PPTX
Cell Structure & Organelles in detailed.
PPTX
Lesson notes of climatology university.
The Lost Whites of Pakistan by Jahanzaib Mughal.pdf
STATICS OF THE RIGID BODIES Hibbelers.pdf
1st Inaugural Professorial Lecture held on 19th February 2020 (Governance and...
102 student loan defaulters named and shamed – Is someone you know on the list?
Physiotherapy_for_Respiratory_and_Cardiac_Problems WEBBER.pdf
Institutional Correction lecture only . . .
2.FourierTransform-ShortQuestionswithAnswers.pdf
Classroom Observation Tools for Teachers
master seminar digital applications in india
IMMUNITY IMMUNITY refers to protection against infection, and the immune syst...
O7-L3 Supply Chain Operations - ICLT Program
Cell Types and Its function , kingdom of life
Introduction_to_Human_Anatomy_and_Physiology_for_B.Pharm.pptx
ANTIBIOTICS.pptx.pdf………………… xxxxxxxxxxxxx
Module 4: Burden of Disease Tutorial Slides S2 2025
Black Hat USA 2025 - Micro ICS Summit - ICS/OT Threat Landscape
Supply Chain Operations Speaking Notes -ICLT Program
Final Presentation General Medicine 03-08-2024.pptx
Cell Structure & Organelles in detailed.
Lesson notes of climatology university.

R ramya devi cloud computing

  • 3. Data protection is a crucial security issue for most organizations. Before moving into the cloud, cloud users need to clearly identify data objects to be protected and classify data based on their implication on security, and then define the security policy for data protection as well as the policy enforcement mechanisms.
  • 4. The basic security services for information security include assurance of data Confidentiality, Integrity, and Availability (CIA). In Cloud Computing, the issue of data security becomes more complicated because of the intrinsic cloud characteristics. Before potential cloud users are able to safely move their applications/data to the cloud, a suit of security services would be in place
  • 5. This service protects data from malicious modification. When having outsource their data to remote cloud servers, cloud users must have a way to check whether or not their data at rest or in transit are intact.
  • 6. Cloud application security (a.k.a. cloud app security) is a system of policies, processes, and controls that enable enterprises to protect applications and data in collaborative cloud environments. Cloud solutions are ubiquitous in modern enterprises.
  • 7. Authentication, authorization, encryption, logging, and application security testing are all examples of application security features. Developers can also use code to reduce security flaws in applications.
  • 8. Its final goal is to improve security practices and, through that, to find, fix and preferably prevent security issues within applications. It encompasses the whole application life cycle from requirements analysis, design, implementation, verification as well as maintenance.
  • 9. What Does an Application Security Architect Do? An application security architect is required to design and manage IT systems and programs and analyze and troubleshoot issues related to security and access.
  • 10. Virtualized security, or security virtualization, refers to security solutions that are software-based and designed to work within a virtualized IT environment. This differs from traditional, hardware-based network security, which is static and runs on devices such as traditional firewalls, routers, and switches.
  • 11. Users can choose from two different types of virtual machines—process VMs and system VMs: A process virtual machine allows a single process to run as an application on a host machine, providing a platform- independent programming environment by masking the information of the underlying hardware or operating system.