SlideShare a Scribd company logo
3
Most read
4
Most read
5
Most read
Security overview of
cloud computing
What is Cloud Computing ?
Cloud computing refers to the on demand delivery of
computing services such as applications, computing resources,
storage, database, networking resources etc. through internet
and on a pay as per use basis. At the present time the demand
for cloud computing services are increasing with respect to that
demand for cloud computing skills is also increasing. It
provides three main types of service models i.e. SaaS
(Software as a Service), PaaS (Platform as a Service) and
IaaS (Infrastructure as a Service). With this as starting from
small to large organizations have started using cloud services
so depending upon their requirement they go for the different
types of cloud like Public cloud, Private cloud, Hybrid cloud,
Community cloud.
Security In Cloud Computing :
Cloud computing which is one of the most demanding
technology of the current time, starting from small to large
organizations have started using cloud computing services.
Where there are different types of cloud deployment models
are available and cloud services are provided as per
requirement like that internally and externally security is
maintained to keep the cloud system safe. Cloud computing
security or cloud security is an important concern which refers
to the act of protecting cloud environments, data, information
and applications against unauthorized access, DDOS attacks,
malwares, hackers and other similar attacks. Community Cloud
: These allow to a limited set of organizations or employees to
access a shared cloud computing service environment.
Planning of security in Cloud Computing :
As security is a major concern in cloud implementation, so
an organization have to plan for security based on some
factors like below represents the three main factors on
which planning of cloud security depends.
Resources that can be moved to the cloud and test its
sensitivity risk are picked.
The type of cloud is to be considered.
The risk in the deployment of the cloud depends on the
types of cloud and service models.
Types of Cloud Computing Security Controls :
There are 4 types of cloud computing security controls ,
Deterrent Controls : Deterrent controls are designed to block
nefarious attacks on a cloud system. These come in handy when
there are insider attackers.
Preventive Controls : Preventive controls make the system
resilient to attacks by eliminating vulnerabilities in it.
Detective Controls : It identifies and reacts to security threats
and control. Some examples of detective control software are
Intrusion detection software and network security monitoring tools.
Corrective Controls : In the event of a security attack these
controls are activated. They limit the damage caused by the
attack.
Importance of cloud security :
For the organizations making their transition to cloud, cloud
security is an essential factor while choosing a cloud provider.
The attacks are getting stronger day by day and so the security
needs to keep up with it. For this purpose it is essential to pick
a cloud provider who offers the best security and is customized
with the organization’s infrastructure. Cloud security has a lot of
benefits –
● Centralized security : Centralized security results in
centralizing protection. As managing all the devices and
endpoints is not an easy task cloud security helps in doing
so. This results in enhancing traffic analysis and web
filtering which means less policy and software updates.
● Reduced costs : Investing in cloud computing and cloud
security results in less expenditure in hardware and also
less manpower in administration
● Reduced Administration : It makes it easier to administer
the organization and does not have manual security
configuration and constant security updates.
● Reliability : These are very reliable and the cloud can be
accessed from anywhere with any device with proper
authorization.
When we are thinking about cloud security it includes various
types of security like access control for authorized access,
network segmentation for maintaining isolated data, encryption
for encoded data transfer, vulnerability check for patching
vulnerable areas, security monitoring for keeping eye on
various security attacks and disaster recovery for backup and
recovery during data loss.
There are different types of security techniques which are implemented to
make the cloud computing system more secure such as SSL (Secure
Socket Layer) Encryption, Multi Tenancy based Access Control, Intrusion
Detection System, firewalls, penetration testing, tokenization, VPN (Virtual
Private Networks), and avoiding public internet connections and many
more techniques.
But the thing is not so simple how we think, even implementation of number
of security techniques there is always security issues are involved for the
cloud system. As cloud system is managed and accessed over internet so
a lot of challenges arises during maintaining a secure cloud. Some cloud
security challenges are
● Control over cloud data
● Misconfiguration
● Ever changing workload
● Access Management
● Disaster recovery
Thank you

More Related Content

PPTX
All About Cybersecurity Frameworks.pptx
PDF
Cybersecurity Frameworks | NIST Cybersecurity Framework | Cybersecurity Certi...
PDF
Cybersecurity Roadmap Development for Executives
ODP
Cyber security awareness
PPTX
The Zero Trust Model of Information Security
PPT
Information security management
PDF
Cyber Security
PPTX
Cyber attacks and IT security management in 2025
All About Cybersecurity Frameworks.pptx
Cybersecurity Frameworks | NIST Cybersecurity Framework | Cybersecurity Certi...
Cybersecurity Roadmap Development for Executives
Cyber security awareness
The Zero Trust Model of Information Security
Information security management
Cyber Security
Cyber attacks and IT security management in 2025

What's hot (20)

PDF
Cybersecurity Skills in Industry 4.0
PPTX
Cybersecurity Awareness Training
PDF
Introduction to Cybersecurity
PDF
Cyber Threat Intelligence
PPTX
Cybersecurity Attack Vectors: How to Protect Your Organization
PPTX
Cybercrime and Security
PDF
What is Cyber Security? | Introduction to Cyber Security | Cyber Security Tra...
PDF
Cyber security
PPTX
Risk Assessment and Threat Modeling
PPTX
Cyber Security Seminar.pptx
PPTX
Cyber security
PPTX
Introduction to cyber security
PDF
Cloud Security Demystified
DOCX
Network security
PDF
Cybersecurity Employee Training
PPTX
Cyber security
PDF
Cybersecurity Career Paths | Skills Required in Cybersecurity Career | Learn ...
PDF
Introduction to NIST Cybersecurity Framework
PPTX
Basics of Network Security
PPTX
Security Operation Center - Design & Build
Cybersecurity Skills in Industry 4.0
Cybersecurity Awareness Training
Introduction to Cybersecurity
Cyber Threat Intelligence
Cybersecurity Attack Vectors: How to Protect Your Organization
Cybercrime and Security
What is Cyber Security? | Introduction to Cyber Security | Cyber Security Tra...
Cyber security
Risk Assessment and Threat Modeling
Cyber Security Seminar.pptx
Cyber security
Introduction to cyber security
Cloud Security Demystified
Network security
Cybersecurity Employee Training
Cyber security
Cybersecurity Career Paths | Skills Required in Cybersecurity Career | Learn ...
Introduction to NIST Cybersecurity Framework
Basics of Network Security
Security Operation Center - Design & Build
Ad

Similar to Security overview of cloud computing.pptx (20)

PPTX
CLOUD SECURITY 117 presentation diploma ppt
PDF
Building a Resilient Cloud Security Architecture: Types, Challenges, and Best...
PDF
Secure Your Sky_ Mastering Cloud Web Security.pdf
PDF
Cloud Transformation Services.pdf
PDF
Cloud Security Challenges, Types, and Best Practises.pdf
PDF
Top Cloud Infrastructure Practices And Strategies For Maximum Security.pdf
PPTX
cloud security.pptx
DOCX
UNIT -V.docx
PDF
What is Cloud Based Network Security ? | Reves Enterprise
PDF
Cloud Computing Security - Cloud Controls Security
PDF
Trust based Mechanism for Secure Cloud Computing Environment: A Survey
PDF
Module 5-cloud computing-SECURITY IN THE CLOUD
PPTX
What is the significance of cybersecurity in cloud.pptx
PDF
Single Sign-on Authentication Model for Cloud Computing using Kerberos
PPTX
What is the significance of cybersecurity in cloud.pptx
PDF
Tools and Techniques for Cloud Security download
PDF
Cloud Security - Types, Common Threats & Tips To Mitigate.pdf
PDF
Cloud Security Network – Definition and Best Practices.pdf
PDF
the_role_of_resilience_data_in_ensuring_cloud_security.pdf
DOC
Security Issues in Cloud Computing by rahul abhishek
CLOUD SECURITY 117 presentation diploma ppt
Building a Resilient Cloud Security Architecture: Types, Challenges, and Best...
Secure Your Sky_ Mastering Cloud Web Security.pdf
Cloud Transformation Services.pdf
Cloud Security Challenges, Types, and Best Practises.pdf
Top Cloud Infrastructure Practices And Strategies For Maximum Security.pdf
cloud security.pptx
UNIT -V.docx
What is Cloud Based Network Security ? | Reves Enterprise
Cloud Computing Security - Cloud Controls Security
Trust based Mechanism for Secure Cloud Computing Environment: A Survey
Module 5-cloud computing-SECURITY IN THE CLOUD
What is the significance of cybersecurity in cloud.pptx
Single Sign-on Authentication Model for Cloud Computing using Kerberos
What is the significance of cybersecurity in cloud.pptx
Tools and Techniques for Cloud Security download
Cloud Security - Types, Common Threats & Tips To Mitigate.pdf
Cloud Security Network – Definition and Best Practices.pdf
the_role_of_resilience_data_in_ensuring_cloud_security.pdf
Security Issues in Cloud Computing by rahul abhishek
Ad

More from NeyaShree1 (12)

PPTX
WE PPT.pptx
PPTX
HDI vs GDI-1.pptx
PPTX
AI and ML.pptx
PPTX
IOT.pptx
PPTX
Edge detection.pptx
PPTX
Nosql .pptx
PPTX
Cryptography .pptx
PPTX
Dos.pptx
PPTX
Python .pptx
PDF
Dsa .pdf
PDF
Dsa .pdf
PPTX
CD.pptx
WE PPT.pptx
HDI vs GDI-1.pptx
AI and ML.pptx
IOT.pptx
Edge detection.pptx
Nosql .pptx
Cryptography .pptx
Dos.pptx
Python .pptx
Dsa .pdf
Dsa .pdf
CD.pptx

Recently uploaded (20)

PDF
Chapter 2 Heredity, Prenatal Development, and Birth.pdf
PDF
Pre independence Education in Inndia.pdf
PDF
3rd Neelam Sanjeevareddy Memorial Lecture.pdf
PDF
grade 11-chemistry_fetena_net_5883.pdf teacher guide for all student
PDF
2.FourierTransform-ShortQuestionswithAnswers.pdf
PPTX
Introduction to Child Health Nursing – Unit I | Child Health Nursing I | B.Sc...
PPTX
human mycosis Human fungal infections are called human mycosis..pptx
PDF
ANTIBIOTICS.pptx.pdf………………… xxxxxxxxxxxxx
PPTX
master seminar digital applications in india
PPTX
Final Presentation General Medicine 03-08-2024.pptx
PPTX
The Healthy Child – Unit II | Child Health Nursing I | B.Sc Nursing 5th Semester
PDF
Complications of Minimal Access Surgery at WLH
PDF
VCE English Exam - Section C Student Revision Booklet
PPTX
PPH.pptx obstetrics and gynecology in nursing
PDF
01-Introduction-to-Information-Management.pdf
PDF
Business Ethics Teaching Materials for college
PPTX
Renaissance Architecture: A Journey from Faith to Humanism
PDF
RMMM.pdf make it easy to upload and study
PDF
Module 4: Burden of Disease Tutorial Slides S2 2025
PDF
TR - Agricultural Crops Production NC III.pdf
Chapter 2 Heredity, Prenatal Development, and Birth.pdf
Pre independence Education in Inndia.pdf
3rd Neelam Sanjeevareddy Memorial Lecture.pdf
grade 11-chemistry_fetena_net_5883.pdf teacher guide for all student
2.FourierTransform-ShortQuestionswithAnswers.pdf
Introduction to Child Health Nursing – Unit I | Child Health Nursing I | B.Sc...
human mycosis Human fungal infections are called human mycosis..pptx
ANTIBIOTICS.pptx.pdf………………… xxxxxxxxxxxxx
master seminar digital applications in india
Final Presentation General Medicine 03-08-2024.pptx
The Healthy Child – Unit II | Child Health Nursing I | B.Sc Nursing 5th Semester
Complications of Minimal Access Surgery at WLH
VCE English Exam - Section C Student Revision Booklet
PPH.pptx obstetrics and gynecology in nursing
01-Introduction-to-Information-Management.pdf
Business Ethics Teaching Materials for college
Renaissance Architecture: A Journey from Faith to Humanism
RMMM.pdf make it easy to upload and study
Module 4: Burden of Disease Tutorial Slides S2 2025
TR - Agricultural Crops Production NC III.pdf

Security overview of cloud computing.pptx

  • 2. What is Cloud Computing ? Cloud computing refers to the on demand delivery of computing services such as applications, computing resources, storage, database, networking resources etc. through internet and on a pay as per use basis. At the present time the demand for cloud computing services are increasing with respect to that demand for cloud computing skills is also increasing. It provides three main types of service models i.e. SaaS (Software as a Service), PaaS (Platform as a Service) and IaaS (Infrastructure as a Service). With this as starting from small to large organizations have started using cloud services so depending upon their requirement they go for the different types of cloud like Public cloud, Private cloud, Hybrid cloud, Community cloud.
  • 3. Security In Cloud Computing : Cloud computing which is one of the most demanding technology of the current time, starting from small to large organizations have started using cloud computing services. Where there are different types of cloud deployment models are available and cloud services are provided as per requirement like that internally and externally security is maintained to keep the cloud system safe. Cloud computing security or cloud security is an important concern which refers to the act of protecting cloud environments, data, information and applications against unauthorized access, DDOS attacks, malwares, hackers and other similar attacks. Community Cloud : These allow to a limited set of organizations or employees to access a shared cloud computing service environment.
  • 4. Planning of security in Cloud Computing : As security is a major concern in cloud implementation, so an organization have to plan for security based on some factors like below represents the three main factors on which planning of cloud security depends. Resources that can be moved to the cloud and test its sensitivity risk are picked. The type of cloud is to be considered. The risk in the deployment of the cloud depends on the types of cloud and service models.
  • 5. Types of Cloud Computing Security Controls : There are 4 types of cloud computing security controls , Deterrent Controls : Deterrent controls are designed to block nefarious attacks on a cloud system. These come in handy when there are insider attackers. Preventive Controls : Preventive controls make the system resilient to attacks by eliminating vulnerabilities in it. Detective Controls : It identifies and reacts to security threats and control. Some examples of detective control software are Intrusion detection software and network security monitoring tools. Corrective Controls : In the event of a security attack these controls are activated. They limit the damage caused by the attack.
  • 6. Importance of cloud security : For the organizations making their transition to cloud, cloud security is an essential factor while choosing a cloud provider. The attacks are getting stronger day by day and so the security needs to keep up with it. For this purpose it is essential to pick a cloud provider who offers the best security and is customized with the organization’s infrastructure. Cloud security has a lot of benefits – ● Centralized security : Centralized security results in centralizing protection. As managing all the devices and endpoints is not an easy task cloud security helps in doing so. This results in enhancing traffic analysis and web filtering which means less policy and software updates.
  • 7. ● Reduced costs : Investing in cloud computing and cloud security results in less expenditure in hardware and also less manpower in administration ● Reduced Administration : It makes it easier to administer the organization and does not have manual security configuration and constant security updates. ● Reliability : These are very reliable and the cloud can be accessed from anywhere with any device with proper authorization. When we are thinking about cloud security it includes various types of security like access control for authorized access, network segmentation for maintaining isolated data, encryption for encoded data transfer, vulnerability check for patching vulnerable areas, security monitoring for keeping eye on various security attacks and disaster recovery for backup and recovery during data loss.
  • 8. There are different types of security techniques which are implemented to make the cloud computing system more secure such as SSL (Secure Socket Layer) Encryption, Multi Tenancy based Access Control, Intrusion Detection System, firewalls, penetration testing, tokenization, VPN (Virtual Private Networks), and avoiding public internet connections and many more techniques. But the thing is not so simple how we think, even implementation of number of security techniques there is always security issues are involved for the cloud system. As cloud system is managed and accessed over internet so a lot of challenges arises during maintaining a secure cloud. Some cloud security challenges are ● Control over cloud data ● Misconfiguration ● Ever changing workload ● Access Management ● Disaster recovery