尊敬的 微信汇率:1円 ≈ 0.046239 元 支付宝汇率:1円 ≈ 0.04633元 [退出登录]
SlideShare a Scribd company logo
“Cloud Security”
By-
Sofiya khan
B.sc.(hons.)cs
Table Of
Contents
1.
What is
cloud
computing?
3.
Why is it imp.?
2.
What is cloud
security?
4.
What are the
security risks in
cloud?
5.
How to secure?
6.
Basic cyber
security tips
1.What is
Cloud
Computing?
● Cloud computing is the delivery of different services
through the Internet. These resources include tools
and applications like data storage, servers,
databases, networking, and software.
● Rather than keeping files on a proprietary hard drive
or local storage device, cloud-based storage makes it
possible to save them to a remote database. As long
as an electronic device has access to the web, it has
access to the data and the software programs to run
it.
What is Cloud security?
Cloud security is a collection of procedures and technology designed to
address external and internal threats to business security.
Cloud security is a discipline of cyber security dedicated to securing
cloud computing systems. This includes keeping data private and safe
across online-based infrastructure, applications, and platforms.
Why is it important?
● As companies continue to migrate to the cloud, understanding the
security requirements for keeping data safe has become critical.
● Every component — from core infrastructure to small data like emails
and documents — can now be located and accessed remotely on
24/7 web-based connections. Threat actors can now target large
multi-organizational data centers and cause immense data breaches.
What are the security risks in cloud
?
1- DATA LOSS
➔It is also known as Data leakage because it is a process in which
data is being deleted, corrupted, and unreadable by a user, software,
or application.
➔It is the most common cloud security risk.
2-HACKED INTERFACES AND API
➔As cloud computing is completely dependent on Internet, so, these
APIs and interfaces are available in the public domain that can be
accessed by third party easily and harmed and hacked by the
hackers in a matter of time.
➔So, protecting Interfaces and APIs is also very important.
What are the security risks in cloud
?
3- DATA BREACH
➔It is the process in which the confidential data is viewed, accessed,
or stolen by the third party without any authorization, so
organization’s data is hacked by the hackers.
4-VENDOR LOCK-IN
➔It is one of the biggest security risks in cloud computing.
➔Organizations may face difficulty while transferring their services
from one vendor to another, as different vendors provide different
platforms that can caught difficulty while moving one cloud to another
without experiencing issues such as high costs,lrgal constraints, or
technical incompatibilities.
What are the security risks in cloud
?
5- SPECTRE AND MELTDOWN
➔It allows program to view and steal data which is currently processed
on computer that can run on personal computers, mobile, and in the
cloud. It can store the password, your personal information such as
images, emails, documents in the memory of other running
programs.
6-DENIAL OF SERVICES(DOS) ATTACKS
➔It occurs when the system receives too much traffic to buffer the
server.
➔Mostly, Dos attackers target web servers of large organization such
as banking, media companies, etc.
➔To recover the data, DoS attackers charge a great deal of time and
money to handle the data.
What are the security risks in cloud
?
7- ACCOUNT HIJACKING
➔It is a serious security risk in cloud computing.
➔It is the process in which individual user’s account or organization’s
cloud account( bank account, email account, social media account) is
stolen by hackers.
➔The hackers use the stolen account to perform unauthorized
activities.
How to secure?
1-Encryption
Encryption is one of the best ways to secure your cloud computing
systems. There are several different ways of using encryption::
1. Communications encryption with the cloud in their entirety.
2. Particularly sensitive data encryption, such as account credentials.
3. End-to-end encryption of all data that is uploaded to the cloud.
2-Identity and access management(IAM)
IAM tools and services allow enterprises to deploy policy-driven
enforcement protocols for all users attempting to access both on-premises
and cloud-based services. The core functionality of IAM is to create digital
identities for all users so they can be actively monitored and restricted
when necessary during all data interactions.
How to secure?
3-Data loss prevention(DLP)
Data loss prevention (DLP) services offer a set of tools and services
designed to ensure the security of regulated cloud data. DLP solutions
use a combination of remediation alerts, data encryption, and other
preventative measures to protect all stored data, whether at rest or in
motion.
4-Security information and event management(SIEM)
It provides a comprehensive security orchestration solution that
automates threat monitoring, detection, and response in cloud-based
environments.
Basic cyber security solution tips
1-Never leave the default settings unchanged.
2-Use strong passwords.
3-Use a password manager.
4-Protect all the devices.
5-Back up your data regularly.
6-Modify permissions.
7-Protect yourself with anti-virus and anti-malware.
8-Avoid accessing your data on public Wi-Fi.
9-Actively manage your accounts and services.
10-Have a look at all these points regularly.
THANK YOU!

More Related Content

Similar to Cloud_security.pptx

Seven deadly threats and vulnerabilities in cloud
Seven deadly threats and vulnerabilities in cloudSeven deadly threats and vulnerabilities in cloud
Seven deadly threats and vulnerabilities in cloud
cloudresearcher
 
Seven Deadly Threats and Vulnerabilities in Cloud Computing
Seven Deadly Threats and  Vulnerabilities in Cloud ComputingSeven Deadly Threats and  Vulnerabilities in Cloud Computing
Seven Deadly Threats and Vulnerabilities in Cloud Computing
Mervat Bamiah
 
Cloud Security Network – Definition and Best Practices.pdf
Cloud Security Network – Definition and Best Practices.pdfCloud Security Network – Definition and Best Practices.pdf
Cloud Security Network – Definition and Best Practices.pdf
qualysectechnology98
 
Investigative analysis of security issues and challenges in cloud computing a...
Investigative analysis of security issues and challenges in cloud computing a...Investigative analysis of security issues and challenges in cloud computing a...
Investigative analysis of security issues and challenges in cloud computing a...
IAEME Publication
 
A Comprehensive Guide to Cloud Computing Security | CyberPro Magazine
A Comprehensive Guide to Cloud Computing Security | CyberPro MagazineA Comprehensive Guide to Cloud Computing Security | CyberPro Magazine
A Comprehensive Guide to Cloud Computing Security | CyberPro Magazine
cyberprosocial
 
Cloud Application Security Best Practices To follow.pdf
Cloud Application Security Best Practices To follow.pdfCloud Application Security Best Practices To follow.pdf
Cloud Application Security Best Practices To follow.pdf
Techugo
 
cloud security.pptx
cloud security.pptxcloud security.pptx
cloud security.pptx
Nickjohn33
 
1784 1788
1784 17881784 1788
1784 1788
Editor IJARCET
 
1784 1788
1784 17881784 1788
1784 1788
Editor IJARCET
 
MIST Effective Masquerade Attack Detection in the Cloud
MIST Effective Masquerade Attack Detection in the CloudMIST Effective Masquerade Attack Detection in the Cloud
MIST Effective Masquerade Attack Detection in the Cloud
Kumar Goud
 
Trust based Mechanism for Secure Cloud Computing Environment: A Survey
Trust based Mechanism for Secure Cloud Computing Environment: A SurveyTrust based Mechanism for Secure Cloud Computing Environment: A Survey
Trust based Mechanism for Secure Cloud Computing Environment: A Survey
inventionjournals
 
Cloud Application Security Best Practices To follow.pdf
Cloud Application Security Best Practices To follow.pdfCloud Application Security Best Practices To follow.pdf
Cloud Application Security Best Practices To follow.pdf
Techugo
 
legal and ethical.ppt
legal and ethical.pptlegal and ethical.ppt
legal and ethical.ppt
Adhisthangurung
 
Data Storage Issues in Cloud Computing
Data Storage Issues in Cloud ComputingData Storage Issues in Cloud Computing
Data Storage Issues in Cloud Computing
ijtsrd
 
E-Mail Systems In Cloud Computing Environment Privacy,Trust And Security Chal...
E-Mail Systems In Cloud Computing Environment Privacy,Trust And Security Chal...E-Mail Systems In Cloud Computing Environment Privacy,Trust And Security Chal...
E-Mail Systems In Cloud Computing Environment Privacy,Trust And Security Chal...
IJERA Editor
 
cyber security
cyber security cyber security
cyber security
sumitbajpeyee
 
Presentation1.pptx
Presentation1.pptxPresentation1.pptx
Presentation1.pptx
chWaqasZahid
 
Solutions of cloud computing security issues
Solutions of cloud computing security issuesSolutions of cloud computing security issues
Solutions of cloud computing security issues
Jahangeer Qadiree
 
PROJECT REPORT.docx
PROJECT REPORT.docxPROJECT REPORT.docx
PROJECT REPORT.docx
Sakamsivasankarreddy
 
Information Systems.pptx
Information Systems.pptxInformation Systems.pptx
Information Systems.pptx
KnownId
 

Similar to Cloud_security.pptx (20)

Seven deadly threats and vulnerabilities in cloud
Seven deadly threats and vulnerabilities in cloudSeven deadly threats and vulnerabilities in cloud
Seven deadly threats and vulnerabilities in cloud
 
Seven Deadly Threats and Vulnerabilities in Cloud Computing
Seven Deadly Threats and  Vulnerabilities in Cloud ComputingSeven Deadly Threats and  Vulnerabilities in Cloud Computing
Seven Deadly Threats and Vulnerabilities in Cloud Computing
 
Cloud Security Network – Definition and Best Practices.pdf
Cloud Security Network – Definition and Best Practices.pdfCloud Security Network – Definition and Best Practices.pdf
Cloud Security Network – Definition and Best Practices.pdf
 
Investigative analysis of security issues and challenges in cloud computing a...
Investigative analysis of security issues and challenges in cloud computing a...Investigative analysis of security issues and challenges in cloud computing a...
Investigative analysis of security issues and challenges in cloud computing a...
 
A Comprehensive Guide to Cloud Computing Security | CyberPro Magazine
A Comprehensive Guide to Cloud Computing Security | CyberPro MagazineA Comprehensive Guide to Cloud Computing Security | CyberPro Magazine
A Comprehensive Guide to Cloud Computing Security | CyberPro Magazine
 
Cloud Application Security Best Practices To follow.pdf
Cloud Application Security Best Practices To follow.pdfCloud Application Security Best Practices To follow.pdf
Cloud Application Security Best Practices To follow.pdf
 
cloud security.pptx
cloud security.pptxcloud security.pptx
cloud security.pptx
 
1784 1788
1784 17881784 1788
1784 1788
 
1784 1788
1784 17881784 1788
1784 1788
 
MIST Effective Masquerade Attack Detection in the Cloud
MIST Effective Masquerade Attack Detection in the CloudMIST Effective Masquerade Attack Detection in the Cloud
MIST Effective Masquerade Attack Detection in the Cloud
 
Trust based Mechanism for Secure Cloud Computing Environment: A Survey
Trust based Mechanism for Secure Cloud Computing Environment: A SurveyTrust based Mechanism for Secure Cloud Computing Environment: A Survey
Trust based Mechanism for Secure Cloud Computing Environment: A Survey
 
Cloud Application Security Best Practices To follow.pdf
Cloud Application Security Best Practices To follow.pdfCloud Application Security Best Practices To follow.pdf
Cloud Application Security Best Practices To follow.pdf
 
legal and ethical.ppt
legal and ethical.pptlegal and ethical.ppt
legal and ethical.ppt
 
Data Storage Issues in Cloud Computing
Data Storage Issues in Cloud ComputingData Storage Issues in Cloud Computing
Data Storage Issues in Cloud Computing
 
E-Mail Systems In Cloud Computing Environment Privacy,Trust And Security Chal...
E-Mail Systems In Cloud Computing Environment Privacy,Trust And Security Chal...E-Mail Systems In Cloud Computing Environment Privacy,Trust And Security Chal...
E-Mail Systems In Cloud Computing Environment Privacy,Trust And Security Chal...
 
cyber security
cyber security cyber security
cyber security
 
Presentation1.pptx
Presentation1.pptxPresentation1.pptx
Presentation1.pptx
 
Solutions of cloud computing security issues
Solutions of cloud computing security issuesSolutions of cloud computing security issues
Solutions of cloud computing security issues
 
PROJECT REPORT.docx
PROJECT REPORT.docxPROJECT REPORT.docx
PROJECT REPORT.docx
 
Information Systems.pptx
Information Systems.pptxInformation Systems.pptx
Information Systems.pptx
 

Recently uploaded

Creative Restart 2024: Mike Martin - Finding a way around “no”
Creative Restart 2024: Mike Martin - Finding a way around “no”Creative Restart 2024: Mike Martin - Finding a way around “no”
Creative Restart 2024: Mike Martin - Finding a way around “no”
Taste
 
220711130095 Tanu Pandey message currency, communication speed & control EPC ...
220711130095 Tanu Pandey message currency, communication speed & control EPC ...220711130095 Tanu Pandey message currency, communication speed & control EPC ...
220711130095 Tanu Pandey message currency, communication speed & control EPC ...
Kalna College
 
Post init hook in the odoo 17 ERP Module
Post init hook in the  odoo 17 ERP ModulePost init hook in the  odoo 17 ERP Module
Post init hook in the odoo 17 ERP Module
Celine George
 
Diversity Quiz Prelims by Quiz Club, IIT Kanpur
Diversity Quiz Prelims by Quiz Club, IIT KanpurDiversity Quiz Prelims by Quiz Club, IIT Kanpur
Diversity Quiz Prelims by Quiz Club, IIT Kanpur
Quiz Club IIT Kanpur
 
Contiguity Of Various Message Forms - Rupam Chandra.pptx
Contiguity Of Various Message Forms - Rupam Chandra.pptxContiguity Of Various Message Forms - Rupam Chandra.pptx
Contiguity Of Various Message Forms - Rupam Chandra.pptx
Kalna College
 
Erasmus + DISSEMINATION ACTIVITIES Croatia
Erasmus + DISSEMINATION ACTIVITIES CroatiaErasmus + DISSEMINATION ACTIVITIES Croatia
Erasmus + DISSEMINATION ACTIVITIES Croatia
whatchangedhowreflec
 
Dreamin in Color '24 - (Workshop) Design an API Specification with MuleSoft's...
Dreamin in Color '24 - (Workshop) Design an API Specification with MuleSoft's...Dreamin in Color '24 - (Workshop) Design an API Specification with MuleSoft's...
Dreamin in Color '24 - (Workshop) Design an API Specification with MuleSoft's...
Alexandra N. Martinez
 
220711130082 Srabanti Bag Internet Resources For Natural Science
220711130082 Srabanti Bag Internet Resources For Natural Science220711130082 Srabanti Bag Internet Resources For Natural Science
220711130082 Srabanti Bag Internet Resources For Natural Science
Kalna College
 
220711130088 Sumi Basak Virtual University EPC 3.pptx
220711130088 Sumi Basak Virtual University EPC 3.pptx220711130088 Sumi Basak Virtual University EPC 3.pptx
220711130088 Sumi Basak Virtual University EPC 3.pptx
Kalna College
 
nutrition in plants chapter 1 class 7...
nutrition in plants chapter 1 class 7...nutrition in plants chapter 1 class 7...
nutrition in plants chapter 1 class 7...
chaudharyreet2244
 
8+8+8 Rule Of Time Management For Better Productivity
8+8+8 Rule Of Time Management For Better Productivity8+8+8 Rule Of Time Management For Better Productivity
8+8+8 Rule Of Time Management For Better Productivity
RuchiRathor2
 
Ethiopia and Eritrea Eritrea's journey has been marked by resilience and dete...
Ethiopia and Eritrea Eritrea's journey has been marked by resilience and dete...Ethiopia and Eritrea Eritrea's journey has been marked by resilience and dete...
Ethiopia and Eritrea Eritrea's journey has been marked by resilience and dete...
biruktesfaye27
 
How to Setup Default Value for a Field in Odoo 17
How to Setup Default Value for a Field in Odoo 17How to Setup Default Value for a Field in Odoo 17
How to Setup Default Value for a Field in Odoo 17
Celine George
 
BỘ BÀI TẬP TEST THEO UNIT - FORM 2025 - TIẾNG ANH 12 GLOBAL SUCCESS - KÌ 1 (B...
BỘ BÀI TẬP TEST THEO UNIT - FORM 2025 - TIẾNG ANH 12 GLOBAL SUCCESS - KÌ 1 (B...BỘ BÀI TẬP TEST THEO UNIT - FORM 2025 - TIẾNG ANH 12 GLOBAL SUCCESS - KÌ 1 (B...
BỘ BÀI TẬP TEST THEO UNIT - FORM 2025 - TIẾNG ANH 12 GLOBAL SUCCESS - KÌ 1 (B...
Nguyen Thanh Tu Collection
 
The basics of sentences session 8pptx.pptx
The basics of sentences session 8pptx.pptxThe basics of sentences session 8pptx.pptx
The basics of sentences session 8pptx.pptx
heathfieldcps1
 
220711130083 SUBHASHREE RAKSHIT Internet resources for social science
220711130083 SUBHASHREE RAKSHIT  Internet resources for social science220711130083 SUBHASHREE RAKSHIT  Internet resources for social science
220711130083 SUBHASHREE RAKSHIT Internet resources for social science
Kalna College
 
CIS 4200-02 Group 1 Final Project Report (1).pdf
CIS 4200-02 Group 1 Final Project Report (1).pdfCIS 4200-02 Group 1 Final Project Report (1).pdf
CIS 4200-02 Group 1 Final Project Report (1).pdf
blueshagoo1
 
How to Create a Stage or a Pipeline in Odoo 17 CRM
How to Create a Stage or a Pipeline in Odoo 17 CRMHow to Create a Stage or a Pipeline in Odoo 17 CRM
How to Create a Stage or a Pipeline in Odoo 17 CRM
Celine George
 
欧洲杯下注-欧洲杯下注押注官网-欧洲杯下注押注网站|【​网址​🎉ac44.net🎉​】
欧洲杯下注-欧洲杯下注押注官网-欧洲杯下注押注网站|【​网址​🎉ac44.net🎉​】欧洲杯下注-欧洲杯下注押注官网-欧洲杯下注押注网站|【​网址​🎉ac44.net🎉​】
欧洲杯下注-欧洲杯下注押注官网-欧洲杯下注押注网站|【​网址​🎉ac44.net🎉​】
andagarcia212
 
family welfare programme-pptx details welfare
family welfare programme-pptx details welfarefamily welfare programme-pptx details welfare
family welfare programme-pptx details welfare
AnushreeBhunia
 

Recently uploaded (20)

Creative Restart 2024: Mike Martin - Finding a way around “no”
Creative Restart 2024: Mike Martin - Finding a way around “no”Creative Restart 2024: Mike Martin - Finding a way around “no”
Creative Restart 2024: Mike Martin - Finding a way around “no”
 
220711130095 Tanu Pandey message currency, communication speed & control EPC ...
220711130095 Tanu Pandey message currency, communication speed & control EPC ...220711130095 Tanu Pandey message currency, communication speed & control EPC ...
220711130095 Tanu Pandey message currency, communication speed & control EPC ...
 
Post init hook in the odoo 17 ERP Module
Post init hook in the  odoo 17 ERP ModulePost init hook in the  odoo 17 ERP Module
Post init hook in the odoo 17 ERP Module
 
Diversity Quiz Prelims by Quiz Club, IIT Kanpur
Diversity Quiz Prelims by Quiz Club, IIT KanpurDiversity Quiz Prelims by Quiz Club, IIT Kanpur
Diversity Quiz Prelims by Quiz Club, IIT Kanpur
 
Contiguity Of Various Message Forms - Rupam Chandra.pptx
Contiguity Of Various Message Forms - Rupam Chandra.pptxContiguity Of Various Message Forms - Rupam Chandra.pptx
Contiguity Of Various Message Forms - Rupam Chandra.pptx
 
Erasmus + DISSEMINATION ACTIVITIES Croatia
Erasmus + DISSEMINATION ACTIVITIES CroatiaErasmus + DISSEMINATION ACTIVITIES Croatia
Erasmus + DISSEMINATION ACTIVITIES Croatia
 
Dreamin in Color '24 - (Workshop) Design an API Specification with MuleSoft's...
Dreamin in Color '24 - (Workshop) Design an API Specification with MuleSoft's...Dreamin in Color '24 - (Workshop) Design an API Specification with MuleSoft's...
Dreamin in Color '24 - (Workshop) Design an API Specification with MuleSoft's...
 
220711130082 Srabanti Bag Internet Resources For Natural Science
220711130082 Srabanti Bag Internet Resources For Natural Science220711130082 Srabanti Bag Internet Resources For Natural Science
220711130082 Srabanti Bag Internet Resources For Natural Science
 
220711130088 Sumi Basak Virtual University EPC 3.pptx
220711130088 Sumi Basak Virtual University EPC 3.pptx220711130088 Sumi Basak Virtual University EPC 3.pptx
220711130088 Sumi Basak Virtual University EPC 3.pptx
 
nutrition in plants chapter 1 class 7...
nutrition in plants chapter 1 class 7...nutrition in plants chapter 1 class 7...
nutrition in plants chapter 1 class 7...
 
8+8+8 Rule Of Time Management For Better Productivity
8+8+8 Rule Of Time Management For Better Productivity8+8+8 Rule Of Time Management For Better Productivity
8+8+8 Rule Of Time Management For Better Productivity
 
Ethiopia and Eritrea Eritrea's journey has been marked by resilience and dete...
Ethiopia and Eritrea Eritrea's journey has been marked by resilience and dete...Ethiopia and Eritrea Eritrea's journey has been marked by resilience and dete...
Ethiopia and Eritrea Eritrea's journey has been marked by resilience and dete...
 
How to Setup Default Value for a Field in Odoo 17
How to Setup Default Value for a Field in Odoo 17How to Setup Default Value for a Field in Odoo 17
How to Setup Default Value for a Field in Odoo 17
 
BỘ BÀI TẬP TEST THEO UNIT - FORM 2025 - TIẾNG ANH 12 GLOBAL SUCCESS - KÌ 1 (B...
BỘ BÀI TẬP TEST THEO UNIT - FORM 2025 - TIẾNG ANH 12 GLOBAL SUCCESS - KÌ 1 (B...BỘ BÀI TẬP TEST THEO UNIT - FORM 2025 - TIẾNG ANH 12 GLOBAL SUCCESS - KÌ 1 (B...
BỘ BÀI TẬP TEST THEO UNIT - FORM 2025 - TIẾNG ANH 12 GLOBAL SUCCESS - KÌ 1 (B...
 
The basics of sentences session 8pptx.pptx
The basics of sentences session 8pptx.pptxThe basics of sentences session 8pptx.pptx
The basics of sentences session 8pptx.pptx
 
220711130083 SUBHASHREE RAKSHIT Internet resources for social science
220711130083 SUBHASHREE RAKSHIT  Internet resources for social science220711130083 SUBHASHREE RAKSHIT  Internet resources for social science
220711130083 SUBHASHREE RAKSHIT Internet resources for social science
 
CIS 4200-02 Group 1 Final Project Report (1).pdf
CIS 4200-02 Group 1 Final Project Report (1).pdfCIS 4200-02 Group 1 Final Project Report (1).pdf
CIS 4200-02 Group 1 Final Project Report (1).pdf
 
How to Create a Stage or a Pipeline in Odoo 17 CRM
How to Create a Stage or a Pipeline in Odoo 17 CRMHow to Create a Stage or a Pipeline in Odoo 17 CRM
How to Create a Stage or a Pipeline in Odoo 17 CRM
 
欧洲杯下注-欧洲杯下注押注官网-欧洲杯下注押注网站|【​网址​🎉ac44.net🎉​】
欧洲杯下注-欧洲杯下注押注官网-欧洲杯下注押注网站|【​网址​🎉ac44.net🎉​】欧洲杯下注-欧洲杯下注押注官网-欧洲杯下注押注网站|【​网址​🎉ac44.net🎉​】
欧洲杯下注-欧洲杯下注押注官网-欧洲杯下注押注网站|【​网址​🎉ac44.net🎉​】
 
family welfare programme-pptx details welfare
family welfare programme-pptx details welfarefamily welfare programme-pptx details welfare
family welfare programme-pptx details welfare
 

Cloud_security.pptx

  • 2. Table Of Contents 1. What is cloud computing? 3. Why is it imp.? 2. What is cloud security? 4. What are the security risks in cloud? 5. How to secure? 6. Basic cyber security tips
  • 3. 1.What is Cloud Computing? ● Cloud computing is the delivery of different services through the Internet. These resources include tools and applications like data storage, servers, databases, networking, and software. ● Rather than keeping files on a proprietary hard drive or local storage device, cloud-based storage makes it possible to save them to a remote database. As long as an electronic device has access to the web, it has access to the data and the software programs to run it.
  • 4. What is Cloud security? Cloud security is a collection of procedures and technology designed to address external and internal threats to business security. Cloud security is a discipline of cyber security dedicated to securing cloud computing systems. This includes keeping data private and safe across online-based infrastructure, applications, and platforms.
  • 5. Why is it important? ● As companies continue to migrate to the cloud, understanding the security requirements for keeping data safe has become critical. ● Every component — from core infrastructure to small data like emails and documents — can now be located and accessed remotely on 24/7 web-based connections. Threat actors can now target large multi-organizational data centers and cause immense data breaches.
  • 6. What are the security risks in cloud ? 1- DATA LOSS ➔It is also known as Data leakage because it is a process in which data is being deleted, corrupted, and unreadable by a user, software, or application. ➔It is the most common cloud security risk. 2-HACKED INTERFACES AND API ➔As cloud computing is completely dependent on Internet, so, these APIs and interfaces are available in the public domain that can be accessed by third party easily and harmed and hacked by the hackers in a matter of time. ➔So, protecting Interfaces and APIs is also very important.
  • 7. What are the security risks in cloud ? 3- DATA BREACH ➔It is the process in which the confidential data is viewed, accessed, or stolen by the third party without any authorization, so organization’s data is hacked by the hackers. 4-VENDOR LOCK-IN ➔It is one of the biggest security risks in cloud computing. ➔Organizations may face difficulty while transferring their services from one vendor to another, as different vendors provide different platforms that can caught difficulty while moving one cloud to another without experiencing issues such as high costs,lrgal constraints, or technical incompatibilities.
  • 8. What are the security risks in cloud ? 5- SPECTRE AND MELTDOWN ➔It allows program to view and steal data which is currently processed on computer that can run on personal computers, mobile, and in the cloud. It can store the password, your personal information such as images, emails, documents in the memory of other running programs. 6-DENIAL OF SERVICES(DOS) ATTACKS ➔It occurs when the system receives too much traffic to buffer the server. ➔Mostly, Dos attackers target web servers of large organization such as banking, media companies, etc. ➔To recover the data, DoS attackers charge a great deal of time and money to handle the data.
  • 9. What are the security risks in cloud ? 7- ACCOUNT HIJACKING ➔It is a serious security risk in cloud computing. ➔It is the process in which individual user’s account or organization’s cloud account( bank account, email account, social media account) is stolen by hackers. ➔The hackers use the stolen account to perform unauthorized activities.
  • 10.
  • 11. How to secure? 1-Encryption Encryption is one of the best ways to secure your cloud computing systems. There are several different ways of using encryption:: 1. Communications encryption with the cloud in their entirety. 2. Particularly sensitive data encryption, such as account credentials. 3. End-to-end encryption of all data that is uploaded to the cloud. 2-Identity and access management(IAM) IAM tools and services allow enterprises to deploy policy-driven enforcement protocols for all users attempting to access both on-premises and cloud-based services. The core functionality of IAM is to create digital identities for all users so they can be actively monitored and restricted when necessary during all data interactions.
  • 12. How to secure? 3-Data loss prevention(DLP) Data loss prevention (DLP) services offer a set of tools and services designed to ensure the security of regulated cloud data. DLP solutions use a combination of remediation alerts, data encryption, and other preventative measures to protect all stored data, whether at rest or in motion. 4-Security information and event management(SIEM) It provides a comprehensive security orchestration solution that automates threat monitoring, detection, and response in cloud-based environments.
  • 13. Basic cyber security solution tips 1-Never leave the default settings unchanged. 2-Use strong passwords. 3-Use a password manager. 4-Protect all the devices. 5-Back up your data regularly. 6-Modify permissions. 7-Protect yourself with anti-virus and anti-malware. 8-Avoid accessing your data on public Wi-Fi. 9-Actively manage your accounts and services. 10-Have a look at all these points regularly.
  翻译: