尊敬的 微信汇率:1円 ≈ 0.046215 元 支付宝汇率:1円 ≈ 0.046306元 [退出登录]
SlideShare a Scribd company logo
Prepared by,
Ms.SRIPRIYA,
Assistant professor,
Bon secours college for women,
Thanjavur-6
 1.cloud service providers/Saas & Paas
provider
 2.Cloud Infrastructure provider/ IaaS
provider
 1.Infrastructure
 2.Storage
 3.Platform
 4.Application
 5.Services
 6.Client
 1.Secure data transfer
 2. Secure programs interfaces
 3. Secure retained data
 4.user access to control
 5.data separation
 It’s a significant part of business planning.
 Risk management believe to reduce the risk
 R.M method for recognizing, considering risk.
 Some of risk administrations are ISO,NIT
 A disaster at a cloud provider can affect every one of
its customers.
 And hackers and malware are not the only ones who
may target a cloud service provider.
 Cloud computing risks are also presented by insider
threats.
 Cloud computing provide all types of possibilities to
reduce the risk in IT .
 Over 2-3 years IT organization evolving better
concentrated on
“Auditing, inspecting, reconsidering & modernizing”
 Hybrid clouds start to verify their enterprise worth.
 Risk can effect in market Authority:
 Robust development,
 premium supply charges &
 investor confidence.
 Risk management is not only buying protection for the
company, it should consider insurable & uninsurable
risk.
 Its also define cost effective during the risk
management.
 #1. Unauthorized access to customer and
business data
Criminals do not like to work. They may
target small business networks because they
are easier to breach, and they often go after
larger companies because of the allure of
larger payouts.
 #2. Insecure interfaces & APIs
 Provider should double check that security to
their service forms
 Logging security
 #3.Vicious insider
 Large risk in cc environment.
 Gain unauthorized access to organozations
 #4. Issues related technology sharing
 It is based on IaaS
 Remember: you have many ways to protect
your data when it is in control
 #5. data loss or leakage
 Data may be deleted or loss without produce
backup
 #6. Hijacking
 Deception & exploitation of program
vulnerabilities
 #7. Unknown risk profile
 This is less engaged with h/w & s/w
maintenance.
 Malicious insiders & abusive use of login access by an
unauthorized persons.
 Identity theft
 External security Risk
 Malware infections and data breaches
 Data Protection Risk-
 Data loss risk-deletion of record, loss of
encryption key,correption of data.
 It is a open environment security risk.
 Its have high accessibility and associated with Risk too.
 Cc provide higher service quality , security,
availability & reliability.
Current state
 Data storage & computation are offer in the single
data center(service provider)
 A single point of malfunction will not be presumed
for any data loss compare with house computing.
 How data protected?
 How code protected?
 Cc provide security,availablity & reliablity.
 Security advantages:
 Data centralization
 Incident Response
 Forensic image verification time-MD5 hash function
 Logging-benchmark logs solveing the logging problems
 Investigation-illegal cloud environment
 Data segregation –data normally distributed
 Long term viability-double check the data
accessibility
 Compromised server- backup of data
 Regularity compliance-update not in regular
 Recovery – natural and man made disasters.
 If the data is confidential ,the data can handle by the
authorized person only.
 Cc is the platform of digital matching form.
 Human-human data flow.
Cloud ,digital persona & data security:
Salesforce.com-12 year of experience-service-infrastructure
scalability to accessibility.
After get authentication only can control the cloud .
Protect data from unauthorized control
 Content level security endows Organizations to
organize data .
 Contents are the organizational level, rather than the
institutional level.
 Cloud service providers use a combination of methods
to protect your data. ... Cloud providers take steps to
protect data that's in transit.
 Data Security methods include virtual private
networks, encryption, or masking. Virtual private
networks (VPNs) allow remote employees to connect
to corporate networks.
 Data integrity strengthen by PRIVACY,SECURITY, &
RELIABLITY
 And the integrity getting damaged by
HACKERS,PROGRAM MISTAKE, comp. virus
Data availability -
Data backup plan -
Disaster Recovery plan-
 Only authorized persons only can access the resource within the system.
 Setp1- Authenticate individual
 Step2-get info. About individual
 Step3-permit
 Auditing:
 Advantage is to reduce the cost of IT services.
 Reduce the capital cost.
 Unlimited scalablity
 Pay- as-usage
 Cc establish DB in virtual environment by reveling
internal & external attacks.
 Double check the data inherently protected.
software testing:
Reducing testing cost
S/W testing tools to cc Applications

More Related Content

What's hot

Cloud Security (Domain1- 5)
Cloud Security (Domain1- 5)Cloud Security (Domain1- 5)
Cloud Security (Domain1- 5)
Maganathin Veeraragaloo
 
AWS Security Best Practices
AWS Security Best PracticesAWS Security Best Practices
AWS Security Best Practices
Amazon Web Services
 
Cloud security
Cloud securityCloud security
Cloud security
Niharika Varshney
 
Cloud computing and data security
Cloud computing and data securityCloud computing and data security
Cloud computing and data security
Mohammed Fazuluddin
 
Firewalls
FirewallsFirewalls
Firewalls
Ram Dutt Shukla
 
Cloud Computing Risk Management (IIA Webinar)
Cloud Computing Risk Management (IIA Webinar)Cloud Computing Risk Management (IIA Webinar)
Cloud Computing Risk Management (IIA Webinar)
Brian K. Dickard
 
Security in cloud computing
Security in cloud computingSecurity in cloud computing
Security in cloud computing
veena venugopal
 
Privileged Access Management (PAM)
Privileged Access Management (PAM)Privileged Access Management (PAM)
Privileged Access Management (PAM)
danb02
 
Identity and Access Management Introduction
Identity and Access Management IntroductionIdentity and Access Management Introduction
Identity and Access Management Introduction
Aidy Tificate
 
Characteristics of cloud computing
Characteristics of cloud computingCharacteristics of cloud computing
Characteristics of cloud computing
GOVERNMENT COLLEGE OF ENGINEERING,TIRUNELVELI
 
Cloud service providers
Cloud service providersCloud service providers
Cloud service providers
AgnihotriGhosh1
 
Cloud computing Risk management
Cloud computing Risk management  Cloud computing Risk management
Cloud computing Risk management
Padma Jella
 
Risks in the Software Supply Chain
Risks in the Software Supply Chain Risks in the Software Supply Chain
Risks in the Software Supply Chain
Sonatype
 
Identity & access management
Identity & access managementIdentity & access management
Identity & access management
Vandana Verma
 
Cloud computing risk assesment presentation
Cloud computing risk assesment presentationCloud computing risk assesment presentation
Cloud computing risk assesment presentation
Ahmad El Tawil
 
Unit 4 -Cloud Computing and security
Unit 4 -Cloud Computing and securityUnit 4 -Cloud Computing and security
Unit 4 -Cloud Computing and security
MonishaNehkal
 
Cloud computing security issues and challenges
Cloud computing security issues and challengesCloud computing security issues and challenges
Cloud computing security issues and challenges
Dheeraj Negi
 
Security Issues of Cloud Computing
Security Issues of Cloud ComputingSecurity Issues of Cloud Computing
Security Issues of Cloud Computing
Falgun Rathod
 
Unit 3 -Data storage and cloud computing
Unit 3 -Data storage and cloud computingUnit 3 -Data storage and cloud computing
Unit 3 -Data storage and cloud computing
MonishaNehkal
 
Data security in the cloud
Data security in the cloud Data security in the cloud
Data security in the cloud
IBM Security
 

What's hot (20)

Cloud Security (Domain1- 5)
Cloud Security (Domain1- 5)Cloud Security (Domain1- 5)
Cloud Security (Domain1- 5)
 
AWS Security Best Practices
AWS Security Best PracticesAWS Security Best Practices
AWS Security Best Practices
 
Cloud security
Cloud securityCloud security
Cloud security
 
Cloud computing and data security
Cloud computing and data securityCloud computing and data security
Cloud computing and data security
 
Firewalls
FirewallsFirewalls
Firewalls
 
Cloud Computing Risk Management (IIA Webinar)
Cloud Computing Risk Management (IIA Webinar)Cloud Computing Risk Management (IIA Webinar)
Cloud Computing Risk Management (IIA Webinar)
 
Security in cloud computing
Security in cloud computingSecurity in cloud computing
Security in cloud computing
 
Privileged Access Management (PAM)
Privileged Access Management (PAM)Privileged Access Management (PAM)
Privileged Access Management (PAM)
 
Identity and Access Management Introduction
Identity and Access Management IntroductionIdentity and Access Management Introduction
Identity and Access Management Introduction
 
Characteristics of cloud computing
Characteristics of cloud computingCharacteristics of cloud computing
Characteristics of cloud computing
 
Cloud service providers
Cloud service providersCloud service providers
Cloud service providers
 
Cloud computing Risk management
Cloud computing Risk management  Cloud computing Risk management
Cloud computing Risk management
 
Risks in the Software Supply Chain
Risks in the Software Supply Chain Risks in the Software Supply Chain
Risks in the Software Supply Chain
 
Identity & access management
Identity & access managementIdentity & access management
Identity & access management
 
Cloud computing risk assesment presentation
Cloud computing risk assesment presentationCloud computing risk assesment presentation
Cloud computing risk assesment presentation
 
Unit 4 -Cloud Computing and security
Unit 4 -Cloud Computing and securityUnit 4 -Cloud Computing and security
Unit 4 -Cloud Computing and security
 
Cloud computing security issues and challenges
Cloud computing security issues and challengesCloud computing security issues and challenges
Cloud computing security issues and challenges
 
Security Issues of Cloud Computing
Security Issues of Cloud ComputingSecurity Issues of Cloud Computing
Security Issues of Cloud Computing
 
Unit 3 -Data storage and cloud computing
Unit 3 -Data storage and cloud computingUnit 3 -Data storage and cloud computing
Unit 3 -Data storage and cloud computing
 
Data security in the cloud
Data security in the cloud Data security in the cloud
Data security in the cloud
 

Similar to Cloud computing risks

Information System Security
Information System Security Information System Security
Information System Security
Syed Asif Sherazi
 
Cloud Application Security Best Practices To follow.pdf
Cloud Application Security Best Practices To follow.pdfCloud Application Security Best Practices To follow.pdf
Cloud Application Security Best Practices To follow.pdf
Techugo
 
Practical Security for the Cloud
Practical Security for the CloudPractical Security for the Cloud
Practical Security for the Cloud
Chirag Joshi, CISA, CISM, CRISC
 
Cloud Application Security Best Practices To follow.pdf
Cloud Application Security Best Practices To follow.pdfCloud Application Security Best Practices To follow.pdf
Cloud Application Security Best Practices To follow.pdf
Techugo
 
Bridging the Data Security Gap
Bridging the Data Security GapBridging the Data Security Gap
Bridging the Data Security Gap
xband
 
MIST Effective Masquerade Attack Detection in the Cloud
MIST Effective Masquerade Attack Detection in the CloudMIST Effective Masquerade Attack Detection in the Cloud
MIST Effective Masquerade Attack Detection in the Cloud
Kumar Goud
 
Cloud Security Challenges, Types, and Best Practises.pdf
Cloud Security Challenges, Types, and Best Practises.pdfCloud Security Challenges, Types, and Best Practises.pdf
Cloud Security Challenges, Types, and Best Practises.pdf
manoharparakh
 
A017130104
A017130104A017130104
A017130104
IOSR Journals
 
Identified Vulnerabilitis And Threats In Cloud Computing
Identified Vulnerabilitis And Threats In Cloud ComputingIdentified Vulnerabilitis And Threats In Cloud Computing
Identified Vulnerabilitis And Threats In Cloud Computing
IOSR Journals
 
9 Things You Need to Know Before Moving to the Cloud
9 Things You Need to Know Before Moving to the Cloud9 Things You Need to Know Before Moving to the Cloud
9 Things You Need to Know Before Moving to the Cloud
kairostech
 
The 14 Most Common Security Risks For SaaS Applications And How To Fix Them.pdf
The 14 Most Common Security Risks For SaaS Applications And How To Fix Them.pdfThe 14 Most Common Security Risks For SaaS Applications And How To Fix Them.pdf
The 14 Most Common Security Risks For SaaS Applications And How To Fix Them.pdf
Groovy Web
 
IRJET- A Survey on Cloud Data Security Methods and Future Directions
IRJET- A Survey on Cloud Data Security Methods and Future DirectionsIRJET- A Survey on Cloud Data Security Methods and Future Directions
IRJET- A Survey on Cloud Data Security Methods and Future Directions
IRJET Journal
 
User_Access_IIA-LA_3-9-2016
User_Access_IIA-LA_3-9-2016User_Access_IIA-LA_3-9-2016
User_Access_IIA-LA_3-9-2016
Karla Sasser, CPA CITP, CIA, CGMA
 
10.1.1.436.3364.pdf
10.1.1.436.3364.pdf10.1.1.436.3364.pdf
10.1.1.436.3364.pdf
mistryritesh
 
The Top Cloud Security Issues
The Top Cloud Security IssuesThe Top Cloud Security Issues
The Top Cloud Security Issues
HTS Hosting
 
The Three Major Goals of Cybersecurity for Business Organizations-precise tes...
The Three Major Goals of Cybersecurity for Business Organizations-precise tes...The Three Major Goals of Cybersecurity for Business Organizations-precise tes...
The Three Major Goals of Cybersecurity for Business Organizations-precise tes...
Precise Testing Solution
 
Cloud_security.pptx
Cloud_security.pptxCloud_security.pptx
Cloud_security.pptx
SofiyaKhan49
 
Law firms keep sensitive client data secure with CloudMask
Law firms keep sensitive client data secure with CloudMaskLaw firms keep sensitive client data secure with CloudMask
Law firms keep sensitive client data secure with CloudMask
CloudMask inc.
 
CC ss.pptx
CC ss.pptxCC ss.pptx
CC ss.pptx
ShakthiShakthi13
 
What Is Digital Asset Security. What Are the Risks Associated With It.docx.pdf
What Is Digital Asset Security. What Are the Risks Associated With It.docx.pdfWhat Is Digital Asset Security. What Are the Risks Associated With It.docx.pdf
What Is Digital Asset Security. What Are the Risks Associated With It.docx.pdf
SecureCurve
 

Similar to Cloud computing risks (20)

Information System Security
Information System Security Information System Security
Information System Security
 
Cloud Application Security Best Practices To follow.pdf
Cloud Application Security Best Practices To follow.pdfCloud Application Security Best Practices To follow.pdf
Cloud Application Security Best Practices To follow.pdf
 
Practical Security for the Cloud
Practical Security for the CloudPractical Security for the Cloud
Practical Security for the Cloud
 
Cloud Application Security Best Practices To follow.pdf
Cloud Application Security Best Practices To follow.pdfCloud Application Security Best Practices To follow.pdf
Cloud Application Security Best Practices To follow.pdf
 
Bridging the Data Security Gap
Bridging the Data Security GapBridging the Data Security Gap
Bridging the Data Security Gap
 
MIST Effective Masquerade Attack Detection in the Cloud
MIST Effective Masquerade Attack Detection in the CloudMIST Effective Masquerade Attack Detection in the Cloud
MIST Effective Masquerade Attack Detection in the Cloud
 
Cloud Security Challenges, Types, and Best Practises.pdf
Cloud Security Challenges, Types, and Best Practises.pdfCloud Security Challenges, Types, and Best Practises.pdf
Cloud Security Challenges, Types, and Best Practises.pdf
 
A017130104
A017130104A017130104
A017130104
 
Identified Vulnerabilitis And Threats In Cloud Computing
Identified Vulnerabilitis And Threats In Cloud ComputingIdentified Vulnerabilitis And Threats In Cloud Computing
Identified Vulnerabilitis And Threats In Cloud Computing
 
9 Things You Need to Know Before Moving to the Cloud
9 Things You Need to Know Before Moving to the Cloud9 Things You Need to Know Before Moving to the Cloud
9 Things You Need to Know Before Moving to the Cloud
 
The 14 Most Common Security Risks For SaaS Applications And How To Fix Them.pdf
The 14 Most Common Security Risks For SaaS Applications And How To Fix Them.pdfThe 14 Most Common Security Risks For SaaS Applications And How To Fix Them.pdf
The 14 Most Common Security Risks For SaaS Applications And How To Fix Them.pdf
 
IRJET- A Survey on Cloud Data Security Methods and Future Directions
IRJET- A Survey on Cloud Data Security Methods and Future DirectionsIRJET- A Survey on Cloud Data Security Methods and Future Directions
IRJET- A Survey on Cloud Data Security Methods and Future Directions
 
User_Access_IIA-LA_3-9-2016
User_Access_IIA-LA_3-9-2016User_Access_IIA-LA_3-9-2016
User_Access_IIA-LA_3-9-2016
 
10.1.1.436.3364.pdf
10.1.1.436.3364.pdf10.1.1.436.3364.pdf
10.1.1.436.3364.pdf
 
The Top Cloud Security Issues
The Top Cloud Security IssuesThe Top Cloud Security Issues
The Top Cloud Security Issues
 
The Three Major Goals of Cybersecurity for Business Organizations-precise tes...
The Three Major Goals of Cybersecurity for Business Organizations-precise tes...The Three Major Goals of Cybersecurity for Business Organizations-precise tes...
The Three Major Goals of Cybersecurity for Business Organizations-precise tes...
 
Cloud_security.pptx
Cloud_security.pptxCloud_security.pptx
Cloud_security.pptx
 
Law firms keep sensitive client data secure with CloudMask
Law firms keep sensitive client data secure with CloudMaskLaw firms keep sensitive client data secure with CloudMask
Law firms keep sensitive client data secure with CloudMask
 
CC ss.pptx
CC ss.pptxCC ss.pptx
CC ss.pptx
 
What Is Digital Asset Security. What Are the Risks Associated With It.docx.pdf
What Is Digital Asset Security. What Are the Risks Associated With It.docx.pdfWhat Is Digital Asset Security. What Are the Risks Associated With It.docx.pdf
What Is Digital Asset Security. What Are the Risks Associated With It.docx.pdf
 

Recently uploaded

BÀI TẬP BỔ TRỢ TIẾNG ANH LỚP 8 - CẢ NĂM - FRIENDS PLUS - NĂM HỌC 2023-2024 (B...
BÀI TẬP BỔ TRỢ TIẾNG ANH LỚP 8 - CẢ NĂM - FRIENDS PLUS - NĂM HỌC 2023-2024 (B...BÀI TẬP BỔ TRỢ TIẾNG ANH LỚP 8 - CẢ NĂM - FRIENDS PLUS - NĂM HỌC 2023-2024 (B...
BÀI TẬP BỔ TRỢ TIẾNG ANH LỚP 8 - CẢ NĂM - FRIENDS PLUS - NĂM HỌC 2023-2024 (B...
Nguyen Thanh Tu Collection
 
Diversity Quiz Prelims by Quiz Club, IIT Kanpur
Diversity Quiz Prelims by Quiz Club, IIT KanpurDiversity Quiz Prelims by Quiz Club, IIT Kanpur
Diversity Quiz Prelims by Quiz Club, IIT Kanpur
Quiz Club IIT Kanpur
 
Creative Restart 2024: Mike Martin - Finding a way around “no”
Creative Restart 2024: Mike Martin - Finding a way around “no”Creative Restart 2024: Mike Martin - Finding a way around “no”
Creative Restart 2024: Mike Martin - Finding a way around “no”
Taste
 
Observational Learning
Observational Learning Observational Learning
Observational Learning
sanamushtaq922
 
skeleton System.pdf (skeleton system wow)
skeleton System.pdf (skeleton system wow)skeleton System.pdf (skeleton system wow)
skeleton System.pdf (skeleton system wow)
Mohammad Al-Dhahabi
 
BỘ BÀI TẬP TEST THEO UNIT - FORM 2025 - TIẾNG ANH 12 GLOBAL SUCCESS - KÌ 1 (B...
BỘ BÀI TẬP TEST THEO UNIT - FORM 2025 - TIẾNG ANH 12 GLOBAL SUCCESS - KÌ 1 (B...BỘ BÀI TẬP TEST THEO UNIT - FORM 2025 - TIẾNG ANH 12 GLOBAL SUCCESS - KÌ 1 (B...
BỘ BÀI TẬP TEST THEO UNIT - FORM 2025 - TIẾNG ANH 12 GLOBAL SUCCESS - KÌ 1 (B...
Nguyen Thanh Tu Collection
 
Accounting for Restricted Grants When and How To Record Properly
Accounting for Restricted Grants  When and How To Record ProperlyAccounting for Restricted Grants  When and How To Record Properly
Accounting for Restricted Grants When and How To Record Properly
TechSoup
 
Dreamin in Color '24 - (Workshop) Design an API Specification with MuleSoft's...
Dreamin in Color '24 - (Workshop) Design an API Specification with MuleSoft's...Dreamin in Color '24 - (Workshop) Design an API Specification with MuleSoft's...
Dreamin in Color '24 - (Workshop) Design an API Specification with MuleSoft's...
Alexandra N. Martinez
 
The Science of Learning: implications for modern teaching
The Science of Learning: implications for modern teachingThe Science of Learning: implications for modern teaching
The Science of Learning: implications for modern teaching
Derek Wenmoth
 
Creation or Update of a Mandatory Field is Not Set in Odoo 17
Creation or Update of a Mandatory Field is Not Set in Odoo 17Creation or Update of a Mandatory Field is Not Set in Odoo 17
Creation or Update of a Mandatory Field is Not Set in Odoo 17
Celine George
 
220711130100 udita Chakraborty Aims and objectives of national policy on inf...
220711130100 udita Chakraborty  Aims and objectives of national policy on inf...220711130100 udita Chakraborty  Aims and objectives of national policy on inf...
220711130100 udita Chakraborty Aims and objectives of national policy on inf...
Kalna College
 
Project- Comparison among Chhattisgarh and kerala.pptx
Project- Comparison among Chhattisgarh and kerala.pptxProject- Comparison among Chhattisgarh and kerala.pptx
Project- Comparison among Chhattisgarh and kerala.pptx
jeevankraghuraman
 
THE SACRIFICE HOW PRO-PALESTINE PROTESTS STUDENTS ARE SACRIFICING TO CHANGE T...
THE SACRIFICE HOW PRO-PALESTINE PROTESTS STUDENTS ARE SACRIFICING TO CHANGE T...THE SACRIFICE HOW PRO-PALESTINE PROTESTS STUDENTS ARE SACRIFICING TO CHANGE T...
THE SACRIFICE HOW PRO-PALESTINE PROTESTS STUDENTS ARE SACRIFICING TO CHANGE T...
indexPub
 
Educational Technology in the Health Sciences
Educational Technology in the Health SciencesEducational Technology in the Health Sciences
Educational Technology in the Health Sciences
Iris Thiele Isip-Tan
 
8+8+8 Rule Of Time Management For Better Productivity
8+8+8 Rule Of Time Management For Better Productivity8+8+8 Rule Of Time Management For Better Productivity
8+8+8 Rule Of Time Management For Better Productivity
RuchiRathor2
 
How to Create a Stage or a Pipeline in Odoo 17 CRM
How to Create a Stage or a Pipeline in Odoo 17 CRMHow to Create a Stage or a Pipeline in Odoo 17 CRM
How to Create a Stage or a Pipeline in Odoo 17 CRM
Celine George
 
How to Setup Default Value for a Field in Odoo 17
How to Setup Default Value for a Field in Odoo 17How to Setup Default Value for a Field in Odoo 17
How to Setup Default Value for a Field in Odoo 17
Celine George
 
adjectives.ppt for class 1 to 6, grammar
adjectives.ppt for class 1 to 6, grammaradjectives.ppt for class 1 to 6, grammar
adjectives.ppt for class 1 to 6, grammar
7DFarhanaMohammed
 
220711130083 SUBHASHREE RAKSHIT Internet resources for social science
220711130083 SUBHASHREE RAKSHIT  Internet resources for social science220711130083 SUBHASHREE RAKSHIT  Internet resources for social science
220711130083 SUBHASHREE RAKSHIT Internet resources for social science
Kalna College
 
How to Fix [Errno 98] address already in use
How to Fix [Errno 98] address already in useHow to Fix [Errno 98] address already in use
How to Fix [Errno 98] address already in use
Celine George
 

Recently uploaded (20)

BÀI TẬP BỔ TRỢ TIẾNG ANH LỚP 8 - CẢ NĂM - FRIENDS PLUS - NĂM HỌC 2023-2024 (B...
BÀI TẬP BỔ TRỢ TIẾNG ANH LỚP 8 - CẢ NĂM - FRIENDS PLUS - NĂM HỌC 2023-2024 (B...BÀI TẬP BỔ TRỢ TIẾNG ANH LỚP 8 - CẢ NĂM - FRIENDS PLUS - NĂM HỌC 2023-2024 (B...
BÀI TẬP BỔ TRỢ TIẾNG ANH LỚP 8 - CẢ NĂM - FRIENDS PLUS - NĂM HỌC 2023-2024 (B...
 
Diversity Quiz Prelims by Quiz Club, IIT Kanpur
Diversity Quiz Prelims by Quiz Club, IIT KanpurDiversity Quiz Prelims by Quiz Club, IIT Kanpur
Diversity Quiz Prelims by Quiz Club, IIT Kanpur
 
Creative Restart 2024: Mike Martin - Finding a way around “no”
Creative Restart 2024: Mike Martin - Finding a way around “no”Creative Restart 2024: Mike Martin - Finding a way around “no”
Creative Restart 2024: Mike Martin - Finding a way around “no”
 
Observational Learning
Observational Learning Observational Learning
Observational Learning
 
skeleton System.pdf (skeleton system wow)
skeleton System.pdf (skeleton system wow)skeleton System.pdf (skeleton system wow)
skeleton System.pdf (skeleton system wow)
 
BỘ BÀI TẬP TEST THEO UNIT - FORM 2025 - TIẾNG ANH 12 GLOBAL SUCCESS - KÌ 1 (B...
BỘ BÀI TẬP TEST THEO UNIT - FORM 2025 - TIẾNG ANH 12 GLOBAL SUCCESS - KÌ 1 (B...BỘ BÀI TẬP TEST THEO UNIT - FORM 2025 - TIẾNG ANH 12 GLOBAL SUCCESS - KÌ 1 (B...
BỘ BÀI TẬP TEST THEO UNIT - FORM 2025 - TIẾNG ANH 12 GLOBAL SUCCESS - KÌ 1 (B...
 
Accounting for Restricted Grants When and How To Record Properly
Accounting for Restricted Grants  When and How To Record ProperlyAccounting for Restricted Grants  When and How To Record Properly
Accounting for Restricted Grants When and How To Record Properly
 
Dreamin in Color '24 - (Workshop) Design an API Specification with MuleSoft's...
Dreamin in Color '24 - (Workshop) Design an API Specification with MuleSoft's...Dreamin in Color '24 - (Workshop) Design an API Specification with MuleSoft's...
Dreamin in Color '24 - (Workshop) Design an API Specification with MuleSoft's...
 
The Science of Learning: implications for modern teaching
The Science of Learning: implications for modern teachingThe Science of Learning: implications for modern teaching
The Science of Learning: implications for modern teaching
 
Creation or Update of a Mandatory Field is Not Set in Odoo 17
Creation or Update of a Mandatory Field is Not Set in Odoo 17Creation or Update of a Mandatory Field is Not Set in Odoo 17
Creation or Update of a Mandatory Field is Not Set in Odoo 17
 
220711130100 udita Chakraborty Aims and objectives of national policy on inf...
220711130100 udita Chakraborty  Aims and objectives of national policy on inf...220711130100 udita Chakraborty  Aims and objectives of national policy on inf...
220711130100 udita Chakraborty Aims and objectives of national policy on inf...
 
Project- Comparison among Chhattisgarh and kerala.pptx
Project- Comparison among Chhattisgarh and kerala.pptxProject- Comparison among Chhattisgarh and kerala.pptx
Project- Comparison among Chhattisgarh and kerala.pptx
 
THE SACRIFICE HOW PRO-PALESTINE PROTESTS STUDENTS ARE SACRIFICING TO CHANGE T...
THE SACRIFICE HOW PRO-PALESTINE PROTESTS STUDENTS ARE SACRIFICING TO CHANGE T...THE SACRIFICE HOW PRO-PALESTINE PROTESTS STUDENTS ARE SACRIFICING TO CHANGE T...
THE SACRIFICE HOW PRO-PALESTINE PROTESTS STUDENTS ARE SACRIFICING TO CHANGE T...
 
Educational Technology in the Health Sciences
Educational Technology in the Health SciencesEducational Technology in the Health Sciences
Educational Technology in the Health Sciences
 
8+8+8 Rule Of Time Management For Better Productivity
8+8+8 Rule Of Time Management For Better Productivity8+8+8 Rule Of Time Management For Better Productivity
8+8+8 Rule Of Time Management For Better Productivity
 
How to Create a Stage or a Pipeline in Odoo 17 CRM
How to Create a Stage or a Pipeline in Odoo 17 CRMHow to Create a Stage or a Pipeline in Odoo 17 CRM
How to Create a Stage or a Pipeline in Odoo 17 CRM
 
How to Setup Default Value for a Field in Odoo 17
How to Setup Default Value for a Field in Odoo 17How to Setup Default Value for a Field in Odoo 17
How to Setup Default Value for a Field in Odoo 17
 
adjectives.ppt for class 1 to 6, grammar
adjectives.ppt for class 1 to 6, grammaradjectives.ppt for class 1 to 6, grammar
adjectives.ppt for class 1 to 6, grammar
 
220711130083 SUBHASHREE RAKSHIT Internet resources for social science
220711130083 SUBHASHREE RAKSHIT  Internet resources for social science220711130083 SUBHASHREE RAKSHIT  Internet resources for social science
220711130083 SUBHASHREE RAKSHIT Internet resources for social science
 
How to Fix [Errno 98] address already in use
How to Fix [Errno 98] address already in useHow to Fix [Errno 98] address already in use
How to Fix [Errno 98] address already in use
 

Cloud computing risks

  • 1. Prepared by, Ms.SRIPRIYA, Assistant professor, Bon secours college for women, Thanjavur-6
  • 2.  1.cloud service providers/Saas & Paas provider  2.Cloud Infrastructure provider/ IaaS provider
  • 3.  1.Infrastructure  2.Storage  3.Platform  4.Application  5.Services  6.Client
  • 4.  1.Secure data transfer  2. Secure programs interfaces  3. Secure retained data  4.user access to control  5.data separation
  • 5.  It’s a significant part of business planning.  Risk management believe to reduce the risk  R.M method for recognizing, considering risk.  Some of risk administrations are ISO,NIT  A disaster at a cloud provider can affect every one of its customers.  And hackers and malware are not the only ones who may target a cloud service provider.  Cloud computing risks are also presented by insider threats.
  • 6.  Cloud computing provide all types of possibilities to reduce the risk in IT .  Over 2-3 years IT organization evolving better concentrated on “Auditing, inspecting, reconsidering & modernizing”  Hybrid clouds start to verify their enterprise worth.
  • 7.  Risk can effect in market Authority:  Robust development,  premium supply charges &  investor confidence.  Risk management is not only buying protection for the company, it should consider insurable & uninsurable risk.  Its also define cost effective during the risk management.
  • 8.
  • 9.  #1. Unauthorized access to customer and business data Criminals do not like to work. They may target small business networks because they are easier to breach, and they often go after larger companies because of the allure of larger payouts.
  • 10.  #2. Insecure interfaces & APIs  Provider should double check that security to their service forms  Logging security  #3.Vicious insider  Large risk in cc environment.  Gain unauthorized access to organozations
  • 11.  #4. Issues related technology sharing  It is based on IaaS  Remember: you have many ways to protect your data when it is in control  #5. data loss or leakage  Data may be deleted or loss without produce backup  #6. Hijacking  Deception & exploitation of program vulnerabilities
  • 12.  #7. Unknown risk profile  This is less engaged with h/w & s/w maintenance.
  • 13.  Malicious insiders & abusive use of login access by an unauthorized persons.  Identity theft  External security Risk  Malware infections and data breaches  Data Protection Risk-  Data loss risk-deletion of record, loss of encryption key,correption of data.
  • 14.
  • 15.  It is a open environment security risk.  Its have high accessibility and associated with Risk too.  Cc provide higher service quality , security, availability & reliability. Current state  Data storage & computation are offer in the single data center(service provider)  A single point of malfunction will not be presumed for any data loss compare with house computing.
  • 16.  How data protected?  How code protected?  Cc provide security,availablity & reliablity.  Security advantages:  Data centralization  Incident Response  Forensic image verification time-MD5 hash function  Logging-benchmark logs solveing the logging problems
  • 17.  Investigation-illegal cloud environment  Data segregation –data normally distributed  Long term viability-double check the data accessibility  Compromised server- backup of data  Regularity compliance-update not in regular  Recovery – natural and man made disasters.
  • 18.  If the data is confidential ,the data can handle by the authorized person only.  Cc is the platform of digital matching form.  Human-human data flow. Cloud ,digital persona & data security: Salesforce.com-12 year of experience-service-infrastructure scalability to accessibility. After get authentication only can control the cloud . Protect data from unauthorized control
  • 19.  Content level security endows Organizations to organize data .  Contents are the organizational level, rather than the institutional level.
  • 20.  Cloud service providers use a combination of methods to protect your data. ... Cloud providers take steps to protect data that's in transit.  Data Security methods include virtual private networks, encryption, or masking. Virtual private networks (VPNs) allow remote employees to connect to corporate networks.
  • 21.  Data integrity strengthen by PRIVACY,SECURITY, & RELIABLITY  And the integrity getting damaged by HACKERS,PROGRAM MISTAKE, comp. virus Data availability - Data backup plan - Disaster Recovery plan-
  • 22.  Only authorized persons only can access the resource within the system.  Setp1- Authenticate individual  Step2-get info. About individual  Step3-permit  Auditing:  Advantage is to reduce the cost of IT services.  Reduce the capital cost.  Unlimited scalablity  Pay- as-usage
  • 23.  Cc establish DB in virtual environment by reveling internal & external attacks.  Double check the data inherently protected. software testing: Reducing testing cost S/W testing tools to cc Applications
  翻译: