SlideShare ist ein Scribd-Unternehmen logo
1 von 7
Downloaden Sie, um offline zu lesen
Expert Reference Series of White Papers




  10 Security Concerns
  for Cloud Computing



1-800-COURSES              www.globalknowledge.com
10 Security Concerns for Cloud
Computing
Michael Gregg, Global Knowledge Instructor, CISA, CISSP, CISM, MCSE, CTT+, CGEIT,
A+, N+, Security+, CNA, CCNA, CIW Security Analyst, CEH, CHFI, CEI, DCNP, ES Dragon
IDS, ES Advanced Dragon IDS, and SSCP


Introduction
Cloud computing gets its name from the drawings
typically used to describe the Internet. Cloud comput-
ing is a new consumption and delivery model for IT
services. The concept of cloud computing represents
a shift in thought, in that end users need not know
the details of a specific technology. The service is fully
managed by the provider. Users can consume services
at a rate that is set by their particular needs. This on-
demand service can be provided at any time.




Cloud Computing Models
Cloud computing models can be broken into three basic designs, which are shown here and described below.




    • Infrastructure-as-a-Service (IaaS) – As the name implies, you are buying infrastructure. You own the soft-
      ware and are purchasing virtual power to execute as needed. This is much like running a virtual server on
      your own equipment, except you are now running a virtual server on a virtual disk. This model is similar to
      a utility company model, as you pay for what you use. An example is Amazon Web Services at http://aws.
      amazon.com/.




Copyright ©2010 Global Knowledge Training LLC. All rights reserved.                                             2
• Platform-as-a-Service (PaaS) – In this model of cloud computing, the provider provides a platform for your
      use. Services provided by this model include all phases of the system development life cycle (SDLC) and
      can use application program interfaces (APIs), website portals, or gateway software. Buyers do need to
      look closely at specific solutions, because some providers do not allow software created by their custom-
      ers to be moved off the provider’s platform. An example of PaaS is GoogleApps.


    • Software-as-a-Service (SaaS) – This model is designed to provide everything and simply rent out the soft-
      ware to the user. The service is usually provided through some type of front end or web portal. While the
      end user is free to use the service from anywhere, the company pays a per use fee. Salesforce.com offers
      this type of service.


Cloud Computing Providers
Gartner predicts that cloud computing will surge to 150 billion dollars by 2013. Below is a partial list of compa-
nies that provide cloud computing services:
    • Amazon                • Google           • Microsoft        • Salesforce.com
    • Citrix                • IBM              • Mozyhome         • Sun
    • cohensiveFT           • Icloud           • Nivanix          • VMware
    • Flexscale             • Joyent           • Rackspace        • 3tera


Benefits of Cloud Computing
According to International Data Corporation (IDC), “The proliferation of devices, compliance, improved systems
performance, online commerce and increased replication to secondary or backup sites is contributing to an an-
nual doubling of the amount of information transmitted over the Internet.” The cost of dealing with this amount
of data is something that companies must address. In today’s economy, companies are looking at any cost-
saving measures, and the bottom line is that cloud computing provides much greater flexibility than previous
computing models.


The benefits of cloud computing are many. One is reduced cost, since you pay as you go. Other benefits are the
portability of the application is that users can work from home, work, or at client locations. This increased mo-
bility means employees can access information anywhere they are. There is also the ability of cloud computing
to free-up IT workers who may have been occupied performing updates, installing patches, or providing applica-
tion support.


Security Concerns of Cloud Computing
While cost and ease of use are two great benefits of cloud computing, there are significant security concerns
that need to be addressed when considering moving critical applications and sensitive data to public and shared
cloud environments. To address these concerns, the cloud provider must develop sufficient controls to provide
the same or a greater level of security than the organization would have if the cloud were not used. Listed here
are ten items to review when considering cloud computing.



Copyright ©2010 Global Knowledge Training LLC. All rights reserved.                                                  3
1. Where’s the data? Different countries have different requirements and controls placed on access. Be-
       cause your data is in the cloud, you may not realize that the data must reside in a physical location. Your
       cloud provider should agree in writing to provide the level of security required for your customers.


    2. Who has access? Access control is a key concern, because insider attacks are a huge risk. A potential
       hacker is someone who has been entrusted with approved access to the cloud. If anyone doubts this,
       consider that in early 2009 an insider was accused of planting a logic bomb on Fanny Mae servers that,
       if launched, would have caused massive damage. Anyone considering using the cloud needs to look at
       who is managing their data and what types of controls are applied to these individuals.


    3. What are your regulatory requirements? Organizations operating in the US, Canada, or the European
       Union have many regulatory requirements that they must abide by (e.g., ISO 27002, Safe Harbor, ITIL, and
       COBIT). You must ensure that your cloud provider is able to meet these requirements and is willing to
       undergo certification, accreditation, and review.


    4. Do you have the right to audit? This particular item is no small matter; the cloud provider should
       agree in writing to the terms of audit.


    5. What type of training does the provider offer their employees? This is actually a rather important
       item, because people will always be the weakest link in security. Knowing how your provider trains their
       employees is an important item to review.


    6. What type of data classification system does the provider use? Questions you should be concerned
       with here include: Is the data classified? How is your data separated from other users? Encryption should
       also be discussed. Is it being used while the data is at rest and in transit? You will also want to know
       what type of encryption is being used. As an example, there is a big difference between WEP and WPA2.


    7. What are the service level agreement (SLA) terms? The SLA serves as a contracted level of guaran-
       teed service between the cloud provider and the customer that specifies what level of services will be
       provided.


    8. What is the long-term viability of the provider? How long has the cloud provider been in business
       and what is their track record. If they go out of business, what happens to your data? Will your data be
       returned, and if so, in what format? As an example, in 2007, online storage service MediaMax went out
       of business following a system administration error that deleted active customer data. The failed com-
       pany left behind unhappy users and focused concerns on the reliability of cloud computing.


    9. What happens if there is a security breach? If a security incident occurs, what support will you re-
       ceive from the cloud provider? While many providers promote their services as being unhackable, cloud-
       based services are an attractive target to hackers.




Copyright ©2010 Global Knowledge Training LLC. All rights reserved.                                               4
10. What is the disaster recovery/business continuity plan (DR/BCP)? While you may not know the
        physical location of your services, it is physically located somewhere. All physical locations face threats
        such as fire, storms, natural disasters, and loss of power. In case of any of these events, how will the
        cloud provider respond, and what guarantee of continued services are they promising? As an example,
        in February 2009, Nokia’s Contacts On Ovi servers crashed. The last reliable backup that Nokia could
        recover was dated January 23rd, meaning anything synced and stored by users between January 23rd
        and February 9th was lost completely.


Even basic services such as e-mail require a thorough review before moving the service to the cloud. While some
organizations are starting to move their e-mail to cloud services hosted by Gmail, Yahoo e-mail, and others,
there are issues to consider. In February 2009, Gmail reported an outage that affected its EU users. In January
2010, it was reported that Gmail had been targeted by attackers seeking to gain access to Chinese human rights
activists. It was further reported by MSNBC that foreign correspondents may have been targeted. Although
these services have many controls built in, it is not impossible for them to be compromised.


Questions that companies need to ask before outsourcing even something as basic as e-mail include:
    • Can you function with no e-mail?
    • How easy would it be to migrate to another e-mail provider?
    • What is your email retention policy, and do you have a legal requirement to keep your email for a specific
      amount of time?
    • Would your clients be concerned that you store email with sensitive information on a third-party server?


Cloud Computing Attacks
As more companies move to cloud computing, look for hackers to follow. Some of the potential attack vectors
criminals may attempt include:
    • Denial of Service (DoS) attacks - Some security professionals have argued that the cloud is more
      vulnerable to DoS attacks, because it is shared by many users, which makes DoS attacks much more dam-
      aging. Twitter suffered a devastating DoS attack during 2009.


    • Side Channel attacks – An attacker could attempt to compromise the cloud by placing a malicious
      virtual machine in close proximity to a target cloud server and then launching a side channel attack.


    • Authentication attacks – Authentication is a weak point in hosted and virtual services and is fre-
      quently targeted. There are many different ways to authenticate users; for example, based on what a
      person knows, has, or is. The mechanisms used to secure the authentication process and the methods
      used are a frequent target of attackers.


    • Man-in-the-middle cryptographic attacks – This attack is carried out when an attacker places
      himself between two users. Anytime attackers can place themselves in the communication’s path, there is
      the possibility that they can intercept and modify communications.



Copyright ©2010 Global Knowledge Training LLC. All rights reserved.                                                   5
Conclusion
Cloud computing offers real benefits to companies seeking a competitive edge in today’s economy. Many
more providers are moving into this area, and the competition is driving prices even lower. Attractive pricing,
the ability to free up staff for other duties, and the ability to pay for “as needed” services will continue to drive
more businesses to consider cloud computing. The decision to move to cloud-based services should fit into the
organization’s overall corporate objectives. Before any services are moved to the cloud, the organization’s senior
management should ensure such actions are consistent with their strategic plans and meet acceptance criteria
that address the ten items discussed in this article.


Just as there are advantages to cloud computing, there are also several key security issues to keep in mind.
One such concern is that cloud computing blurs the natural perimeter between the protected inside the hostile
outside. Security of any cloud-based services must be closely reviewed to understand what protections your
information has. There is also the issue of availability. This availability could be jeopardized by a denial of service
or by the service provider suffering a failure or going out of business.


Learn More
Learn more about how you can improve productivity, enhance efficiency, and sharpen your competitive edge.
Check out the following Global Knowledge courses:
Security+ Prep Course
Foundstone Ultimate Hacking: Web
Understanding Networking Fundamentals
VMware vSphere: Fast Track [V4]
VMware vSphere: Install, Configure, Manage [V4]


For more information or to register, visit www.globalknowledge.com or call 1-800-COURSES to speak with a
sales representative.


Our courses and enhanced, hands-on labs and exercises offer practical skills and tips that you can immediately
put to use. Our expert instructors draw upon their experiences to help you understand key concepts and how to
apply them to your specific work situation. Choose from our more than 1,200 courses, delivered through Class-
rooms, e-Learning, and On-site sessions, to meet your IT and business training needs.


About the Author
Michael Gregg has 20 years of information security experience. He is the CTO of Superior Solutions, Inc., a
Houston-based IT security consulting and auditing firm. He has led security risk assessments and established
security programs within top corporations and government agencies. Michael is an expert in security risk assess-
ment, security risk management, security criteria, and building corporate security programs.




Copyright ©2010 Global Knowledge Training LLC. All rights reserved.                                                   6
He holds two associate degrees, a bachelor degree, and a master degree. Some of the certifications he holds
include CISA, CISSP, CISM, MCSE, CTT+, CGEIT, A+, N+, Security+, CNA, CCNA, CIW Security Analyst, CEH, CHFI,
CEI, DCNP, ES Dragon IDS, ES Advanced Dragon IDS, and SSCP. In addition to his experience performing security
assessments, he has authored or coauthored more than 10 books including Certified Ethical Hacker Exam Prep
(Que), CISSP Exam Cram 2 (Que), Build Your Own Network Security Lab (Wiley), and Hack the Stack (Syngress).
Michael has created more than 15 security-related courses and training classes for various companies and
universities.




Copyright ©2010 Global Knowledge Training LLC. All rights reserved.                                         7

Weitere ähnliche Inhalte

Was ist angesagt?

Privacy Issues In Cloud Computing
Privacy Issues In Cloud ComputingPrivacy Issues In Cloud Computing
Privacy Issues In Cloud Computingiosrjce
 
Cloud Security - Security Aspects of Cloud Computing
Cloud Security - Security Aspects of Cloud ComputingCloud Security - Security Aspects of Cloud Computing
Cloud Security - Security Aspects of Cloud ComputingJim Geovedi
 
Cloud Computing and Security - ISACA Hyderabad Chapter Presentation
Cloud Computing and Security - ISACA Hyderabad Chapter PresentationCloud Computing and Security - ISACA Hyderabad Chapter Presentation
Cloud Computing and Security - ISACA Hyderabad Chapter PresentationVenkateswar Reddy Melachervu
 
A STUDY OF THE ISSUES AND SECURITY OF CLOUD COMPUTING
A STUDY OF THE ISSUES AND SECURITY OF CLOUD COMPUTINGA STUDY OF THE ISSUES AND SECURITY OF CLOUD COMPUTING
A STUDY OF THE ISSUES AND SECURITY OF CLOUD COMPUTINGEr Piyush Gupta IN ⊞⌘
 
The Nist definition of cloud computing cloud computing Research Paper
The Nist definition of cloud computing cloud computing Research PaperThe Nist definition of cloud computing cloud computing Research Paper
The Nist definition of cloud computing cloud computing Research PaperFaimin Khan
 
Cloud computing security & forensics (manu)
Cloud computing security & forensics (manu)Cloud computing security & forensics (manu)
Cloud computing security & forensics (manu)ClubHack
 
AWS Summit 2011: Cloud Compliance 101: No PhD required - SafeNet
AWS Summit 2011: Cloud Compliance 101: No PhD required - SafeNetAWS Summit 2011: Cloud Compliance 101: No PhD required - SafeNet
AWS Summit 2011: Cloud Compliance 101: No PhD required - SafeNetAmazon Web Services
 
Security in Cloud Computing
Security in Cloud ComputingSecurity in Cloud Computing
Security in Cloud ComputingAshish Patel
 
Cloud Security Strategy
Cloud Security StrategyCloud Security Strategy
Cloud Security StrategyCapgemini
 
SECURE CLOUD ARCHITECTURE
SECURE CLOUD ARCHITECTURESECURE CLOUD ARCHITECTURE
SECURE CLOUD ARCHITECTUREacijjournal
 
Privacy in cloud computing
Privacy in cloud computingPrivacy in cloud computing
Privacy in cloud computingAhmed Nour
 
Cloud computing: opportunities and risks
Cloud computing: opportunities and risksCloud computing: opportunities and risks
Cloud computing: opportunities and risksCloud Legal Project
 
Vendor classification & rating
Vendor classification & ratingVendor classification & rating
Vendor classification & ratingAmit Puri
 
Cloud Computing & ITSM - For Better of for Worse?
Cloud Computing & ITSM - For Better of for Worse?Cloud Computing & ITSM - For Better of for Worse?
Cloud Computing & ITSM - For Better of for Worse?ITpreneurs
 

Was ist angesagt? (20)

Privacy Issues In Cloud Computing
Privacy Issues In Cloud ComputingPrivacy Issues In Cloud Computing
Privacy Issues In Cloud Computing
 
Cloud Security - Security Aspects of Cloud Computing
Cloud Security - Security Aspects of Cloud ComputingCloud Security - Security Aspects of Cloud Computing
Cloud Security - Security Aspects of Cloud Computing
 
Cloud Computing and Security - ISACA Hyderabad Chapter Presentation
Cloud Computing and Security - ISACA Hyderabad Chapter PresentationCloud Computing and Security - ISACA Hyderabad Chapter Presentation
Cloud Computing and Security - ISACA Hyderabad Chapter Presentation
 
A STUDY OF THE ISSUES AND SECURITY OF CLOUD COMPUTING
A STUDY OF THE ISSUES AND SECURITY OF CLOUD COMPUTINGA STUDY OF THE ISSUES AND SECURITY OF CLOUD COMPUTING
A STUDY OF THE ISSUES AND SECURITY OF CLOUD COMPUTING
 
htcia-5-2015
htcia-5-2015htcia-5-2015
htcia-5-2015
 
The Nist definition of cloud computing cloud computing Research Paper
The Nist definition of cloud computing cloud computing Research PaperThe Nist definition of cloud computing cloud computing Research Paper
The Nist definition of cloud computing cloud computing Research Paper
 
Cloud computing security & forensics (manu)
Cloud computing security & forensics (manu)Cloud computing security & forensics (manu)
Cloud computing security & forensics (manu)
 
Cloud Computing
Cloud ComputingCloud Computing
Cloud Computing
 
AWS Summit 2011: Cloud Compliance 101: No PhD required - SafeNet
AWS Summit 2011: Cloud Compliance 101: No PhD required - SafeNetAWS Summit 2011: Cloud Compliance 101: No PhD required - SafeNet
AWS Summit 2011: Cloud Compliance 101: No PhD required - SafeNet
 
Security in Cloud Computing
Security in Cloud ComputingSecurity in Cloud Computing
Security in Cloud Computing
 
Cloud Security Strategy
Cloud Security StrategyCloud Security Strategy
Cloud Security Strategy
 
SECURE CLOUD ARCHITECTURE
SECURE CLOUD ARCHITECTURESECURE CLOUD ARCHITECTURE
SECURE CLOUD ARCHITECTURE
 
Privacy in cloud computing
Privacy in cloud computingPrivacy in cloud computing
Privacy in cloud computing
 
Cloud computing: opportunities and risks
Cloud computing: opportunities and risksCloud computing: opportunities and risks
Cloud computing: opportunities and risks
 
Cloud computing
Cloud computingCloud computing
Cloud computing
 
Cloud computing
Cloud computingCloud computing
Cloud computing
 
Vendor classification & rating
Vendor classification & ratingVendor classification & rating
Vendor classification & rating
 
Cloud Computing & ITSM - For Better of for Worse?
Cloud Computing & ITSM - For Better of for Worse?Cloud Computing & ITSM - For Better of for Worse?
Cloud Computing & ITSM - For Better of for Worse?
 
Cloud Security
Cloud Security Cloud Security
Cloud Security
 
Myths About Cloud Computing
Myths About Cloud ComputingMyths About Cloud Computing
Myths About Cloud Computing
 

Andere mochten auch

Cloud Computing Security
Cloud Computing SecurityCloud Computing Security
Cloud Computing SecurityNinh Nguyen
 
Privacy Concerns and Cloud Computing
Privacy Concerns and Cloud ComputingPrivacy Concerns and Cloud Computing
Privacy Concerns and Cloud ComputingAIIM International
 
Grow your business by shaping the human impacts of technology
Grow your business by shaping the human impacts of technologyGrow your business by shaping the human impacts of technology
Grow your business by shaping the human impacts of technologyMichael Siepmann, Ph.D.
 
Cloud is not an option, but is security?
Cloud is not an option, but is security?Cloud is not an option, but is security?
Cloud is not an option, but is security?Jody Keyser
 
Security & Governance for the Cloud: a Savvis Case Study (Presented at Cloud ...
Security & Governance for the Cloud: a Savvis Case Study (Presented at Cloud ...Security & Governance for the Cloud: a Savvis Case Study (Presented at Cloud ...
Security & Governance for the Cloud: a Savvis Case Study (Presented at Cloud ...CA API Management
 
Cloud Computing Security Issues
Cloud Computing Security IssuesCloud Computing Security Issues
Cloud Computing Security IssuesStelios Krasadakis
 
Security & Compliance in the Cloud - Proactively Managing Governance, Risk & ...
Security & Compliance in the Cloud - Proactively Managing Governance, Risk & ...Security & Compliance in the Cloud - Proactively Managing Governance, Risk & ...
Security & Compliance in the Cloud - Proactively Managing Governance, Risk & ...Chad Lawler
 
Concerns with cloud computing
Concerns with cloud computingConcerns with cloud computing
Concerns with cloud computingUlf Mattsson
 
The shortest path to cloud success - your roadmap
The shortest path to cloud success - your roadmapThe shortest path to cloud success - your roadmap
The shortest path to cloud success - your roadmapGabe Akisanmi
 
Cloud Computing: Architecture, IT Security and Operational Perspectives
Cloud Computing: Architecture, IT Security and Operational PerspectivesCloud Computing: Architecture, IT Security and Operational Perspectives
Cloud Computing: Architecture, IT Security and Operational PerspectivesMegan Eskey
 
Cloud Computing Security
Cloud Computing SecurityCloud Computing Security
Cloud Computing Securityneicher
 
Operational Best Practices in the Cloud
Operational Best Practices in the CloudOperational Best Practices in the Cloud
Operational Best Practices in the CloudRightScale
 
Integrated Cloud Framework: Security, Governance, Compliance, Content Applica...
Integrated Cloud Framework: Security, Governance, Compliance, Content Applica...Integrated Cloud Framework: Security, Governance, Compliance, Content Applica...
Integrated Cloud Framework: Security, Governance, Compliance, Content Applica...Chad Lawler
 
Enterprise Cloud Operating Model Design
Enterprise Cloud Operating Model DesignEnterprise Cloud Operating Model Design
Enterprise Cloud Operating Model DesignJoseph Schwartz
 
Cloud Computing Security
Cloud Computing SecurityCloud Computing Security
Cloud Computing SecurityDhaval Dave
 
Cloud computing & security basics
Cloud computing & security   basicsCloud computing & security   basics
Cloud computing & security basicsRahul Gurnani
 
Data security in cloud computing
Data security in cloud computingData security in cloud computing
Data security in cloud computingPrince Chandu
 

Andere mochten auch (20)

Cloud Computing Security
Cloud Computing SecurityCloud Computing Security
Cloud Computing Security
 
How to Overcome Content Security Concerns in the Cloud
How to Overcome Content Security Concerns in the CloudHow to Overcome Content Security Concerns in the Cloud
How to Overcome Content Security Concerns in the Cloud
 
Privacy Concerns and Cloud Computing
Privacy Concerns and Cloud ComputingPrivacy Concerns and Cloud Computing
Privacy Concerns and Cloud Computing
 
Grow your business by shaping the human impacts of technology
Grow your business by shaping the human impacts of technologyGrow your business by shaping the human impacts of technology
Grow your business by shaping the human impacts of technology
 
Cloud Computing & Security Concerns
Cloud Computing & Security ConcernsCloud Computing & Security Concerns
Cloud Computing & Security Concerns
 
Cloud is not an option, but is security?
Cloud is not an option, but is security?Cloud is not an option, but is security?
Cloud is not an option, but is security?
 
Security & Governance for the Cloud: a Savvis Case Study (Presented at Cloud ...
Security & Governance for the Cloud: a Savvis Case Study (Presented at Cloud ...Security & Governance for the Cloud: a Savvis Case Study (Presented at Cloud ...
Security & Governance for the Cloud: a Savvis Case Study (Presented at Cloud ...
 
Cloud Computing Security Issues
Cloud Computing Security IssuesCloud Computing Security Issues
Cloud Computing Security Issues
 
Security & Compliance in the Cloud - Proactively Managing Governance, Risk & ...
Security & Compliance in the Cloud - Proactively Managing Governance, Risk & ...Security & Compliance in the Cloud - Proactively Managing Governance, Risk & ...
Security & Compliance in the Cloud - Proactively Managing Governance, Risk & ...
 
Concerns with cloud computing
Concerns with cloud computingConcerns with cloud computing
Concerns with cloud computing
 
The shortest path to cloud success - your roadmap
The shortest path to cloud success - your roadmapThe shortest path to cloud success - your roadmap
The shortest path to cloud success - your roadmap
 
Cloud Computing: Architecture, IT Security and Operational Perspectives
Cloud Computing: Architecture, IT Security and Operational PerspectivesCloud Computing: Architecture, IT Security and Operational Perspectives
Cloud Computing: Architecture, IT Security and Operational Perspectives
 
Cloud Computing Security
Cloud Computing SecurityCloud Computing Security
Cloud Computing Security
 
Operational Best Practices in the Cloud
Operational Best Practices in the CloudOperational Best Practices in the Cloud
Operational Best Practices in the Cloud
 
Integrated Cloud Framework: Security, Governance, Compliance, Content Applica...
Integrated Cloud Framework: Security, Governance, Compliance, Content Applica...Integrated Cloud Framework: Security, Governance, Compliance, Content Applica...
Integrated Cloud Framework: Security, Governance, Compliance, Content Applica...
 
Enterprise Cloud Operating Model Design
Enterprise Cloud Operating Model DesignEnterprise Cloud Operating Model Design
Enterprise Cloud Operating Model Design
 
Cloud Computing Security
Cloud Computing SecurityCloud Computing Security
Cloud Computing Security
 
Cloud security ppt
Cloud security pptCloud security ppt
Cloud security ppt
 
Cloud computing & security basics
Cloud computing & security   basicsCloud computing & security   basics
Cloud computing & security basics
 
Data security in cloud computing
Data security in cloud computingData security in cloud computing
Data security in cloud computing
 

Ähnlich wie 10 Security Concerns for Cloud Computing Expert Reference

The why of a cloud ppt
The why of a cloud pptThe why of a cloud ppt
The why of a cloud pptSana Nasar
 
How Secure Is Cloud
How Secure Is CloudHow Secure Is Cloud
How Secure Is CloudWilliam Lam
 
IRJET - Multitenancy using Cloud Computing Features
IRJET - Multitenancy using Cloud Computing FeaturesIRJET - Multitenancy using Cloud Computing Features
IRJET - Multitenancy using Cloud Computing FeaturesIRJET Journal
 
The Nitty Gritty of Cloud Computing
The Nitty Gritty of Cloud ComputingThe Nitty Gritty of Cloud Computing
The Nitty Gritty of Cloud ComputingMike Tase
 
Security of Data in Cloud Environment Using DPaaS
Security of Data in Cloud Environment Using DPaaSSecurity of Data in Cloud Environment Using DPaaS
Security of Data in Cloud Environment Using DPaaSIJMER
 
Cloud Computing Security Issues and Challenges
Cloud Computing Security Issues and ChallengesCloud Computing Security Issues and Challenges
Cloud Computing Security Issues and ChallengesCSCJournals
 
How secured and safe is Cloud?
How secured and safe is Cloud?How secured and safe is Cloud?
How secured and safe is Cloud?IRJET Journal
 
Celera Networks on Cloud Computing
Celera Networks on Cloud Computing Celera Networks on Cloud Computing
Celera Networks on Cloud Computing CeleraNetworks
 
Security Issues in Cloud Computing by rahul abhishek
Security Issues in Cloud Computing  by rahul abhishekSecurity Issues in Cloud Computing  by rahul abhishek
Security Issues in Cloud Computing by rahul abhishekEr. rahul abhishek
 
Security for Effective Data Storage in Multi Clouds
Security for Effective Data Storage in Multi CloudsSecurity for Effective Data Storage in Multi Clouds
Security for Effective Data Storage in Multi CloudsEditor IJCATR
 
A Comparative Review on Data Security Challenges in Cloud Computing
A Comparative Review on Data Security Challenges in Cloud ComputingA Comparative Review on Data Security Challenges in Cloud Computing
A Comparative Review on Data Security Challenges in Cloud ComputingIRJET Journal
 
Cloud computing Risk management
Cloud computing Risk management  Cloud computing Risk management
Cloud computing Risk management Padma Jella
 
International Journal of Engineering Research and Development (IJERD)
International Journal of Engineering Research and Development (IJERD)International Journal of Engineering Research and Development (IJERD)
International Journal of Engineering Research and Development (IJERD)IJERD Editor
 
Solutions of cloud computing security issues
Solutions of cloud computing security issuesSolutions of cloud computing security issues
Solutions of cloud computing security issuesJahangeer Qadiree
 

Ähnlich wie 10 Security Concerns for Cloud Computing Expert Reference (20)

An Intro to Cloud Computing
An Intro to Cloud ComputingAn Intro to Cloud Computing
An Intro to Cloud Computing
 
The why of a cloud ppt
The why of a cloud pptThe why of a cloud ppt
The why of a cloud ppt
 
How Secure Is Cloud
How Secure Is CloudHow Secure Is Cloud
How Secure Is Cloud
 
1 - Cloud Computing Basics.pptx
1 - Cloud Computing Basics.pptx1 - Cloud Computing Basics.pptx
1 - Cloud Computing Basics.pptx
 
IRJET - Multitenancy using Cloud Computing Features
IRJET - Multitenancy using Cloud Computing FeaturesIRJET - Multitenancy using Cloud Computing Features
IRJET - Multitenancy using Cloud Computing Features
 
Cloud computings
Cloud computingsCloud computings
Cloud computings
 
The Nitty Gritty of Cloud Computing
The Nitty Gritty of Cloud ComputingThe Nitty Gritty of Cloud Computing
The Nitty Gritty of Cloud Computing
 
Security of Data in Cloud Environment Using DPaaS
Security of Data in Cloud Environment Using DPaaSSecurity of Data in Cloud Environment Using DPaaS
Security of Data in Cloud Environment Using DPaaS
 
SECURITY ISSUES IN CLOUD COMPUTING
SECURITY ISSUES IN CLOUD COMPUTINGSECURITY ISSUES IN CLOUD COMPUTING
SECURITY ISSUES IN CLOUD COMPUTING
 
Cloud Computing Security Issues and Challenges
Cloud Computing Security Issues and ChallengesCloud Computing Security Issues and Challenges
Cloud Computing Security Issues and Challenges
 
Ad4502189193
Ad4502189193Ad4502189193
Ad4502189193
 
How secured and safe is Cloud?
How secured and safe is Cloud?How secured and safe is Cloud?
How secured and safe is Cloud?
 
Celera Networks on Cloud Computing
Celera Networks on Cloud Computing Celera Networks on Cloud Computing
Celera Networks on Cloud Computing
 
Security Issues in Cloud Computing by rahul abhishek
Security Issues in Cloud Computing  by rahul abhishekSecurity Issues in Cloud Computing  by rahul abhishek
Security Issues in Cloud Computing by rahul abhishek
 
Security for Effective Data Storage in Multi Clouds
Security for Effective Data Storage in Multi CloudsSecurity for Effective Data Storage in Multi Clouds
Security for Effective Data Storage in Multi Clouds
 
A Comparative Review on Data Security Challenges in Cloud Computing
A Comparative Review on Data Security Challenges in Cloud ComputingA Comparative Review on Data Security Challenges in Cloud Computing
A Comparative Review on Data Security Challenges in Cloud Computing
 
A Review on Data Protection of Cloud Computing Security, Benefits, Risks and ...
A Review on Data Protection of Cloud Computing Security, Benefits, Risks and ...A Review on Data Protection of Cloud Computing Security, Benefits, Risks and ...
A Review on Data Protection of Cloud Computing Security, Benefits, Risks and ...
 
Cloud computing Risk management
Cloud computing Risk management  Cloud computing Risk management
Cloud computing Risk management
 
International Journal of Engineering Research and Development (IJERD)
International Journal of Engineering Research and Development (IJERD)International Journal of Engineering Research and Development (IJERD)
International Journal of Engineering Research and Development (IJERD)
 
Solutions of cloud computing security issues
Solutions of cloud computing security issuesSolutions of cloud computing security issues
Solutions of cloud computing security issues
 

Mehr von Hossam Zein

the engins that power the future.
the engins that power the future.the engins that power the future.
the engins that power the future.Hossam Zein
 
Options for optimizing combined cycle plants
Options for optimizing combined cycle plantsOptions for optimizing combined cycle plants
Options for optimizing combined cycle plantsHossam Zein
 
Improve plant heat rate with feedwater heater control
Improve plant heat rate with feedwater heater controlImprove plant heat rate with feedwater heater control
Improve plant heat rate with feedwater heater controlHossam Zein
 
01 nuclear energy_overview
01 nuclear energy_overview01 nuclear energy_overview
01 nuclear energy_overviewHossam Zein
 
00 history of_nuclear_fission_short_vers
00 history of_nuclear_fission_short_vers00 history of_nuclear_fission_short_vers
00 history of_nuclear_fission_short_versHossam Zein
 
LMFBR - Superphenix
LMFBR - SuperphenixLMFBR - Superphenix
LMFBR - SuperphenixHossam Zein
 
Climate change-implications-for-the-energy-sector-summary-from-ipcc-ar5-2014-...
Climate change-implications-for-the-energy-sector-summary-from-ipcc-ar5-2014-...Climate change-implications-for-the-energy-sector-summary-from-ipcc-ar5-2014-...
Climate change-implications-for-the-energy-sector-summary-from-ipcc-ar5-2014-...Hossam Zein
 
امن الطاقة والبني التختيه في ضوء التخديات الخالية
امن الطاقة والبني التختيه في ضوء التخديات الخاليةامن الطاقة والبني التختيه في ضوء التخديات الخالية
امن الطاقة والبني التختيه في ضوء التخديات الخاليةHossam Zein
 
Development of of power plants functionality
Development of of power plants functionality Development of of power plants functionality
Development of of power plants functionality Hossam Zein
 
Estimating appliance and home electronic energy use
Estimating appliance and home electronic energy useEstimating appliance and home electronic energy use
Estimating appliance and home electronic energy useHossam Zein
 
3 things to consider when installing solar power at home
3 things to consider when installing solar power at home3 things to consider when installing solar power at home
3 things to consider when installing solar power at homeHossam Zein
 
Planning and Zoning for Solar in North Carolina - Pandzsolar2014
Planning and Zoning for Solar  in North Carolina - Pandzsolar2014Planning and Zoning for Solar  in North Carolina - Pandzsolar2014
Planning and Zoning for Solar in North Carolina - Pandzsolar2014Hossam Zein
 
sonnen solar tracker 1/2
sonnen solar tracker 1/2sonnen solar tracker 1/2
sonnen solar tracker 1/2Hossam Zein
 
SolTrK_data_sheet solar control
SolTrK_data_sheet solar controlSolTrK_data_sheet solar control
SolTrK_data_sheet solar controlHossam Zein
 
sonnen solar tracker 2
sonnen solar tracker 2sonnen solar tracker 2
sonnen solar tracker 2Hossam Zein
 
SMA - SUNNY DESIGN 3 and SUNNY DESIGN WEB
SMA - SUNNY DESIGN 3 and SUNNY DESIGN WEBSMA - SUNNY DESIGN 3 and SUNNY DESIGN WEB
SMA - SUNNY DESIGN 3 and SUNNY DESIGN WEBHossam Zein
 
Solar Power Analysis and Design Specifications Houston solar
Solar Power Analysis and  Design Specifications Houston solarSolar Power Analysis and  Design Specifications Houston solar
Solar Power Analysis and Design Specifications Houston solarHossam Zein
 
Terminal High Altitude Area Defense THAAD
Terminal High Altitude Area Defense THAAD Terminal High Altitude Area Defense THAAD
Terminal High Altitude Area Defense THAAD Hossam Zein
 
multi mission radar (MMR) - EL/M-2084 FOR IRON DOME
multi mission radar (MMR) - EL/M-2084 FOR IRON DOMEmulti mission radar (MMR) - EL/M-2084 FOR IRON DOME
multi mission radar (MMR) - EL/M-2084 FOR IRON DOMEHossam Zein
 
القبـة الحـديديـة | IRon DoMe
القبـة الحـديديـة | IRon DoMeالقبـة الحـديديـة | IRon DoMe
القبـة الحـديديـة | IRon DoMeHossam Zein
 

Mehr von Hossam Zein (20)

the engins that power the future.
the engins that power the future.the engins that power the future.
the engins that power the future.
 
Options for optimizing combined cycle plants
Options for optimizing combined cycle plantsOptions for optimizing combined cycle plants
Options for optimizing combined cycle plants
 
Improve plant heat rate with feedwater heater control
Improve plant heat rate with feedwater heater controlImprove plant heat rate with feedwater heater control
Improve plant heat rate with feedwater heater control
 
01 nuclear energy_overview
01 nuclear energy_overview01 nuclear energy_overview
01 nuclear energy_overview
 
00 history of_nuclear_fission_short_vers
00 history of_nuclear_fission_short_vers00 history of_nuclear_fission_short_vers
00 history of_nuclear_fission_short_vers
 
LMFBR - Superphenix
LMFBR - SuperphenixLMFBR - Superphenix
LMFBR - Superphenix
 
Climate change-implications-for-the-energy-sector-summary-from-ipcc-ar5-2014-...
Climate change-implications-for-the-energy-sector-summary-from-ipcc-ar5-2014-...Climate change-implications-for-the-energy-sector-summary-from-ipcc-ar5-2014-...
Climate change-implications-for-the-energy-sector-summary-from-ipcc-ar5-2014-...
 
امن الطاقة والبني التختيه في ضوء التخديات الخالية
امن الطاقة والبني التختيه في ضوء التخديات الخاليةامن الطاقة والبني التختيه في ضوء التخديات الخالية
امن الطاقة والبني التختيه في ضوء التخديات الخالية
 
Development of of power plants functionality
Development of of power plants functionality Development of of power plants functionality
Development of of power plants functionality
 
Estimating appliance and home electronic energy use
Estimating appliance and home electronic energy useEstimating appliance and home electronic energy use
Estimating appliance and home electronic energy use
 
3 things to consider when installing solar power at home
3 things to consider when installing solar power at home3 things to consider when installing solar power at home
3 things to consider when installing solar power at home
 
Planning and Zoning for Solar in North Carolina - Pandzsolar2014
Planning and Zoning for Solar  in North Carolina - Pandzsolar2014Planning and Zoning for Solar  in North Carolina - Pandzsolar2014
Planning and Zoning for Solar in North Carolina - Pandzsolar2014
 
sonnen solar tracker 1/2
sonnen solar tracker 1/2sonnen solar tracker 1/2
sonnen solar tracker 1/2
 
SolTrK_data_sheet solar control
SolTrK_data_sheet solar controlSolTrK_data_sheet solar control
SolTrK_data_sheet solar control
 
sonnen solar tracker 2
sonnen solar tracker 2sonnen solar tracker 2
sonnen solar tracker 2
 
SMA - SUNNY DESIGN 3 and SUNNY DESIGN WEB
SMA - SUNNY DESIGN 3 and SUNNY DESIGN WEBSMA - SUNNY DESIGN 3 and SUNNY DESIGN WEB
SMA - SUNNY DESIGN 3 and SUNNY DESIGN WEB
 
Solar Power Analysis and Design Specifications Houston solar
Solar Power Analysis and  Design Specifications Houston solarSolar Power Analysis and  Design Specifications Houston solar
Solar Power Analysis and Design Specifications Houston solar
 
Terminal High Altitude Area Defense THAAD
Terminal High Altitude Area Defense THAAD Terminal High Altitude Area Defense THAAD
Terminal High Altitude Area Defense THAAD
 
multi mission radar (MMR) - EL/M-2084 FOR IRON DOME
multi mission radar (MMR) - EL/M-2084 FOR IRON DOMEmulti mission radar (MMR) - EL/M-2084 FOR IRON DOME
multi mission radar (MMR) - EL/M-2084 FOR IRON DOME
 
القبـة الحـديديـة | IRon DoMe
القبـة الحـديديـة | IRon DoMeالقبـة الحـديديـة | IRon DoMe
القبـة الحـديديـة | IRon DoMe
 

Kürzlich hochgeladen

Russian Call Girl South End Park - Call 8250192130 Rs-3500 with A/C Room Cash...
Russian Call Girl South End Park - Call 8250192130 Rs-3500 with A/C Room Cash...Russian Call Girl South End Park - Call 8250192130 Rs-3500 with A/C Room Cash...
Russian Call Girl South End Park - Call 8250192130 Rs-3500 with A/C Room Cash...anamikaraghav4
 
Call Girls Nashik Gayatri 7001305949 Independent Escort Service Nashik
Call Girls Nashik Gayatri 7001305949 Independent Escort Service NashikCall Girls Nashik Gayatri 7001305949 Independent Escort Service Nashik
Call Girls Nashik Gayatri 7001305949 Independent Escort Service NashikCall Girls in Nagpur High Profile
 
VIP Call Girl Kolhapur Aashi 8250192130 Independent Escort Service Kolhapur
VIP Call Girl Kolhapur Aashi 8250192130 Independent Escort Service KolhapurVIP Call Girl Kolhapur Aashi 8250192130 Independent Escort Service Kolhapur
VIP Call Girl Kolhapur Aashi 8250192130 Independent Escort Service KolhapurRiya Pathan
 
Private Call Girls Durgapur - 8250192130 Escorts Service with Real Photos and...
Private Call Girls Durgapur - 8250192130 Escorts Service with Real Photos and...Private Call Girls Durgapur - 8250192130 Escorts Service with Real Photos and...
Private Call Girls Durgapur - 8250192130 Escorts Service with Real Photos and...Riya Pathan
 
VIP Call Girls in Gulbarga Aarohi 8250192130 Independent Escort Service Gulbarga
VIP Call Girls in Gulbarga Aarohi 8250192130 Independent Escort Service GulbargaVIP Call Girls in Gulbarga Aarohi 8250192130 Independent Escort Service Gulbarga
VIP Call Girls in Gulbarga Aarohi 8250192130 Independent Escort Service GulbargaRiya Pathan
 
GV'S 24 CLUB & BAR CONTACT 09602870969 CALL GIRLS IN UDAIPUR ESCORT SERVICE
GV'S 24 CLUB & BAR CONTACT 09602870969 CALL GIRLS IN UDAIPUR ESCORT SERVICEGV'S 24 CLUB & BAR CONTACT 09602870969 CALL GIRLS IN UDAIPUR ESCORT SERVICE
GV'S 24 CLUB & BAR CONTACT 09602870969 CALL GIRLS IN UDAIPUR ESCORT SERVICEApsara Of India
 
Beautiful 😋 Call girls in Lahore 03210033448
Beautiful 😋 Call girls in Lahore 03210033448Beautiful 😋 Call girls in Lahore 03210033448
Beautiful 😋 Call girls in Lahore 03210033448ont65320
 
↑Top Model (Kolkata) Call Girls Rajpur ⟟ 8250192130 ⟟ High Class Call Girl In...
↑Top Model (Kolkata) Call Girls Rajpur ⟟ 8250192130 ⟟ High Class Call Girl In...↑Top Model (Kolkata) Call Girls Rajpur ⟟ 8250192130 ⟟ High Class Call Girl In...
↑Top Model (Kolkata) Call Girls Rajpur ⟟ 8250192130 ⟟ High Class Call Girl In...noor ahmed
 
College Call Girl in Rajiv Chowk Delhi 9634446618 Short 1500 Night 6000 Best ...
College Call Girl in Rajiv Chowk Delhi 9634446618 Short 1500 Night 6000 Best ...College Call Girl in Rajiv Chowk Delhi 9634446618 Short 1500 Night 6000 Best ...
College Call Girl in Rajiv Chowk Delhi 9634446618 Short 1500 Night 6000 Best ...perfect solution
 
Independent Joka Escorts ✔ 8250192130 ✔ Full Night With Room Online Booking 2...
Independent Joka Escorts ✔ 8250192130 ✔ Full Night With Room Online Booking 2...Independent Joka Escorts ✔ 8250192130 ✔ Full Night With Room Online Booking 2...
Independent Joka Escorts ✔ 8250192130 ✔ Full Night With Room Online Booking 2...noor ahmed
 
VIP Call Girls Service Banjara Hills Hyderabad Call +91-8250192130
VIP Call Girls Service Banjara Hills Hyderabad Call +91-8250192130VIP Call Girls Service Banjara Hills Hyderabad Call +91-8250192130
VIP Call Girls Service Banjara Hills Hyderabad Call +91-8250192130Suhani Kapoor
 
Low Rate Call Girls Ajmer Anika 8250192130 Independent Escort Service Ajmer
Low Rate Call Girls Ajmer Anika 8250192130 Independent Escort Service AjmerLow Rate Call Girls Ajmer Anika 8250192130 Independent Escort Service Ajmer
Low Rate Call Girls Ajmer Anika 8250192130 Independent Escort Service AjmerRiya Pathan
 
Housewife Call Girls Sonagachi - 8250192130 Booking and charges genuine rate ...
Housewife Call Girls Sonagachi - 8250192130 Booking and charges genuine rate ...Housewife Call Girls Sonagachi - 8250192130 Booking and charges genuine rate ...
Housewife Call Girls Sonagachi - 8250192130 Booking and charges genuine rate ...Riya Pathan
 
↑Top Model (Kolkata) Call Girls Behala ⟟ 8250192130 ⟟ High Class Call Girl In...
↑Top Model (Kolkata) Call Girls Behala ⟟ 8250192130 ⟟ High Class Call Girl In...↑Top Model (Kolkata) Call Girls Behala ⟟ 8250192130 ⟟ High Class Call Girl In...
↑Top Model (Kolkata) Call Girls Behala ⟟ 8250192130 ⟟ High Class Call Girl In...noor ahmed
 
Dakshineswar Call Girls ✔ 8005736733 ✔ Hot Model With Sexy Bhabi Ready For Se...
Dakshineswar Call Girls ✔ 8005736733 ✔ Hot Model With Sexy Bhabi Ready For Se...Dakshineswar Call Girls ✔ 8005736733 ✔ Hot Model With Sexy Bhabi Ready For Se...
Dakshineswar Call Girls ✔ 8005736733 ✔ Hot Model With Sexy Bhabi Ready For Se...aamir
 
VIP Call Girls Nagpur Megha Call 7001035870 Meet With Nagpur Escorts
VIP Call Girls Nagpur Megha Call 7001035870 Meet With Nagpur EscortsVIP Call Girls Nagpur Megha Call 7001035870 Meet With Nagpur Escorts
VIP Call Girls Nagpur Megha Call 7001035870 Meet With Nagpur Escortsranjana rawat
 
Independent Hatiara Escorts ✔ 8250192130 ✔ Full Night With Room Online Bookin...
Independent Hatiara Escorts ✔ 8250192130 ✔ Full Night With Room Online Bookin...Independent Hatiara Escorts ✔ 8250192130 ✔ Full Night With Room Online Bookin...
Independent Hatiara Escorts ✔ 8250192130 ✔ Full Night With Room Online Bookin...Riya Pathan
 
Kolkata Call Girl Howrah 👉 8250192130 ❣️💯 Available With Room 24×7
Kolkata Call Girl Howrah 👉 8250192130 ❣️💯 Available With Room 24×7Kolkata Call Girl Howrah 👉 8250192130 ❣️💯 Available With Room 24×7
Kolkata Call Girl Howrah 👉 8250192130 ❣️💯 Available With Room 24×7Riya Pathan
 
Book Call Girls in Panchpota - 8250192130 | 24x7 Service Available Near Me
Book Call Girls in Panchpota - 8250192130 | 24x7 Service Available Near MeBook Call Girls in Panchpota - 8250192130 | 24x7 Service Available Near Me
Book Call Girls in Panchpota - 8250192130 | 24x7 Service Available Near Meanamikaraghav4
 

Kürzlich hochgeladen (20)

Russian Call Girl South End Park - Call 8250192130 Rs-3500 with A/C Room Cash...
Russian Call Girl South End Park - Call 8250192130 Rs-3500 with A/C Room Cash...Russian Call Girl South End Park - Call 8250192130 Rs-3500 with A/C Room Cash...
Russian Call Girl South End Park - Call 8250192130 Rs-3500 with A/C Room Cash...
 
Call Girls Nashik Gayatri 7001305949 Independent Escort Service Nashik
Call Girls Nashik Gayatri 7001305949 Independent Escort Service NashikCall Girls Nashik Gayatri 7001305949 Independent Escort Service Nashik
Call Girls Nashik Gayatri 7001305949 Independent Escort Service Nashik
 
VIP Call Girl Kolhapur Aashi 8250192130 Independent Escort Service Kolhapur
VIP Call Girl Kolhapur Aashi 8250192130 Independent Escort Service KolhapurVIP Call Girl Kolhapur Aashi 8250192130 Independent Escort Service Kolhapur
VIP Call Girl Kolhapur Aashi 8250192130 Independent Escort Service Kolhapur
 
Private Call Girls Durgapur - 8250192130 Escorts Service with Real Photos and...
Private Call Girls Durgapur - 8250192130 Escorts Service with Real Photos and...Private Call Girls Durgapur - 8250192130 Escorts Service with Real Photos and...
Private Call Girls Durgapur - 8250192130 Escorts Service with Real Photos and...
 
VIP Call Girls in Gulbarga Aarohi 8250192130 Independent Escort Service Gulbarga
VIP Call Girls in Gulbarga Aarohi 8250192130 Independent Escort Service GulbargaVIP Call Girls in Gulbarga Aarohi 8250192130 Independent Escort Service Gulbarga
VIP Call Girls in Gulbarga Aarohi 8250192130 Independent Escort Service Gulbarga
 
GV'S 24 CLUB & BAR CONTACT 09602870969 CALL GIRLS IN UDAIPUR ESCORT SERVICE
GV'S 24 CLUB & BAR CONTACT 09602870969 CALL GIRLS IN UDAIPUR ESCORT SERVICEGV'S 24 CLUB & BAR CONTACT 09602870969 CALL GIRLS IN UDAIPUR ESCORT SERVICE
GV'S 24 CLUB & BAR CONTACT 09602870969 CALL GIRLS IN UDAIPUR ESCORT SERVICE
 
Beautiful 😋 Call girls in Lahore 03210033448
Beautiful 😋 Call girls in Lahore 03210033448Beautiful 😋 Call girls in Lahore 03210033448
Beautiful 😋 Call girls in Lahore 03210033448
 
↑Top Model (Kolkata) Call Girls Rajpur ⟟ 8250192130 ⟟ High Class Call Girl In...
↑Top Model (Kolkata) Call Girls Rajpur ⟟ 8250192130 ⟟ High Class Call Girl In...↑Top Model (Kolkata) Call Girls Rajpur ⟟ 8250192130 ⟟ High Class Call Girl In...
↑Top Model (Kolkata) Call Girls Rajpur ⟟ 8250192130 ⟟ High Class Call Girl In...
 
College Call Girl in Rajiv Chowk Delhi 9634446618 Short 1500 Night 6000 Best ...
College Call Girl in Rajiv Chowk Delhi 9634446618 Short 1500 Night 6000 Best ...College Call Girl in Rajiv Chowk Delhi 9634446618 Short 1500 Night 6000 Best ...
College Call Girl in Rajiv Chowk Delhi 9634446618 Short 1500 Night 6000 Best ...
 
Independent Joka Escorts ✔ 8250192130 ✔ Full Night With Room Online Booking 2...
Independent Joka Escorts ✔ 8250192130 ✔ Full Night With Room Online Booking 2...Independent Joka Escorts ✔ 8250192130 ✔ Full Night With Room Online Booking 2...
Independent Joka Escorts ✔ 8250192130 ✔ Full Night With Room Online Booking 2...
 
VIP Call Girls Service Banjara Hills Hyderabad Call +91-8250192130
VIP Call Girls Service Banjara Hills Hyderabad Call +91-8250192130VIP Call Girls Service Banjara Hills Hyderabad Call +91-8250192130
VIP Call Girls Service Banjara Hills Hyderabad Call +91-8250192130
 
Low Rate Call Girls Ajmer Anika 8250192130 Independent Escort Service Ajmer
Low Rate Call Girls Ajmer Anika 8250192130 Independent Escort Service AjmerLow Rate Call Girls Ajmer Anika 8250192130 Independent Escort Service Ajmer
Low Rate Call Girls Ajmer Anika 8250192130 Independent Escort Service Ajmer
 
Housewife Call Girls Sonagachi - 8250192130 Booking and charges genuine rate ...
Housewife Call Girls Sonagachi - 8250192130 Booking and charges genuine rate ...Housewife Call Girls Sonagachi - 8250192130 Booking and charges genuine rate ...
Housewife Call Girls Sonagachi - 8250192130 Booking and charges genuine rate ...
 
Call Girls Chirag Delhi Delhi WhatsApp Number 9711199171
Call Girls Chirag Delhi Delhi WhatsApp Number 9711199171Call Girls Chirag Delhi Delhi WhatsApp Number 9711199171
Call Girls Chirag Delhi Delhi WhatsApp Number 9711199171
 
↑Top Model (Kolkata) Call Girls Behala ⟟ 8250192130 ⟟ High Class Call Girl In...
↑Top Model (Kolkata) Call Girls Behala ⟟ 8250192130 ⟟ High Class Call Girl In...↑Top Model (Kolkata) Call Girls Behala ⟟ 8250192130 ⟟ High Class Call Girl In...
↑Top Model (Kolkata) Call Girls Behala ⟟ 8250192130 ⟟ High Class Call Girl In...
 
Dakshineswar Call Girls ✔ 8005736733 ✔ Hot Model With Sexy Bhabi Ready For Se...
Dakshineswar Call Girls ✔ 8005736733 ✔ Hot Model With Sexy Bhabi Ready For Se...Dakshineswar Call Girls ✔ 8005736733 ✔ Hot Model With Sexy Bhabi Ready For Se...
Dakshineswar Call Girls ✔ 8005736733 ✔ Hot Model With Sexy Bhabi Ready For Se...
 
VIP Call Girls Nagpur Megha Call 7001035870 Meet With Nagpur Escorts
VIP Call Girls Nagpur Megha Call 7001035870 Meet With Nagpur EscortsVIP Call Girls Nagpur Megha Call 7001035870 Meet With Nagpur Escorts
VIP Call Girls Nagpur Megha Call 7001035870 Meet With Nagpur Escorts
 
Independent Hatiara Escorts ✔ 8250192130 ✔ Full Night With Room Online Bookin...
Independent Hatiara Escorts ✔ 8250192130 ✔ Full Night With Room Online Bookin...Independent Hatiara Escorts ✔ 8250192130 ✔ Full Night With Room Online Bookin...
Independent Hatiara Escorts ✔ 8250192130 ✔ Full Night With Room Online Bookin...
 
Kolkata Call Girl Howrah 👉 8250192130 ❣️💯 Available With Room 24×7
Kolkata Call Girl Howrah 👉 8250192130 ❣️💯 Available With Room 24×7Kolkata Call Girl Howrah 👉 8250192130 ❣️💯 Available With Room 24×7
Kolkata Call Girl Howrah 👉 8250192130 ❣️💯 Available With Room 24×7
 
Book Call Girls in Panchpota - 8250192130 | 24x7 Service Available Near Me
Book Call Girls in Panchpota - 8250192130 | 24x7 Service Available Near MeBook Call Girls in Panchpota - 8250192130 | 24x7 Service Available Near Me
Book Call Girls in Panchpota - 8250192130 | 24x7 Service Available Near Me
 

10 Security Concerns for Cloud Computing Expert Reference

  • 1. Expert Reference Series of White Papers 10 Security Concerns for Cloud Computing 1-800-COURSES www.globalknowledge.com
  • 2. 10 Security Concerns for Cloud Computing Michael Gregg, Global Knowledge Instructor, CISA, CISSP, CISM, MCSE, CTT+, CGEIT, A+, N+, Security+, CNA, CCNA, CIW Security Analyst, CEH, CHFI, CEI, DCNP, ES Dragon IDS, ES Advanced Dragon IDS, and SSCP Introduction Cloud computing gets its name from the drawings typically used to describe the Internet. Cloud comput- ing is a new consumption and delivery model for IT services. The concept of cloud computing represents a shift in thought, in that end users need not know the details of a specific technology. The service is fully managed by the provider. Users can consume services at a rate that is set by their particular needs. This on- demand service can be provided at any time. Cloud Computing Models Cloud computing models can be broken into three basic designs, which are shown here and described below. • Infrastructure-as-a-Service (IaaS) – As the name implies, you are buying infrastructure. You own the soft- ware and are purchasing virtual power to execute as needed. This is much like running a virtual server on your own equipment, except you are now running a virtual server on a virtual disk. This model is similar to a utility company model, as you pay for what you use. An example is Amazon Web Services at http://aws. amazon.com/. Copyright ©2010 Global Knowledge Training LLC. All rights reserved. 2
  • 3. • Platform-as-a-Service (PaaS) – In this model of cloud computing, the provider provides a platform for your use. Services provided by this model include all phases of the system development life cycle (SDLC) and can use application program interfaces (APIs), website portals, or gateway software. Buyers do need to look closely at specific solutions, because some providers do not allow software created by their custom- ers to be moved off the provider’s platform. An example of PaaS is GoogleApps. • Software-as-a-Service (SaaS) – This model is designed to provide everything and simply rent out the soft- ware to the user. The service is usually provided through some type of front end or web portal. While the end user is free to use the service from anywhere, the company pays a per use fee. Salesforce.com offers this type of service. Cloud Computing Providers Gartner predicts that cloud computing will surge to 150 billion dollars by 2013. Below is a partial list of compa- nies that provide cloud computing services: • Amazon • Google • Microsoft • Salesforce.com • Citrix • IBM • Mozyhome • Sun • cohensiveFT • Icloud • Nivanix • VMware • Flexscale • Joyent • Rackspace • 3tera Benefits of Cloud Computing According to International Data Corporation (IDC), “The proliferation of devices, compliance, improved systems performance, online commerce and increased replication to secondary or backup sites is contributing to an an- nual doubling of the amount of information transmitted over the Internet.” The cost of dealing with this amount of data is something that companies must address. In today’s economy, companies are looking at any cost- saving measures, and the bottom line is that cloud computing provides much greater flexibility than previous computing models. The benefits of cloud computing are many. One is reduced cost, since you pay as you go. Other benefits are the portability of the application is that users can work from home, work, or at client locations. This increased mo- bility means employees can access information anywhere they are. There is also the ability of cloud computing to free-up IT workers who may have been occupied performing updates, installing patches, or providing applica- tion support. Security Concerns of Cloud Computing While cost and ease of use are two great benefits of cloud computing, there are significant security concerns that need to be addressed when considering moving critical applications and sensitive data to public and shared cloud environments. To address these concerns, the cloud provider must develop sufficient controls to provide the same or a greater level of security than the organization would have if the cloud were not used. Listed here are ten items to review when considering cloud computing. Copyright ©2010 Global Knowledge Training LLC. All rights reserved. 3
  • 4. 1. Where’s the data? Different countries have different requirements and controls placed on access. Be- cause your data is in the cloud, you may not realize that the data must reside in a physical location. Your cloud provider should agree in writing to provide the level of security required for your customers. 2. Who has access? Access control is a key concern, because insider attacks are a huge risk. A potential hacker is someone who has been entrusted with approved access to the cloud. If anyone doubts this, consider that in early 2009 an insider was accused of planting a logic bomb on Fanny Mae servers that, if launched, would have caused massive damage. Anyone considering using the cloud needs to look at who is managing their data and what types of controls are applied to these individuals. 3. What are your regulatory requirements? Organizations operating in the US, Canada, or the European Union have many regulatory requirements that they must abide by (e.g., ISO 27002, Safe Harbor, ITIL, and COBIT). You must ensure that your cloud provider is able to meet these requirements and is willing to undergo certification, accreditation, and review. 4. Do you have the right to audit? This particular item is no small matter; the cloud provider should agree in writing to the terms of audit. 5. What type of training does the provider offer their employees? This is actually a rather important item, because people will always be the weakest link in security. Knowing how your provider trains their employees is an important item to review. 6. What type of data classification system does the provider use? Questions you should be concerned with here include: Is the data classified? How is your data separated from other users? Encryption should also be discussed. Is it being used while the data is at rest and in transit? You will also want to know what type of encryption is being used. As an example, there is a big difference between WEP and WPA2. 7. What are the service level agreement (SLA) terms? The SLA serves as a contracted level of guaran- teed service between the cloud provider and the customer that specifies what level of services will be provided. 8. What is the long-term viability of the provider? How long has the cloud provider been in business and what is their track record. If they go out of business, what happens to your data? Will your data be returned, and if so, in what format? As an example, in 2007, online storage service MediaMax went out of business following a system administration error that deleted active customer data. The failed com- pany left behind unhappy users and focused concerns on the reliability of cloud computing. 9. What happens if there is a security breach? If a security incident occurs, what support will you re- ceive from the cloud provider? While many providers promote their services as being unhackable, cloud- based services are an attractive target to hackers. Copyright ©2010 Global Knowledge Training LLC. All rights reserved. 4
  • 5. 10. What is the disaster recovery/business continuity plan (DR/BCP)? While you may not know the physical location of your services, it is physically located somewhere. All physical locations face threats such as fire, storms, natural disasters, and loss of power. In case of any of these events, how will the cloud provider respond, and what guarantee of continued services are they promising? As an example, in February 2009, Nokia’s Contacts On Ovi servers crashed. The last reliable backup that Nokia could recover was dated January 23rd, meaning anything synced and stored by users between January 23rd and February 9th was lost completely. Even basic services such as e-mail require a thorough review before moving the service to the cloud. While some organizations are starting to move their e-mail to cloud services hosted by Gmail, Yahoo e-mail, and others, there are issues to consider. In February 2009, Gmail reported an outage that affected its EU users. In January 2010, it was reported that Gmail had been targeted by attackers seeking to gain access to Chinese human rights activists. It was further reported by MSNBC that foreign correspondents may have been targeted. Although these services have many controls built in, it is not impossible for them to be compromised. Questions that companies need to ask before outsourcing even something as basic as e-mail include: • Can you function with no e-mail? • How easy would it be to migrate to another e-mail provider? • What is your email retention policy, and do you have a legal requirement to keep your email for a specific amount of time? • Would your clients be concerned that you store email with sensitive information on a third-party server? Cloud Computing Attacks As more companies move to cloud computing, look for hackers to follow. Some of the potential attack vectors criminals may attempt include: • Denial of Service (DoS) attacks - Some security professionals have argued that the cloud is more vulnerable to DoS attacks, because it is shared by many users, which makes DoS attacks much more dam- aging. Twitter suffered a devastating DoS attack during 2009. • Side Channel attacks – An attacker could attempt to compromise the cloud by placing a malicious virtual machine in close proximity to a target cloud server and then launching a side channel attack. • Authentication attacks – Authentication is a weak point in hosted and virtual services and is fre- quently targeted. There are many different ways to authenticate users; for example, based on what a person knows, has, or is. The mechanisms used to secure the authentication process and the methods used are a frequent target of attackers. • Man-in-the-middle cryptographic attacks – This attack is carried out when an attacker places himself between two users. Anytime attackers can place themselves in the communication’s path, there is the possibility that they can intercept and modify communications. Copyright ©2010 Global Knowledge Training LLC. All rights reserved. 5
  • 6. Conclusion Cloud computing offers real benefits to companies seeking a competitive edge in today’s economy. Many more providers are moving into this area, and the competition is driving prices even lower. Attractive pricing, the ability to free up staff for other duties, and the ability to pay for “as needed” services will continue to drive more businesses to consider cloud computing. The decision to move to cloud-based services should fit into the organization’s overall corporate objectives. Before any services are moved to the cloud, the organization’s senior management should ensure such actions are consistent with their strategic plans and meet acceptance criteria that address the ten items discussed in this article. Just as there are advantages to cloud computing, there are also several key security issues to keep in mind. One such concern is that cloud computing blurs the natural perimeter between the protected inside the hostile outside. Security of any cloud-based services must be closely reviewed to understand what protections your information has. There is also the issue of availability. This availability could be jeopardized by a denial of service or by the service provider suffering a failure or going out of business. Learn More Learn more about how you can improve productivity, enhance efficiency, and sharpen your competitive edge. Check out the following Global Knowledge courses: Security+ Prep Course Foundstone Ultimate Hacking: Web Understanding Networking Fundamentals VMware vSphere: Fast Track [V4] VMware vSphere: Install, Configure, Manage [V4] For more information or to register, visit www.globalknowledge.com or call 1-800-COURSES to speak with a sales representative. Our courses and enhanced, hands-on labs and exercises offer practical skills and tips that you can immediately put to use. Our expert instructors draw upon their experiences to help you understand key concepts and how to apply them to your specific work situation. Choose from our more than 1,200 courses, delivered through Class- rooms, e-Learning, and On-site sessions, to meet your IT and business training needs. About the Author Michael Gregg has 20 years of information security experience. He is the CTO of Superior Solutions, Inc., a Houston-based IT security consulting and auditing firm. He has led security risk assessments and established security programs within top corporations and government agencies. Michael is an expert in security risk assess- ment, security risk management, security criteria, and building corporate security programs. Copyright ©2010 Global Knowledge Training LLC. All rights reserved. 6
  • 7. He holds two associate degrees, a bachelor degree, and a master degree. Some of the certifications he holds include CISA, CISSP, CISM, MCSE, CTT+, CGEIT, A+, N+, Security+, CNA, CCNA, CIW Security Analyst, CEH, CHFI, CEI, DCNP, ES Dragon IDS, ES Advanced Dragon IDS, and SSCP. In addition to his experience performing security assessments, he has authored or coauthored more than 10 books including Certified Ethical Hacker Exam Prep (Que), CISSP Exam Cram 2 (Que), Build Your Own Network Security Lab (Wiley), and Hack the Stack (Syngress). Michael has created more than 15 security-related courses and training classes for various companies and universities. Copyright ©2010 Global Knowledge Training LLC. All rights reserved. 7