SlideShare ist ein Scribd-Unternehmen logo
1 von 10
Security in the Cloud By: Fred Rathweg Instructor: Charlie O’Neal SECR5000      Security Management Sunday, February 28, 2010
What is cloud computing  It is not so simple a question. The internet has seen exponential growth in the last decade to bring us to today where everyone is connecting on a global scale. In the past business had their data in house in the company data center and only had to worry about physical security  Today business pressures are mounting to exploit the financial benefits of cloud computing.  2/28/2010 Security in the Cloud by Fred Rathweg   Webster University (SECR5000  Security Management -  Instructor: Charlie O’Neal) 2
2/28/2010 Definitions of cloud computing Cloud computing is a general term for anything that involves delivering hosted services over the Internet. These services are broadly divided into three categories:  Software-as-a-Service (SaaS).  Platform-as-a-Service (PaaS), Infrastructure-as-a-Service (IaaS),  Cloud solutions includes these technologies but is more comprehensive. Security in the Cloud by Fred Rathweg   Webster University (SECR5000  Security Management -  Instructor: Charlie O’Neal) 3
Anatomy of a cloud 2/28/2010 4 The application services layer hosts applications that fit the SaaS model.  Platform services provide application infrastructure based on demand (Amazon Web Services and Google Apps). The bottom layer of the cloud are physical assets such as servers, network devices, and storage. Virtualization, as with platform services, provides on-demand resources.  Security in the Cloud by Fred Rathweg   Webster University (SECR5000  Security Management -  Instructor: Charlie O’Neal)
Public and Private Clouds 2/28/2010 Public clouds are cloud services provided by a third party (vendor). They exist beyond the company firewall, and they are fully hosted and managed by the cloud provider.  Amazon Web Services is the largest public cloud provider Security in the Cloud by Fred Rathweg   Webster University (SECR5000  Security Management -  Instructor: Charlie O’Neal) 5
2/28/2010 Why cloud computing? It's now feasible to open a business in the cloud without having to purchase a single piece of hardware. The entrepreneurial CIO is already looking at ways to take advantage. The opportunity to achieve the truly flexible, agile, cheap, manageable, e-business has arrived. 					But is it all secure?   Security in the Cloud by Fred Rathweg   Webster University (SECR5000  Security Management -  Instructor: Charlie O’Neal) 6
Google to enlist NSA to help it ward off cyber attacks 2/28/2010 2/28/2010 On Jan. 12, 2010 Google said that its systems and 34 other large tech, defense, energy, financial and media companies had been hacked in a series of intrusions beginning in December.  The Gmail accounts of human rights activists in Europe, China and the United States were also compromised. Google’s future in China is in question depending on the outcome of the talks  Security in the Cloud by Fred Rathweg   Webster University (SECR5000  Security Management -  Instructor: Charlie O’Neal) 7
Broad New Hacking Attack Detected  A global offensive snagged corporate and personal data at nearly 2,500 companies and the operation is still running. The Department of Homeland Security said that ZeuS was among the top five malware infections. 2/28/2010 Security in the Cloud by Fred Rathweg   Webster University (SECR5000  Security Management -  Instructor: Charlie O’Neal) 8
Where are the wholes in the cloud? 2/28/2010 There are 7 security risks in cloud computing for the enterprise that an entrepreneurial CIO should assess before entering the cloud arena. Data integrity and segregation.  Data location.  Recovery,  Privacy Investigative support. Regulatory compliance,  Auditing  Security in the Cloud by Fred Rathweg   Webster University (SECR5000  Security Management -  Instructor: Charlie O’Neal) 9
2/28/2010 Conclusion: There are many reasons why companies shift toward a cloud computing solution. Increase Return On Investment,  Increase Cash Flow  Increased value for the stockholders.  Security is more cost-effective in the cloud.  Security in the Cloud by Fred Rathweg   Webster University (SECR5000  Security Management -  Instructor: Charlie O’Neal) 10

Weitere ähnliche Inhalte

Was ist angesagt?

Skyline Certificate of Completion
Skyline Certificate of CompletionSkyline Certificate of Completion
Skyline Certificate of CompletionChad Leggett
 
Cubeitz 1 Million Bit Encryption
Cubeitz 1 Million Bit EncryptionCubeitz 1 Million Bit Encryption
Cubeitz 1 Million Bit EncryptionIan Ray
 
Seclore for McAfee MVISION Cloud
Seclore for McAfee MVISION CloudSeclore for McAfee MVISION Cloud
Seclore for McAfee MVISION CloudSeclore
 
Data security in cloud compu
Data security in cloud compuData security in cloud compu
Data security in cloud compuANIL247048
 
CSA Argentina - Jornada CXO Cloud
CSA Argentina - Jornada CXO CloudCSA Argentina - Jornada CXO Cloud
CSA Argentina - Jornada CXO CloudCSA Argentina
 
Manage Risk By Protecting the Apps and Data Infographic
Manage Risk By Protecting the Apps and Data InfographicManage Risk By Protecting the Apps and Data Infographic
Manage Risk By Protecting the Apps and Data InfographicCitrix
 
AWS Public Sector Cloud Alliance 2021 August
AWS Public Sector Cloud Alliance 2021 AugustAWS Public Sector Cloud Alliance 2021 August
AWS Public Sector Cloud Alliance 2021 AugustTerence White
 
Anil saldhana identitycloud
Anil saldhana identitycloudAnil saldhana identitycloud
Anil saldhana identitycloudAnil Saldanha
 
Enabling fine grained multi-keyword search supporting classified sub-dictiona...
Enabling fine grained multi-keyword search supporting classified sub-dictiona...Enabling fine grained multi-keyword search supporting classified sub-dictiona...
Enabling fine grained multi-keyword search supporting classified sub-dictiona...LeMeniz Infotech
 
Cloud computing: 5 myths
Cloud computing: 5 mythsCloud computing: 5 myths
Cloud computing: 5 mythsDot Net IT
 
7 steps to cloud transformation
7 steps to cloud transformation7 steps to cloud transformation
7 steps to cloud transformationSingtel
 
Encryption Algorithms for Cloud
Encryption Algorithms for CloudEncryption Algorithms for Cloud
Encryption Algorithms for CloudMphasis
 
Andrew Yeomans, Infosecurity.nl, 3 november 2010, Jaarbeurs Utrecht
Andrew Yeomans, Infosecurity.nl, 3 november 2010, Jaarbeurs UtrechtAndrew Yeomans, Infosecurity.nl, 3 november 2010, Jaarbeurs Utrecht
Andrew Yeomans, Infosecurity.nl, 3 november 2010, Jaarbeurs UtrechtInfosecurity2010
 
Corero Network Security Appoints Ashley Stephenson as Executive Vice President
Corero Network Security Appoints Ashley Stephenson as Executive Vice PresidentCorero Network Security Appoints Ashley Stephenson as Executive Vice President
Corero Network Security Appoints Ashley Stephenson as Executive Vice Presidentflashnewsrelease
 
Keynote session – Mitigate risks and stay compliant with Chris Bridgland and ...
Keynote session – Mitigate risks and stay compliant with Chris Bridgland and ...Keynote session – Mitigate risks and stay compliant with Chris Bridgland and ...
Keynote session – Mitigate risks and stay compliant with Chris Bridgland and ...Veritas Technologies LLC
 
Cloud security training, certified cloud security professional
Cloud security training, certified cloud security professionalCloud security training, certified cloud security professional
Cloud security training, certified cloud security professionalBryan Len
 

Was ist angesagt? (17)

Skyline Certificate of Completion
Skyline Certificate of CompletionSkyline Certificate of Completion
Skyline Certificate of Completion
 
Cubeitz 1 Million Bit Encryption
Cubeitz 1 Million Bit EncryptionCubeitz 1 Million Bit Encryption
Cubeitz 1 Million Bit Encryption
 
Seclore for McAfee MVISION Cloud
Seclore for McAfee MVISION CloudSeclore for McAfee MVISION Cloud
Seclore for McAfee MVISION Cloud
 
Data security in cloud compu
Data security in cloud compuData security in cloud compu
Data security in cloud compu
 
CSA Argentina - Jornada CXO Cloud
CSA Argentina - Jornada CXO CloudCSA Argentina - Jornada CXO Cloud
CSA Argentina - Jornada CXO Cloud
 
Manage Risk By Protecting the Apps and Data Infographic
Manage Risk By Protecting the Apps and Data InfographicManage Risk By Protecting the Apps and Data Infographic
Manage Risk By Protecting the Apps and Data Infographic
 
AWS Public Sector Cloud Alliance 2021 August
AWS Public Sector Cloud Alliance 2021 AugustAWS Public Sector Cloud Alliance 2021 August
AWS Public Sector Cloud Alliance 2021 August
 
Anil saldhana identitycloud
Anil saldhana identitycloudAnil saldhana identitycloud
Anil saldhana identitycloud
 
Enabling fine grained multi-keyword search supporting classified sub-dictiona...
Enabling fine grained multi-keyword search supporting classified sub-dictiona...Enabling fine grained multi-keyword search supporting classified sub-dictiona...
Enabling fine grained multi-keyword search supporting classified sub-dictiona...
 
Cloud computing: 5 myths
Cloud computing: 5 mythsCloud computing: 5 myths
Cloud computing: 5 myths
 
7 steps to cloud transformation
7 steps to cloud transformation7 steps to cloud transformation
7 steps to cloud transformation
 
Cloud Security
Cloud SecurityCloud Security
Cloud Security
 
Encryption Algorithms for Cloud
Encryption Algorithms for CloudEncryption Algorithms for Cloud
Encryption Algorithms for Cloud
 
Andrew Yeomans, Infosecurity.nl, 3 november 2010, Jaarbeurs Utrecht
Andrew Yeomans, Infosecurity.nl, 3 november 2010, Jaarbeurs UtrechtAndrew Yeomans, Infosecurity.nl, 3 november 2010, Jaarbeurs Utrecht
Andrew Yeomans, Infosecurity.nl, 3 november 2010, Jaarbeurs Utrecht
 
Corero Network Security Appoints Ashley Stephenson as Executive Vice President
Corero Network Security Appoints Ashley Stephenson as Executive Vice PresidentCorero Network Security Appoints Ashley Stephenson as Executive Vice President
Corero Network Security Appoints Ashley Stephenson as Executive Vice President
 
Keynote session – Mitigate risks and stay compliant with Chris Bridgland and ...
Keynote session – Mitigate risks and stay compliant with Chris Bridgland and ...Keynote session – Mitigate risks and stay compliant with Chris Bridgland and ...
Keynote session – Mitigate risks and stay compliant with Chris Bridgland and ...
 
Cloud security training, certified cloud security professional
Cloud security training, certified cloud security professionalCloud security training, certified cloud security professional
Cloud security training, certified cloud security professional
 

Andere mochten auch

STUDENT'S WORD CLOUDS VOCABULARY UNIT 2
STUDENT'S WORD CLOUDS VOCABULARY UNIT 2STUDENT'S WORD CLOUDS VOCABULARY UNIT 2
STUDENT'S WORD CLOUDS VOCABULARY UNIT 2María Madrazo
 
PRESENTATION ABOUT ENERGY BY CLAUDIA HERNÁNDEZ AND MARIO CORTÉS
PRESENTATION ABOUT ENERGY BY CLAUDIA HERNÁNDEZ AND MARIO CORTÉSPRESENTATION ABOUT ENERGY BY CLAUDIA HERNÁNDEZ AND MARIO CORTÉS
PRESENTATION ABOUT ENERGY BY CLAUDIA HERNÁNDEZ AND MARIO CORTÉSMaría Madrazo
 
Sping overheid push call voor online klantcontact met gemeenten
Sping overheid   push call voor online klantcontact met gemeentenSping overheid   push call voor online klantcontact met gemeenten
Sping overheid push call voor online klantcontact met gemeentenawesterik
 
WORLD WATER DAY by Lucía García Yuste
WORLD WATER DAY by Lucía García YusteWORLD WATER DAY by Lucía García Yuste
WORLD WATER DAY by Lucía García YusteMaría Madrazo
 
реферат версия районо
реферат   версия районореферат   версия районо
реферат версия районоrusshohol
 
Activitat 5 de Francesca Vidal
Activitat 5 de Francesca VidalActivitat 5 de Francesca Vidal
Activitat 5 de Francesca Vidalxescavidal
 
SPING CrossMediaTool
SPING CrossMediaToolSPING CrossMediaTool
SPING CrossMediaToolawesterik
 
WORLD WATER DAY by Jimena Pérez Arévalo
WORLD WATER DAY by Jimena Pérez ArévaloWORLD WATER DAY by Jimena Pérez Arévalo
WORLD WATER DAY by Jimena Pérez ArévaloMaría Madrazo
 
Communication Plan For Tata Nano
Communication Plan For Tata NanoCommunication Plan For Tata Nano
Communication Plan For Tata Nanoswapnilgosavi
 
CHILDREN RIGHTS by Children Rights and You
CHILDREN RIGHTS by Children Rights and YouCHILDREN RIGHTS by Children Rights and You
CHILDREN RIGHTS by Children Rights and YouMaría Madrazo
 
Arte románico y gótico
Arte románico y góticoArte románico y gótico
Arte románico y góticoMaría Madrazo
 

Andere mochten auch (17)

STUDENT'S WORD CLOUDS VOCABULARY UNIT 2
STUDENT'S WORD CLOUDS VOCABULARY UNIT 2STUDENT'S WORD CLOUDS VOCABULARY UNIT 2
STUDENT'S WORD CLOUDS VOCABULARY UNIT 2
 
1mirovaya
1mirovaya1mirovaya
1mirovaya
 
PRESENTATION ABOUT ENERGY BY CLAUDIA HERNÁNDEZ AND MARIO CORTÉS
PRESENTATION ABOUT ENERGY BY CLAUDIA HERNÁNDEZ AND MARIO CORTÉSPRESENTATION ABOUT ENERGY BY CLAUDIA HERNÁNDEZ AND MARIO CORTÉS
PRESENTATION ABOUT ENERGY BY CLAUDIA HERNÁNDEZ AND MARIO CORTÉS
 
Sping overheid push call voor online klantcontact met gemeenten
Sping overheid   push call voor online klantcontact met gemeentenSping overheid   push call voor online klantcontact met gemeenten
Sping overheid push call voor online klantcontact met gemeenten
 
WORLD WATER DAY by Lucía García Yuste
WORLD WATER DAY by Lucía García YusteWORLD WATER DAY by Lucía García Yuste
WORLD WATER DAY by Lucía García Yuste
 
Geroi_VOV
Geroi_VOVGeroi_VOV
Geroi_VOV
 
реферат версия районо
реферат   версия районореферат   версия районо
реферат версия районо
 
Activitat 5 de Francesca Vidal
Activitat 5 de Francesca VidalActivitat 5 de Francesca Vidal
Activitat 5 de Francesca Vidal
 
SPING CrossMediaTool
SPING CrossMediaToolSPING CrossMediaTool
SPING CrossMediaTool
 
Fred Rathweg Compiance 09222010
Fred Rathweg Compiance 09222010Fred Rathweg Compiance 09222010
Fred Rathweg Compiance 09222010
 
M Qi Series Linux
M Qi Series LinuxM Qi Series Linux
M Qi Series Linux
 
WORLD WATER DAY by Jimena Pérez Arévalo
WORLD WATER DAY by Jimena Pérez ArévaloWORLD WATER DAY by Jimena Pérez Arévalo
WORLD WATER DAY by Jimena Pérez Arévalo
 
Communication Plan For Tata Nano
Communication Plan For Tata NanoCommunication Plan For Tata Nano
Communication Plan For Tata Nano
 
Installing Aix
Installing AixInstalling Aix
Installing Aix
 
Living things
Living thingsLiving things
Living things
 
CHILDREN RIGHTS by Children Rights and You
CHILDREN RIGHTS by Children Rights and YouCHILDREN RIGHTS by Children Rights and You
CHILDREN RIGHTS by Children Rights and You
 
Arte románico y gótico
Arte románico y góticoArte románico y gótico
Arte románico y gótico
 

Ähnlich wie Security In The Cloud Timed

CLOUD COMPUTING -Risks, Countermeasures, Costs and Benefits-
CLOUD COMPUTING -Risks, Countermeasures, Costs and Benefits-CLOUD COMPUTING -Risks, Countermeasures, Costs and Benefits-
CLOUD COMPUTING -Risks, Countermeasures, Costs and Benefits-Lillian Ekwosi-Egbulem
 
Methodologies for Resolving Data Security and Privacy Protection Issues in Cl...
Methodologies for Resolving Data Security and Privacy Protection Issues in Cl...Methodologies for Resolving Data Security and Privacy Protection Issues in Cl...
Methodologies for Resolving Data Security and Privacy Protection Issues in Cl...AJASTJournal
 
Methodologies for Resolving Data Security and Privacy Protection Issues in Cl...
Methodologies for Resolving Data Security and Privacy Protection Issues in Cl...Methodologies for Resolving Data Security and Privacy Protection Issues in Cl...
Methodologies for Resolving Data Security and Privacy Protection Issues in Cl...Associate Professor in VSB Coimbatore
 
INFORMATION SECURITY IN CLOUD COMPUTING
INFORMATION SECURITY IN CLOUD COMPUTINGINFORMATION SECURITY IN CLOUD COMPUTING
INFORMATION SECURITY IN CLOUD COMPUTINGijitcs
 
Security in Cloud Computing
Security in Cloud ComputingSecurity in Cloud Computing
Security in Cloud ComputingAshish Patel
 
SECURE DATA TRANSFER BASED ON CLOUD COMPUTING
SECURE DATA TRANSFER BASED ON CLOUD COMPUTINGSECURE DATA TRANSFER BASED ON CLOUD COMPUTING
SECURE DATA TRANSFER BASED ON CLOUD COMPUTINGIRJET Journal
 
The Secure Path to Value in the Cloud by Denny Heaberlin
The Secure Path to Value in the Cloud by Denny HeaberlinThe Secure Path to Value in the Cloud by Denny Heaberlin
The Secure Path to Value in the Cloud by Denny HeaberlinCloud Expo
 
Bringing Cloud Computing Out of the Shadows: Shine the light on Shadow IT wit...
Bringing Cloud Computing Out of the Shadows: Shine the light on Shadow IT wit...Bringing Cloud Computing Out of the Shadows: Shine the light on Shadow IT wit...
Bringing Cloud Computing Out of the Shadows: Shine the light on Shadow IT wit...DivvyCloud
 
Exploring Cloud Encryption
Exploring Cloud EncryptionExploring Cloud Encryption
Exploring Cloud EncryptionSamuel Borthwick
 
Challenges and Security Issues in Future IT Infrastructure Components
Challenges and Security Issues in Future IT Infrastructure ComponentsChallenges and Security Issues in Future IT Infrastructure Components
Challenges and Security Issues in Future IT Infrastructure ComponentsMubashir Ali
 
Challenges and Proposed Solutions for Cloud Forensic
Challenges and Proposed Solutions for Cloud ForensicChallenges and Proposed Solutions for Cloud Forensic
Challenges and Proposed Solutions for Cloud ForensicIJERA Editor
 
Cloud Computing Security Issues and Challenges
Cloud Computing Security Issues and ChallengesCloud Computing Security Issues and Challenges
Cloud Computing Security Issues and ChallengesCSCJournals
 
No More Dark Clouds: A Privacy Preserving Framework for the Cloud
No More Dark Clouds: A Privacy Preserving Framework for the CloudNo More Dark Clouds: A Privacy Preserving Framework for the Cloud
No More Dark Clouds: A Privacy Preserving Framework for the CloudPaaSword EU Project
 
Information Sciences 305 (2015) 357–383Contents lists availa.docx
Information Sciences 305 (2015) 357–383Contents lists availa.docxInformation Sciences 305 (2015) 357–383Contents lists availa.docx
Information Sciences 305 (2015) 357–383Contents lists availa.docxvickeryr87
 

Ähnlich wie Security In The Cloud Timed (20)

Outsourcing control
Outsourcing controlOutsourcing control
Outsourcing control
 
CLOUD COMPUTING -Risks, Countermeasures, Costs and Benefits-
CLOUD COMPUTING -Risks, Countermeasures, Costs and Benefits-CLOUD COMPUTING -Risks, Countermeasures, Costs and Benefits-
CLOUD COMPUTING -Risks, Countermeasures, Costs and Benefits-
 
Methodologies for Resolving Data Security and Privacy Protection Issues in Cl...
Methodologies for Resolving Data Security and Privacy Protection Issues in Cl...Methodologies for Resolving Data Security and Privacy Protection Issues in Cl...
Methodologies for Resolving Data Security and Privacy Protection Issues in Cl...
 
Methodologies for Resolving Data Security and Privacy Protection Issues in Cl...
Methodologies for Resolving Data Security and Privacy Protection Issues in Cl...Methodologies for Resolving Data Security and Privacy Protection Issues in Cl...
Methodologies for Resolving Data Security and Privacy Protection Issues in Cl...
 
B018211016
B018211016B018211016
B018211016
 
INFORMATION SECURITY IN CLOUD COMPUTING
INFORMATION SECURITY IN CLOUD COMPUTINGINFORMATION SECURITY IN CLOUD COMPUTING
INFORMATION SECURITY IN CLOUD COMPUTING
 
Security in Cloud Computing
Security in Cloud ComputingSecurity in Cloud Computing
Security in Cloud Computing
 
SECURE DATA TRANSFER BASED ON CLOUD COMPUTING
SECURE DATA TRANSFER BASED ON CLOUD COMPUTINGSECURE DATA TRANSFER BASED ON CLOUD COMPUTING
SECURE DATA TRANSFER BASED ON CLOUD COMPUTING
 
The Secure Path to Value in the Cloud by Denny Heaberlin
The Secure Path to Value in the Cloud by Denny HeaberlinThe Secure Path to Value in the Cloud by Denny Heaberlin
The Secure Path to Value in the Cloud by Denny Heaberlin
 
Bringing Cloud Computing Out of the Shadows: Shine the light on Shadow IT wit...
Bringing Cloud Computing Out of the Shadows: Shine the light on Shadow IT wit...Bringing Cloud Computing Out of the Shadows: Shine the light on Shadow IT wit...
Bringing Cloud Computing Out of the Shadows: Shine the light on Shadow IT wit...
 
Understanding Cloud Security - An In-Depth Exploration For Business Growth | ...
Understanding Cloud Security - An In-Depth Exploration For Business Growth | ...Understanding Cloud Security - An In-Depth Exploration For Business Growth | ...
Understanding Cloud Security - An In-Depth Exploration For Business Growth | ...
 
UNDERSTANDING CLOUD SECURITY- AN IN-DEPTH EXPLORATION FOR BUSINESS GROWTH.pdf
UNDERSTANDING CLOUD SECURITY- AN IN-DEPTH EXPLORATION FOR BUSINESS GROWTH.pdfUNDERSTANDING CLOUD SECURITY- AN IN-DEPTH EXPLORATION FOR BUSINESS GROWTH.pdf
UNDERSTANDING CLOUD SECURITY- AN IN-DEPTH EXPLORATION FOR BUSINESS GROWTH.pdf
 
Exploring Cloud Encryption
Exploring Cloud EncryptionExploring Cloud Encryption
Exploring Cloud Encryption
 
Challenges and Security Issues in Future IT Infrastructure Components
Challenges and Security Issues in Future IT Infrastructure ComponentsChallenges and Security Issues in Future IT Infrastructure Components
Challenges and Security Issues in Future IT Infrastructure Components
 
Challenges and Proposed Solutions for Cloud Forensic
Challenges and Proposed Solutions for Cloud ForensicChallenges and Proposed Solutions for Cloud Forensic
Challenges and Proposed Solutions for Cloud Forensic
 
Slides 530 a2
Slides 530 a2Slides 530 a2
Slides 530 a2
 
Ad4502189193
Ad4502189193Ad4502189193
Ad4502189193
 
Cloud Computing Security Issues and Challenges
Cloud Computing Security Issues and ChallengesCloud Computing Security Issues and Challenges
Cloud Computing Security Issues and Challenges
 
No More Dark Clouds: A Privacy Preserving Framework for the Cloud
No More Dark Clouds: A Privacy Preserving Framework for the CloudNo More Dark Clouds: A Privacy Preserving Framework for the Cloud
No More Dark Clouds: A Privacy Preserving Framework for the Cloud
 
Information Sciences 305 (2015) 357–383Contents lists availa.docx
Information Sciences 305 (2015) 357–383Contents lists availa.docxInformation Sciences 305 (2015) 357–383Contents lists availa.docx
Information Sciences 305 (2015) 357–383Contents lists availa.docx
 

Security In The Cloud Timed

  • 1. Security in the Cloud By: Fred Rathweg Instructor: Charlie O’Neal SECR5000 Security Management Sunday, February 28, 2010
  • 2. What is cloud computing It is not so simple a question. The internet has seen exponential growth in the last decade to bring us to today where everyone is connecting on a global scale. In the past business had their data in house in the company data center and only had to worry about physical security Today business pressures are mounting to exploit the financial benefits of cloud computing. 2/28/2010 Security in the Cloud by Fred Rathweg Webster University (SECR5000 Security Management - Instructor: Charlie O’Neal) 2
  • 3. 2/28/2010 Definitions of cloud computing Cloud computing is a general term for anything that involves delivering hosted services over the Internet. These services are broadly divided into three categories: Software-as-a-Service (SaaS). Platform-as-a-Service (PaaS), Infrastructure-as-a-Service (IaaS), Cloud solutions includes these technologies but is more comprehensive. Security in the Cloud by Fred Rathweg Webster University (SECR5000 Security Management - Instructor: Charlie O’Neal) 3
  • 4. Anatomy of a cloud 2/28/2010 4 The application services layer hosts applications that fit the SaaS model. Platform services provide application infrastructure based on demand (Amazon Web Services and Google Apps). The bottom layer of the cloud are physical assets such as servers, network devices, and storage. Virtualization, as with platform services, provides on-demand resources. Security in the Cloud by Fred Rathweg Webster University (SECR5000 Security Management - Instructor: Charlie O’Neal)
  • 5. Public and Private Clouds 2/28/2010 Public clouds are cloud services provided by a third party (vendor). They exist beyond the company firewall, and they are fully hosted and managed by the cloud provider. Amazon Web Services is the largest public cloud provider Security in the Cloud by Fred Rathweg Webster University (SECR5000 Security Management - Instructor: Charlie O’Neal) 5
  • 6. 2/28/2010 Why cloud computing? It's now feasible to open a business in the cloud without having to purchase a single piece of hardware. The entrepreneurial CIO is already looking at ways to take advantage. The opportunity to achieve the truly flexible, agile, cheap, manageable, e-business has arrived. But is it all secure? Security in the Cloud by Fred Rathweg Webster University (SECR5000 Security Management - Instructor: Charlie O’Neal) 6
  • 7. Google to enlist NSA to help it ward off cyber attacks 2/28/2010 2/28/2010 On Jan. 12, 2010 Google said that its systems and 34 other large tech, defense, energy, financial and media companies had been hacked in a series of intrusions beginning in December. The Gmail accounts of human rights activists in Europe, China and the United States were also compromised. Google’s future in China is in question depending on the outcome of the talks Security in the Cloud by Fred Rathweg Webster University (SECR5000 Security Management - Instructor: Charlie O’Neal) 7
  • 8. Broad New Hacking Attack Detected A global offensive snagged corporate and personal data at nearly 2,500 companies and the operation is still running. The Department of Homeland Security said that ZeuS was among the top five malware infections. 2/28/2010 Security in the Cloud by Fred Rathweg Webster University (SECR5000 Security Management - Instructor: Charlie O’Neal) 8
  • 9. Where are the wholes in the cloud? 2/28/2010 There are 7 security risks in cloud computing for the enterprise that an entrepreneurial CIO should assess before entering the cloud arena. Data integrity and segregation. Data location. Recovery, Privacy Investigative support. Regulatory compliance, Auditing Security in the Cloud by Fred Rathweg Webster University (SECR5000 Security Management - Instructor: Charlie O’Neal) 9
  • 10. 2/28/2010 Conclusion: There are many reasons why companies shift toward a cloud computing solution. Increase Return On Investment, Increase Cash Flow Increased value for the stockholders. Security is more cost-effective in the cloud. Security in the Cloud by Fred Rathweg Webster University (SECR5000 Security Management - Instructor: Charlie O’Neal) 10