SlideShare ist ein Scribd-Unternehmen logo
1 von 26
- The
Technology
which Rules
the Future .
Outline:
 What is Cloud Computing?
 How Cloud Computing Works?
 Types Of Clouds?
 Types of Cloud Services?
 Cloud Computing Security:
 Cloud Security Analysis:
 Balancing the Threat Exposure:
 Working Of Fed RAMP:
 Fed RAMP Authorization Process:
 Benefits Of Fed RAMP:
 Final word:
What is cloud computing?
Cloud Computing is a technology that uses the
internet and central remote servers to maintain data
and applications.
Simple applications of Cloud Computing is yahoo
email, Gmail or hotmail etc.
How cloud computing works?
Cloud computing consists of two layers, namely
BACK END
FRONT END
Two layers:
Front end - Is the part seen by the client,i.e. the
computer user. this includes the client’s network (or
computer) and the applications used to access the
cloud via user interface such as a web browser.
Back end – Is the ‘cloud’ itself, comprising various
computers, servers and data storage devices..
Types of clouds:
Public Clouds Computing environment are open for
used to anyone who wants to sign up and use them.
(Eg:Amazon Web services,google Apennine).
Private Cloud is a Cloud Computing infrastructure
created by an organization for its own internal use
rather than using someone else’s infrastructure.
(Eg:Amazon EC2)
Hybrid Cloud is a composition of at least one private
cloud and at least one public cloud.
(Eg.IBM)
Types of cloud
services:
SAAS END CUSTOMERS
PAAS DEVELOPERS
IAAS SYS ADMINS
What is IAAS?
Infrastructure as a service is provisional in which an
organization outsources the equipment used to support
operations, including storage,hardware,servers and
networking components
Characteristics and components of IAAS include:
o utility computing service and billing model.
o Automation of administrative tasks.
o Dynamic scaling.
o Desktop virualization.
o Policy-based services.
o Internet connectivity.
What is PAAS?
Platform as a service (PAAS) is the deliverance of a
computer platform and resolution stack as a service.
It regularly goes extra with the inclusion of a software
progress platform, that is designed for cloud computing at
the top of the cloud stack.
Characteristics of PAAS:
o PAAS includes workflow amenities for application
propositions.
o PAAS is app progress, testing use and hosting as well as
proposition services such as group partnership.
o PAAS is web service amalgamation,app
versioning,security,storage,persistence,scalability,state
administration and app instrumentation.
What is SAAS?
Applications or software is delivered as a service to the
customer who can access the program from any online
device who can access the program from any online device
,eliminating the need to install and run the applications
on the customer’s own computers and simplifying
maintenance and support.
Characteristics of SAAS:
o Multi tenant Infrastructure.
o Easy Customization.
o Better Access.
CLOUD
SECURITY:
Cloud Security Analysis:
Some key issues:
o Trust ,multi-tenancy,encryption,compliance.
Cloud Security is a tractable problem.
o There are both
ADVANTAGES
CHALLENGES
Security Advantage:
Shifting public data to a external clod reduces the exposure
of the internal sensitive data.
Cloud homogeneity makes security auditing/testing
simpler.
Clouds enable automated security management.
Redundancy/disaster recovery.
Some of the Security Challenges:
Trusting vendor’s security model.
Customer inability to respond to audit findings.
Obtaining support for investigations.
Proprietary implementations can’t be examined.
Loss of physical control.
Security Related Cloud services:
Cloud Provisioning Services.
Cloud Data Storage Services.
Cloud Processing Infrastructure.
Cloud Support Services.
Cloud Network and Premier Security.
Elastic Elements :Storage Processing.
Balancing Threat Exposure:
Private Clouds may have less threat exposure than
community clouds which have threat exposure than public
clouds.
Massive Public Clouds may be cost effective than large
community clouds which may be more effective than small
private clouds.
Putting it Together:
Most clouds will require very strong security controls.
All models of cloud may be used for differing tradeoffs
between threat exposure bad efficiency.
There is no one “cloud “.there are many models and
architectures.
Federated Risk Management of Cloud Systems.
Working Process of Fed RAMP:
Fed RAMP is the result of close collaboration with security
and cloud experts from the federal council and its working
as well as private industry.
Fed ramp will authorize cloud systems in a four step
process:
o INITIATING:
o ASSESSING:
o AUTHORIZING:
o LEVERAGING:
INITIATING: The Fed RAMP assessment process is initiated
by agencies or Cloud Service Provider (CSPs) beginning a
security authorization using the Fed RAMP requirements.
ASSESSING: CSPs must implement the Fed RAMP security
requirements on their environment and hire a Fed RAMP
approved third party assessment organization (3PAO) to
perform an independent assessment to audit the cloud system
and provide a security assessment package for review.
AUTHORIZING: The Fed RAMP Joint Authorization
Board(JAB) will review the security assessment package based on
a prioritized approach and may grant a provisional
authorization.
LEVERAGING: Federal agencies can leverage CSP
authorization packages for review when granting an agency
Authority To Operate (ATO) saving time and money.
Agency x has a need for
a new cloud based IT
system
Fed RAMP Authorization process:
Agency x gets security
requirements for the new IT
system from Fed RAMP and
adds requirements if necessary
Agency x releases REP
for new IT System and
awards contract to
cloud service provider
(CSP)
Agency X submits request to
Fed RAMP office for CSP to be
Fed RAMP authorized to operate
CSP is put into Fed RAMP priority queue
(prioritization occurs based on factors
such as multi-agency use, number of
expected users,etc.)
Fed RAMP AUTHORIZATION PROCESS (CONT):
CSP and agency
sponsor begin
authorization
process with Fed
RAMP office.
CSP agency sponsor and
Fed RAMP office review
security requirements
and any alternative
implementation.
Fed RAMP office
coordinators with CSP
for creation of system
security plan(SSP).
CSP has independent
assessment of security
controls and developers
appropriate reports for
submission for Fed
RAMP office.
Fed RAMP office
reviews and
assembles the
final authorization
package for the
JAB
JAB reviews final
certification package
and authorization CSP
to operate
Fed RAMP office adds CSP to
authorized system inventory
to be reviewed and leveraged
by all Federal agencies
Fed RAMP provide continuous
monitoring of CSP
Benefits of Fed RAMP:
Saves significant cost, time and resources “Do once
use many times”
Improves real-time security visibility.
Provides a uniform approach to risk-based
management.
Enhance transparency between government and cloud
service providers (CSPs)
Improves the trustworthiness,reliability,consistency
and quality of the Federal security authorization
process.
Final Word:
Without a doubt, Cloud Computing is Truly a
Revolutionary Concept for many Business Organization.
Because of the …,
 Technology's Ease of Adoption,
Significantly Lower Maintenance Costs and
Greater Workflow Efficiency.
There is no doubt that Cloud Computing will gain wide
Spread Popularity Going Forward…
BY ,
N.HARIKRISHNAN
3RD YEAR ,B.TECH IT
SRIRAM ENGINNERING
COLLLEGE,PERMAPATTU,
THIRUVALLUR.

Weitere ähnliche Inhalte

Was ist angesagt?

Cloud computing writeup
Cloud computing writeupCloud computing writeup
Cloud computing writeupselvavijay1987
 
Cloud computing ppt
Cloud computing pptCloud computing ppt
Cloud computing pptAmex Ka
 
Cloud computing presentation
Cloud computing presentation  Cloud computing presentation
Cloud computing presentation hemanth S R
 
Introduction of Cloud computing
Introduction of Cloud computingIntroduction of Cloud computing
Introduction of Cloud computingRkrishna Mishra
 
Cloud computing
Cloud computingCloud computing
Cloud computingkanchu17
 
Research in Cloud Computing
Research in Cloud ComputingResearch in Cloud Computing
Research in Cloud ComputingRajshri Mohan
 
Cloud Computing for college presenation project.
Cloud Computing for college presenation project.Cloud Computing for college presenation project.
Cloud Computing for college presenation project.Mahesh Tibrewal
 
INTRODUCTION TO CLOUD COMPUTING
INTRODUCTION TO CLOUD COMPUTINGINTRODUCTION TO CLOUD COMPUTING
INTRODUCTION TO CLOUD COMPUTINGTanmoy Barman
 
Cloud computing by Bharat Bodage
Cloud computing by Bharat BodageCloud computing by Bharat Bodage
Cloud computing by Bharat BodageBharat Bodage
 
Introduction to Cloud Computing
Introduction to Cloud ComputingIntroduction to Cloud Computing
Introduction to Cloud ComputingAnimesh Chaturvedi
 
A brief history of cloud computing
A brief history of cloud computingA brief history of cloud computing
A brief history of cloud computingOneserve
 
Cloud computing presentation
Cloud computing presentationCloud computing presentation
Cloud computing presentationPriyanka Sharma
 

Was ist angesagt? (20)

Cloud computing
Cloud computingCloud computing
Cloud computing
 
Cloud computing
Cloud computingCloud computing
Cloud computing
 
Cloud computing writeup
Cloud computing writeupCloud computing writeup
Cloud computing writeup
 
Cloud computing ppt
Cloud computing pptCloud computing ppt
Cloud computing ppt
 
Cloud Computing
Cloud ComputingCloud Computing
Cloud Computing
 
Cloud computing
Cloud computingCloud computing
Cloud computing
 
Cloud computing
Cloud computingCloud computing
Cloud computing
 
Cloud computing
Cloud computingCloud computing
Cloud computing
 
Cloud computing presentation
Cloud computing presentation  Cloud computing presentation
Cloud computing presentation
 
Introduction of Cloud computing
Introduction of Cloud computingIntroduction of Cloud computing
Introduction of Cloud computing
 
Cloud Computing
Cloud ComputingCloud Computing
Cloud Computing
 
Cloud computing
Cloud computingCloud computing
Cloud computing
 
Research in Cloud Computing
Research in Cloud ComputingResearch in Cloud Computing
Research in Cloud Computing
 
Cloud Computing
Cloud ComputingCloud Computing
Cloud Computing
 
Cloud Computing for college presenation project.
Cloud Computing for college presenation project.Cloud Computing for college presenation project.
Cloud Computing for college presenation project.
 
INTRODUCTION TO CLOUD COMPUTING
INTRODUCTION TO CLOUD COMPUTINGINTRODUCTION TO CLOUD COMPUTING
INTRODUCTION TO CLOUD COMPUTING
 
Cloud computing by Bharat Bodage
Cloud computing by Bharat BodageCloud computing by Bharat Bodage
Cloud computing by Bharat Bodage
 
Introduction to Cloud Computing
Introduction to Cloud ComputingIntroduction to Cloud Computing
Introduction to Cloud Computing
 
A brief history of cloud computing
A brief history of cloud computingA brief history of cloud computing
A brief history of cloud computing
 
Cloud computing presentation
Cloud computing presentationCloud computing presentation
Cloud computing presentation
 

Ähnlich wie Cloud computing

Cloud Computing Networks
Cloud Computing NetworksCloud Computing Networks
Cloud Computing Networksjayapal385
 
A Breif On Cloud computing
A Breif On Cloud computingA Breif On Cloud computing
A Breif On Cloud computingRaja Raman
 
Cloud Use Cases And Standards
Cloud Use Cases And StandardsCloud Use Cases And Standards
Cloud Use Cases And StandardsGovCloud Network
 
cloudintro-lec01.ppt
cloudintro-lec01.pptcloudintro-lec01.ppt
cloudintro-lec01.pptMunmunSaha7
 
cloudintro-lec01.ppt
cloudintro-lec01.pptcloudintro-lec01.ppt
cloudintro-lec01.pptahmedraed19
 
Adaptive Cloud Security: Game-Changing Cloud Security and Compliance Automati...
Adaptive Cloud Security: Game-Changing Cloud Security and Compliance Automati...Adaptive Cloud Security: Game-Changing Cloud Security and Compliance Automati...
Adaptive Cloud Security: Game-Changing Cloud Security and Compliance Automati...Amazon Web Services
 
Cloud computing
Cloud computingCloud computing
Cloud computingmikerrr
 
cloudintroduction.ppt
cloudintroduction.pptcloudintroduction.ppt
cloudintroduction.pptAhmedRebai8
 
Ct Cloud Computing.V1.0
Ct Cloud Computing.V1.0Ct Cloud Computing.V1.0
Ct Cloud Computing.V1.0Jimmy Chu
 
lect15_cloud.ppt
lect15_cloud.pptlect15_cloud.ppt
lect15_cloud.pptAjit Mali
 
IRJET- Cloud Computing: Security Issues Challenges and Solution
IRJET-  	  Cloud Computing: Security Issues Challenges and SolutionIRJET-  	  Cloud Computing: Security Issues Challenges and Solution
IRJET- Cloud Computing: Security Issues Challenges and SolutionIRJET Journal
 

Ähnlich wie Cloud computing (20)

ERP IN CLOUD
ERP IN CLOUDERP IN CLOUD
ERP IN CLOUD
 
Cloud Computing Networks
Cloud Computing NetworksCloud Computing Networks
Cloud Computing Networks
 
Cloud Computing
Cloud ComputingCloud Computing
Cloud Computing
 
A Breif On Cloud computing
A Breif On Cloud computingA Breif On Cloud computing
A Breif On Cloud computing
 
Cloud Use Cases And Standards
Cloud Use Cases And StandardsCloud Use Cases And Standards
Cloud Use Cases And Standards
 
cloudintro-lec01.ppt
cloudintro-lec01.pptcloudintro-lec01.ppt
cloudintro-lec01.ppt
 
cloudintro-lec01.ppt
cloudintro-lec01.pptcloudintro-lec01.ppt
cloudintro-lec01.ppt
 
cloudintro-lec01.ppt
cloudintro-lec01.pptcloudintro-lec01.ppt
cloudintro-lec01.ppt
 
cloudintro-lec01.ppt
cloudintro-lec01.pptcloudintro-lec01.ppt
cloudintro-lec01.ppt
 
cloudintro-lec01.ppt
cloudintro-lec01.pptcloudintro-lec01.ppt
cloudintro-lec01.ppt
 
Adaptive Cloud Security: Game-Changing Cloud Security and Compliance Automati...
Adaptive Cloud Security: Game-Changing Cloud Security and Compliance Automati...Adaptive Cloud Security: Game-Changing Cloud Security and Compliance Automati...
Adaptive Cloud Security: Game-Changing Cloud Security and Compliance Automati...
 
Cloud computing
Cloud computingCloud computing
Cloud computing
 
Cloudcomputing
CloudcomputingCloudcomputing
Cloudcomputing
 
cloudintroduction.ppt
cloudintroduction.pptcloudintroduction.ppt
cloudintroduction.ppt
 
Dssc Intro
Dssc IntroDssc Intro
Dssc Intro
 
Cloud computing
Cloud computingCloud computing
Cloud computing
 
Ct Cloud Computing.V1.0
Ct Cloud Computing.V1.0Ct Cloud Computing.V1.0
Ct Cloud Computing.V1.0
 
lect15_cloud.ppt
lect15_cloud.pptlect15_cloud.ppt
lect15_cloud.ppt
 
lect15_cloud.ppt
lect15_cloud.pptlect15_cloud.ppt
lect15_cloud.ppt
 
IRJET- Cloud Computing: Security Issues Challenges and Solution
IRJET-  	  Cloud Computing: Security Issues Challenges and SolutionIRJET-  	  Cloud Computing: Security Issues Challenges and Solution
IRJET- Cloud Computing: Security Issues Challenges and Solution
 

Mehr von hari krishnan.n

SEO-Search Engine Optimisation
SEO-Search Engine OptimisationSEO-Search Engine Optimisation
SEO-Search Engine Optimisationhari krishnan.n
 
Axis Bank Social Media Marketing
Axis Bank Social Media MarketingAxis Bank Social Media Marketing
Axis Bank Social Media Marketinghari krishnan.n
 
Axis bank strengthens brand with progressive campaign on linkedIn
Axis bank strengthens brand with progressive campaign on linkedInAxis bank strengthens brand with progressive campaign on linkedIn
Axis bank strengthens brand with progressive campaign on linkedInhari krishnan.n
 
Drawbacks of our Education system
Drawbacks of our Education systemDrawbacks of our Education system
Drawbacks of our Education systemhari krishnan.n
 
Cross-cultural communication
Cross-cultural communicationCross-cultural communication
Cross-cultural communicationhari krishnan.n
 
Chennai express- Social Media Marketing Strategy
Chennai express- Social Media Marketing StrategyChennai express- Social Media Marketing Strategy
Chennai express- Social Media Marketing Strategyhari krishnan.n
 
political behavior-organisational politics,discretionary behavior,defensive b...
political behavior-organisational politics,discretionary behavior,defensive b...political behavior-organisational politics,discretionary behavior,defensive b...
political behavior-organisational politics,discretionary behavior,defensive b...hari krishnan.n
 
Picture arithmetic cryptosystem module explanation
Picture arithmetic cryptosystem module explanationPicture arithmetic cryptosystem module explanation
Picture arithmetic cryptosystem module explanationhari krishnan.n
 
Picture arithmetic cryptosystem using symmetric key enhanced algorithm with l...
Picture arithmetic cryptosystem using symmetric key enhanced algorithm with l...Picture arithmetic cryptosystem using symmetric key enhanced algorithm with l...
Picture arithmetic cryptosystem using symmetric key enhanced algorithm with l...hari krishnan.n
 
I-Mode in mobile communication.
I-Mode in mobile communication.I-Mode in mobile communication.
I-Mode in mobile communication.hari krishnan.n
 
Issues with personality tests
Issues with personality testsIssues with personality tests
Issues with personality testshari krishnan.n
 
Issues with personality tests
Issues with personality testsIssues with personality tests
Issues with personality testshari krishnan.n
 
Management productivity tools1
Management productivity tools1Management productivity tools1
Management productivity tools1hari krishnan.n
 
Socio economic classification
Socio economic classificationSocio economic classification
Socio economic classificationhari krishnan.n
 

Mehr von hari krishnan.n (17)

SEO-Search Engine Optimisation
SEO-Search Engine OptimisationSEO-Search Engine Optimisation
SEO-Search Engine Optimisation
 
Axis Bank Social Media Marketing
Axis Bank Social Media MarketingAxis Bank Social Media Marketing
Axis Bank Social Media Marketing
 
Axis bank strengthens brand with progressive campaign on linkedIn
Axis bank strengthens brand with progressive campaign on linkedInAxis bank strengthens brand with progressive campaign on linkedIn
Axis bank strengthens brand with progressive campaign on linkedIn
 
Make science in india
Make science in indiaMake science in india
Make science in india
 
Derivative Market
Derivative MarketDerivative Market
Derivative Market
 
Drawbacks of our Education system
Drawbacks of our Education systemDrawbacks of our Education system
Drawbacks of our Education system
 
Cross-cultural communication
Cross-cultural communicationCross-cultural communication
Cross-cultural communication
 
Chennai express- Social Media Marketing Strategy
Chennai express- Social Media Marketing StrategyChennai express- Social Media Marketing Strategy
Chennai express- Social Media Marketing Strategy
 
political behavior-organisational politics,discretionary behavior,defensive b...
political behavior-organisational politics,discretionary behavior,defensive b...political behavior-organisational politics,discretionary behavior,defensive b...
political behavior-organisational politics,discretionary behavior,defensive b...
 
Picture arithmetic cryptosystem module explanation
Picture arithmetic cryptosystem module explanationPicture arithmetic cryptosystem module explanation
Picture arithmetic cryptosystem module explanation
 
Picture arithmetic cryptosystem using symmetric key enhanced algorithm with l...
Picture arithmetic cryptosystem using symmetric key enhanced algorithm with l...Picture arithmetic cryptosystem using symmetric key enhanced algorithm with l...
Picture arithmetic cryptosystem using symmetric key enhanced algorithm with l...
 
I-Mode in mobile communication.
I-Mode in mobile communication.I-Mode in mobile communication.
I-Mode in mobile communication.
 
Issues with personality tests
Issues with personality testsIssues with personality tests
Issues with personality tests
 
Issues with personality tests
Issues with personality testsIssues with personality tests
Issues with personality tests
 
Management productivity tools1
Management productivity tools1Management productivity tools1
Management productivity tools1
 
Socio economic classification
Socio economic classificationSocio economic classification
Socio economic classification
 
i-mode ppt and syncml
i-mode ppt and syncmli-mode ppt and syncml
i-mode ppt and syncml
 

Kürzlich hochgeladen

The Role of Taxonomy and Ontology in Semantic Layers - Heather Hedden.pdf
The Role of Taxonomy and Ontology in Semantic Layers - Heather Hedden.pdfThe Role of Taxonomy and Ontology in Semantic Layers - Heather Hedden.pdf
The Role of Taxonomy and Ontology in Semantic Layers - Heather Hedden.pdfEnterprise Knowledge
 
Tech Trends Report 2024 Future Today Institute.pdf
Tech Trends Report 2024 Future Today Institute.pdfTech Trends Report 2024 Future Today Institute.pdf
Tech Trends Report 2024 Future Today Institute.pdfhans926745
 
Handwritten Text Recognition for manuscripts and early printed texts
Handwritten Text Recognition for manuscripts and early printed textsHandwritten Text Recognition for manuscripts and early printed texts
Handwritten Text Recognition for manuscripts and early printed textsMaria Levchenko
 
Workshop - Best of Both Worlds_ Combine KG and Vector search for enhanced R...
Workshop - Best of Both Worlds_ Combine  KG and Vector search for  enhanced R...Workshop - Best of Both Worlds_ Combine  KG and Vector search for  enhanced R...
Workshop - Best of Both Worlds_ Combine KG and Vector search for enhanced R...Neo4j
 
Driving Behavioral Change for Information Management through Data-Driven Gree...
Driving Behavioral Change for Information Management through Data-Driven Gree...Driving Behavioral Change for Information Management through Data-Driven Gree...
Driving Behavioral Change for Information Management through Data-Driven Gree...Enterprise Knowledge
 
Automating Google Workspace (GWS) & more with Apps Script
Automating Google Workspace (GWS) & more with Apps ScriptAutomating Google Workspace (GWS) & more with Apps Script
Automating Google Workspace (GWS) & more with Apps Scriptwesley chun
 
[2024]Digital Global Overview Report 2024 Meltwater.pdf
[2024]Digital Global Overview Report 2024 Meltwater.pdf[2024]Digital Global Overview Report 2024 Meltwater.pdf
[2024]Digital Global Overview Report 2024 Meltwater.pdfhans926745
 
CNv6 Instructor Chapter 6 Quality of Service
CNv6 Instructor Chapter 6 Quality of ServiceCNv6 Instructor Chapter 6 Quality of Service
CNv6 Instructor Chapter 6 Quality of Servicegiselly40
 
08448380779 Call Girls In Greater Kailash - I Women Seeking Men
08448380779 Call Girls In Greater Kailash - I Women Seeking Men08448380779 Call Girls In Greater Kailash - I Women Seeking Men
08448380779 Call Girls In Greater Kailash - I Women Seeking MenDelhi Call girls
 
Understanding Discord NSFW Servers A Guide for Responsible Users.pdf
Understanding Discord NSFW Servers A Guide for Responsible Users.pdfUnderstanding Discord NSFW Servers A Guide for Responsible Users.pdf
Understanding Discord NSFW Servers A Guide for Responsible Users.pdfUK Journal
 
04-2024-HHUG-Sales-and-Marketing-Alignment.pptx
04-2024-HHUG-Sales-and-Marketing-Alignment.pptx04-2024-HHUG-Sales-and-Marketing-Alignment.pptx
04-2024-HHUG-Sales-and-Marketing-Alignment.pptxHampshireHUG
 
Strategies for Landing an Oracle DBA Job as a Fresher
Strategies for Landing an Oracle DBA Job as a FresherStrategies for Landing an Oracle DBA Job as a Fresher
Strategies for Landing an Oracle DBA Job as a FresherRemote DBA Services
 
🐬 The future of MySQL is Postgres 🐘
🐬  The future of MySQL is Postgres   🐘🐬  The future of MySQL is Postgres   🐘
🐬 The future of MySQL is Postgres 🐘RTylerCroy
 
The 7 Things I Know About Cyber Security After 25 Years | April 2024
The 7 Things I Know About Cyber Security After 25 Years | April 2024The 7 Things I Know About Cyber Security After 25 Years | April 2024
The 7 Things I Know About Cyber Security After 25 Years | April 2024Rafal Los
 
2024: Domino Containers - The Next Step. News from the Domino Container commu...
2024: Domino Containers - The Next Step. News from the Domino Container commu...2024: Domino Containers - The Next Step. News from the Domino Container commu...
2024: Domino Containers - The Next Step. News from the Domino Container commu...Martijn de Jong
 
GenAI Risks & Security Meetup 01052024.pdf
GenAI Risks & Security Meetup 01052024.pdfGenAI Risks & Security Meetup 01052024.pdf
GenAI Risks & Security Meetup 01052024.pdflior mazor
 
How to Troubleshoot Apps for the Modern Connected Worker
How to Troubleshoot Apps for the Modern Connected WorkerHow to Troubleshoot Apps for the Modern Connected Worker
How to Troubleshoot Apps for the Modern Connected WorkerThousandEyes
 
Partners Life - Insurer Innovation Award 2024
Partners Life - Insurer Innovation Award 2024Partners Life - Insurer Innovation Award 2024
Partners Life - Insurer Innovation Award 2024The Digital Insurer
 
Histor y of HAM Radio presentation slide
Histor y of HAM Radio presentation slideHistor y of HAM Radio presentation slide
Histor y of HAM Radio presentation slidevu2urc
 
Boost Fertility New Invention Ups Success Rates.pdf
Boost Fertility New Invention Ups Success Rates.pdfBoost Fertility New Invention Ups Success Rates.pdf
Boost Fertility New Invention Ups Success Rates.pdfsudhanshuwaghmare1
 

Kürzlich hochgeladen (20)

The Role of Taxonomy and Ontology in Semantic Layers - Heather Hedden.pdf
The Role of Taxonomy and Ontology in Semantic Layers - Heather Hedden.pdfThe Role of Taxonomy and Ontology in Semantic Layers - Heather Hedden.pdf
The Role of Taxonomy and Ontology in Semantic Layers - Heather Hedden.pdf
 
Tech Trends Report 2024 Future Today Institute.pdf
Tech Trends Report 2024 Future Today Institute.pdfTech Trends Report 2024 Future Today Institute.pdf
Tech Trends Report 2024 Future Today Institute.pdf
 
Handwritten Text Recognition for manuscripts and early printed texts
Handwritten Text Recognition for manuscripts and early printed textsHandwritten Text Recognition for manuscripts and early printed texts
Handwritten Text Recognition for manuscripts and early printed texts
 
Workshop - Best of Both Worlds_ Combine KG and Vector search for enhanced R...
Workshop - Best of Both Worlds_ Combine  KG and Vector search for  enhanced R...Workshop - Best of Both Worlds_ Combine  KG and Vector search for  enhanced R...
Workshop - Best of Both Worlds_ Combine KG and Vector search for enhanced R...
 
Driving Behavioral Change for Information Management through Data-Driven Gree...
Driving Behavioral Change for Information Management through Data-Driven Gree...Driving Behavioral Change for Information Management through Data-Driven Gree...
Driving Behavioral Change for Information Management through Data-Driven Gree...
 
Automating Google Workspace (GWS) & more with Apps Script
Automating Google Workspace (GWS) & more with Apps ScriptAutomating Google Workspace (GWS) & more with Apps Script
Automating Google Workspace (GWS) & more with Apps Script
 
[2024]Digital Global Overview Report 2024 Meltwater.pdf
[2024]Digital Global Overview Report 2024 Meltwater.pdf[2024]Digital Global Overview Report 2024 Meltwater.pdf
[2024]Digital Global Overview Report 2024 Meltwater.pdf
 
CNv6 Instructor Chapter 6 Quality of Service
CNv6 Instructor Chapter 6 Quality of ServiceCNv6 Instructor Chapter 6 Quality of Service
CNv6 Instructor Chapter 6 Quality of Service
 
08448380779 Call Girls In Greater Kailash - I Women Seeking Men
08448380779 Call Girls In Greater Kailash - I Women Seeking Men08448380779 Call Girls In Greater Kailash - I Women Seeking Men
08448380779 Call Girls In Greater Kailash - I Women Seeking Men
 
Understanding Discord NSFW Servers A Guide for Responsible Users.pdf
Understanding Discord NSFW Servers A Guide for Responsible Users.pdfUnderstanding Discord NSFW Servers A Guide for Responsible Users.pdf
Understanding Discord NSFW Servers A Guide for Responsible Users.pdf
 
04-2024-HHUG-Sales-and-Marketing-Alignment.pptx
04-2024-HHUG-Sales-and-Marketing-Alignment.pptx04-2024-HHUG-Sales-and-Marketing-Alignment.pptx
04-2024-HHUG-Sales-and-Marketing-Alignment.pptx
 
Strategies for Landing an Oracle DBA Job as a Fresher
Strategies for Landing an Oracle DBA Job as a FresherStrategies for Landing an Oracle DBA Job as a Fresher
Strategies for Landing an Oracle DBA Job as a Fresher
 
🐬 The future of MySQL is Postgres 🐘
🐬  The future of MySQL is Postgres   🐘🐬  The future of MySQL is Postgres   🐘
🐬 The future of MySQL is Postgres 🐘
 
The 7 Things I Know About Cyber Security After 25 Years | April 2024
The 7 Things I Know About Cyber Security After 25 Years | April 2024The 7 Things I Know About Cyber Security After 25 Years | April 2024
The 7 Things I Know About Cyber Security After 25 Years | April 2024
 
2024: Domino Containers - The Next Step. News from the Domino Container commu...
2024: Domino Containers - The Next Step. News from the Domino Container commu...2024: Domino Containers - The Next Step. News from the Domino Container commu...
2024: Domino Containers - The Next Step. News from the Domino Container commu...
 
GenAI Risks & Security Meetup 01052024.pdf
GenAI Risks & Security Meetup 01052024.pdfGenAI Risks & Security Meetup 01052024.pdf
GenAI Risks & Security Meetup 01052024.pdf
 
How to Troubleshoot Apps for the Modern Connected Worker
How to Troubleshoot Apps for the Modern Connected WorkerHow to Troubleshoot Apps for the Modern Connected Worker
How to Troubleshoot Apps for the Modern Connected Worker
 
Partners Life - Insurer Innovation Award 2024
Partners Life - Insurer Innovation Award 2024Partners Life - Insurer Innovation Award 2024
Partners Life - Insurer Innovation Award 2024
 
Histor y of HAM Radio presentation slide
Histor y of HAM Radio presentation slideHistor y of HAM Radio presentation slide
Histor y of HAM Radio presentation slide
 
Boost Fertility New Invention Ups Success Rates.pdf
Boost Fertility New Invention Ups Success Rates.pdfBoost Fertility New Invention Ups Success Rates.pdf
Boost Fertility New Invention Ups Success Rates.pdf
 

Cloud computing

  • 2. Outline:  What is Cloud Computing?  How Cloud Computing Works?  Types Of Clouds?  Types of Cloud Services?  Cloud Computing Security:  Cloud Security Analysis:  Balancing the Threat Exposure:  Working Of Fed RAMP:  Fed RAMP Authorization Process:  Benefits Of Fed RAMP:  Final word:
  • 3. What is cloud computing? Cloud Computing is a technology that uses the internet and central remote servers to maintain data and applications. Simple applications of Cloud Computing is yahoo email, Gmail or hotmail etc.
  • 4. How cloud computing works? Cloud computing consists of two layers, namely BACK END FRONT END
  • 5. Two layers: Front end - Is the part seen by the client,i.e. the computer user. this includes the client’s network (or computer) and the applications used to access the cloud via user interface such as a web browser. Back end – Is the ‘cloud’ itself, comprising various computers, servers and data storage devices..
  • 7. Public Clouds Computing environment are open for used to anyone who wants to sign up and use them. (Eg:Amazon Web services,google Apennine). Private Cloud is a Cloud Computing infrastructure created by an organization for its own internal use rather than using someone else’s infrastructure. (Eg:Amazon EC2) Hybrid Cloud is a composition of at least one private cloud and at least one public cloud. (Eg.IBM)
  • 8. Types of cloud services: SAAS END CUSTOMERS PAAS DEVELOPERS IAAS SYS ADMINS
  • 9. What is IAAS? Infrastructure as a service is provisional in which an organization outsources the equipment used to support operations, including storage,hardware,servers and networking components Characteristics and components of IAAS include: o utility computing service and billing model. o Automation of administrative tasks. o Dynamic scaling. o Desktop virualization. o Policy-based services. o Internet connectivity.
  • 10. What is PAAS? Platform as a service (PAAS) is the deliverance of a computer platform and resolution stack as a service. It regularly goes extra with the inclusion of a software progress platform, that is designed for cloud computing at the top of the cloud stack. Characteristics of PAAS: o PAAS includes workflow amenities for application propositions. o PAAS is app progress, testing use and hosting as well as proposition services such as group partnership. o PAAS is web service amalgamation,app versioning,security,storage,persistence,scalability,state administration and app instrumentation.
  • 11. What is SAAS? Applications or software is delivered as a service to the customer who can access the program from any online device who can access the program from any online device ,eliminating the need to install and run the applications on the customer’s own computers and simplifying maintenance and support. Characteristics of SAAS: o Multi tenant Infrastructure. o Easy Customization. o Better Access.
  • 13. Cloud Security Analysis: Some key issues: o Trust ,multi-tenancy,encryption,compliance. Cloud Security is a tractable problem. o There are both ADVANTAGES CHALLENGES
  • 14. Security Advantage: Shifting public data to a external clod reduces the exposure of the internal sensitive data. Cloud homogeneity makes security auditing/testing simpler. Clouds enable automated security management. Redundancy/disaster recovery.
  • 15. Some of the Security Challenges: Trusting vendor’s security model. Customer inability to respond to audit findings. Obtaining support for investigations. Proprietary implementations can’t be examined. Loss of physical control.
  • 16. Security Related Cloud services: Cloud Provisioning Services. Cloud Data Storage Services. Cloud Processing Infrastructure. Cloud Support Services. Cloud Network and Premier Security. Elastic Elements :Storage Processing.
  • 17. Balancing Threat Exposure: Private Clouds may have less threat exposure than community clouds which have threat exposure than public clouds. Massive Public Clouds may be cost effective than large community clouds which may be more effective than small private clouds.
  • 18. Putting it Together: Most clouds will require very strong security controls. All models of cloud may be used for differing tradeoffs between threat exposure bad efficiency. There is no one “cloud “.there are many models and architectures. Federated Risk Management of Cloud Systems.
  • 19. Working Process of Fed RAMP: Fed RAMP is the result of close collaboration with security and cloud experts from the federal council and its working as well as private industry. Fed ramp will authorize cloud systems in a four step process: o INITIATING: o ASSESSING: o AUTHORIZING: o LEVERAGING:
  • 20. INITIATING: The Fed RAMP assessment process is initiated by agencies or Cloud Service Provider (CSPs) beginning a security authorization using the Fed RAMP requirements. ASSESSING: CSPs must implement the Fed RAMP security requirements on their environment and hire a Fed RAMP approved third party assessment organization (3PAO) to perform an independent assessment to audit the cloud system and provide a security assessment package for review. AUTHORIZING: The Fed RAMP Joint Authorization Board(JAB) will review the security assessment package based on a prioritized approach and may grant a provisional authorization. LEVERAGING: Federal agencies can leverage CSP authorization packages for review when granting an agency Authority To Operate (ATO) saving time and money.
  • 21. Agency x has a need for a new cloud based IT system Fed RAMP Authorization process: Agency x gets security requirements for the new IT system from Fed RAMP and adds requirements if necessary Agency x releases REP for new IT System and awards contract to cloud service provider (CSP) Agency X submits request to Fed RAMP office for CSP to be Fed RAMP authorized to operate CSP is put into Fed RAMP priority queue (prioritization occurs based on factors such as multi-agency use, number of expected users,etc.)
  • 22. Fed RAMP AUTHORIZATION PROCESS (CONT): CSP and agency sponsor begin authorization process with Fed RAMP office. CSP agency sponsor and Fed RAMP office review security requirements and any alternative implementation. Fed RAMP office coordinators with CSP for creation of system security plan(SSP). CSP has independent assessment of security controls and developers appropriate reports for submission for Fed RAMP office. Fed RAMP office reviews and assembles the final authorization package for the JAB JAB reviews final certification package and authorization CSP to operate Fed RAMP office adds CSP to authorized system inventory to be reviewed and leveraged by all Federal agencies Fed RAMP provide continuous monitoring of CSP
  • 23. Benefits of Fed RAMP: Saves significant cost, time and resources “Do once use many times” Improves real-time security visibility. Provides a uniform approach to risk-based management. Enhance transparency between government and cloud service providers (CSPs) Improves the trustworthiness,reliability,consistency and quality of the Federal security authorization process.
  • 24. Final Word: Without a doubt, Cloud Computing is Truly a Revolutionary Concept for many Business Organization. Because of the …,  Technology's Ease of Adoption, Significantly Lower Maintenance Costs and Greater Workflow Efficiency. There is no doubt that Cloud Computing will gain wide Spread Popularity Going Forward…
  • 25.
  • 26. BY , N.HARIKRISHNAN 3RD YEAR ,B.TECH IT SRIRAM ENGINNERING COLLLEGE,PERMAPATTU, THIRUVALLUR.