This document provides a whirlwind tour of big data, security, and cloud computing. It begins by looking back at where technology has been, from mainframes to client-server models to virtualization. It then examines the present state of early decentralization and a focus on cost-cutting and flexibility. Looking ahead, it discusses the future of commodity-based computing and storage and the need to revise governance. The document emphasizes that security is not one-size-fits-all and should be tied to risk tolerance policies. It stresses the importance of standards, privacy, and continual adaptation to vulnerabilities. In the end, it summarizes that cloud, big data, and security require balancing tolerance to risk with strong governance and adaptability
12. 12
Cloud Computing In Review
Essential Characteristics
On-demand, Self-service
Broad network access
Resource pooling
Rapid elasticity
Measured service
13. 13
Cloud Computing—Part Deux
Deployment Models Service Models
Public Cloud Infrastructure
Private Cloud Platform
Community Cloud Software
Hybrid Cloud
14. 14
Big Data <3’s Cloud
Massive workloads,
meet
Cloud Computing
XOXOXOX
22. 22
Privacy
“...Privacy by Design -privacy by default, end-to-
end security, and strong accountability- by
enabling enterprises to automatically encrypt
(decrypt) data locally and on-the-fly when using
third-party cloud [based] service
applications, with no loss of functionality.
Maintaining control over encryption and
decryption processes is an excellent approach to
safeguarding personal data, regardless of where
the data resides.”
–Ann Cavoukian, Ph.D. Information and Privacy
Commissioner of Ontario, Canada
http://www.perspecsys.com/
24. 24
Example of Personal Security
“SolaS uses Lockheed Martin’s
intelligence-driven defense approach
to provide proactive and continuous
cloud security situational awareness,
and real-time compliance and
configuration management”
http://www.marketwatch.com/story/lockheed-martin-delivers-solastm-hybrid-cloud-solution-2012-09-27