Lec04Updated

.ppt
School
Multimedia University, Bukit Beruang**We aren't endorsed by this school
Course
IT 1221
Subject
Computer Science
Date
Dec 16, 2024
Pages
18
Uploaded by ProfessorFlowerDog53
Securing the CloudCloud Computing – TCC6313Lecture 04
Background image
Cloud Computing – TCC63132
Background image
TopicsIssues and ConcernsMethodologies and PracticesCloud Computing – TCC63133
Background image
Issues and ConcernsCloud Computing – TCC6313
Background image
IntroductionThe significant benefits of scalability and elasticity in cloud comes at the price of loss of control by the data owners, and the consequent security threats.The security and privacy issues and challenges involved can vary in different deployment and service models.Highlight security issues that need to be considered when using the cloud to offer or enjoy services in the three fundamental cloud service models: IaaS, PaaS and SaaS.Discuss security aspects affected by cloud paradigm in relations to the data security lifecycle (refer textbook Figure 17.1)5Cloud Computing – TCC6313
Background image
Confidentiality, Integrity, and Availability in the CloudThe classical CIA (confidentiality, integrity, and availability) paradigm to classify security problems:Confidentiality: Guaranteeing proper protection of confidential or sensitive information stored or processed in the cloud.Integrity: Guaranteeing the authenticity of the parties (users and providers) interacting in the cloud, the data stored at external providers, and the responses returned from queries and computations.Availability: Providing the ability to define and verify that providers satisfy requirements expressed in service-level agreements (SLAs) established between data owners/users and providers.6Cloud Computing – TCC6313
Background image
Confidentiality, Integrity, and Availability in the CloudCloud Computing – TCC6313
Background image
Confidentiality, Integrity, and Availability in the CloudCloud Computing – TCC6313
Background image
Cloud Computing – TCC6313
Background image
Methodologies and PracticesCloud Computing – TCC6313
Background image
Cloud Security Management [Refer textbook 18.1]1Cloud Computing – TCC6313
Background image
Cloud Security Mechanisms and Techniques[Refer textbook 18.2]2Cloud Computing – TCC6313
Background image
Cloud Security Audit and Assessment [Refer textbook 18.3]3Cloud Computing – TCC6313
Background image
Cloud Intrusion Detection and Incident Response [Refer textbook 18.4]4Cloud Computing – TCC6313
Background image
Cloud Business Continuity and Disaster Recovery Planning [Refer textbook 18.5]5Cloud Computing – TCC6313Cloud BC/DR planning ensures that businesses can continue operations and recover quickly after disruptions or disasters. Leverages the scalability, flexibility, and cost-efficiency of cloud infrastructure to provide robust backup and recovery solutions.
Background image
ConclusionThe chapter emphasizes the need for trustworthy cloud forensics, highlighting that most solutions, such as evidence acquisition and logging APIs, depend on cloud service providers (CSPs) and collaborative efforts from policymakers, organizations, and academia.Cloud computing introduces unique security challenges due to external provider interactions, growing threats, and differences in cloud, requiring custom-made solutions beyond traditional IT security measures.By adopting multilayered defense mechanisms, best practices, and mature processes, organizations can address these challenges and transition securely to the cloud while minimizing risks.Cloud Computing – TCC6313
Background image
Case Study (20 minutes)Cloud Computing – TCC6313
Background image
Thank youNext Week: Chapter 5 Securing the CloudCloud Computing – TCC6313
Background image