0% found this document useful (0 votes)
5 views

COP Module 08 - Securing the Cloud

How to secure and protect data stored on cloud

Uploaded by

orishaba isaac
Copyright
© © All Rights Reserved
Available Formats
Download as PPTX, PDF, TXT or read online on Scribd
0% found this document useful (0 votes)
5 views

COP Module 08 - Securing the Cloud

How to secure and protect data stored on cloud

Uploaded by

orishaba isaac
Copyright
© © All Rights Reserved
Available Formats
Download as PPTX, PDF, TXT or read online on Scribd
You are on page 1/ 22

Securing the Cloud

AFRALTI AFRALTI 1
Objectives
Describe Cloud Computing
How Cloud Works
Explain Cloud Architecture
Types of Clouds Computing Services
Advantages of Cloud
Cloud Threats

AFRALTI 2
What it is ?
The term cloud computing refers to the
practice of remotely storing data or
running applications on a network or
Internet servers. These servers are
controlled and managed by companies
providing the cloud service.
A framework that enables a business or
an individual to access shared IT
resources i.e. hardware, software, and
business applications from any location.
These resources are hosted at locations
known as the ‘cloud’ which facilitates
AFRALTI
access at ‘any-time’ and from ‘any-where’
3
Cloud Concept
Users rent a particular amount of
storage space on these servers which is
accessible from anywhere.
Users can also rent appropriate
resources from the service providers.
remote computing,
Not all companies can invest in the
cyber infrastructure needed for
processing large amounts of data, in
such a case such companies rent the
resources from the cloud providers.
AFRALTI 4
Traditional Data Center vs Cloud
Services

AFRALTI 5
Cloud - Advantages
Just like the utility systems e.g. electricity
and water, each person does not need to
build their own.
Can be less expensive compared to
buying software and hardware
Can be used from any computer or device
with an Internet connection
The device does not need as large of an
internal storage system
Compatible with most computers and
operating systems
AFRALTI
 6
Cloud Architectures
Cloud computing uses a shared pool of
computing resources (e.g., networks,
servers, storage, applications, and
services) to provide on-demand network
access.
An organization has a choice of building
their own cloud or using an already
established cloud as indicated below
Public
Private
Hybrid cloud
AFRALTI
 7
Public Cloud
This is the general storage and
hosting service that we as individual
consumers use. It is owned by a
service provider and shared by
several resource tenants. This cloud
typically operates remotely.
Cloud providers lease out the
resources to the public (several
organizations/individuals).

AFRALTI 8
Private Cloud
Private Cloud – This cloud is set up
and used for a single entity or
organization. It is that
organization's private storage,
hosting, and computing space.
A private cloud can be remote or
local and can be managed locally
or outsourced. Generally
companies with sensitive data go
for this option.
AFRALTI 9
Hybrid Cloud
Hybrid Cloud is a mixture of two or
more different clod architectures.
The participants clouds retain their
individuality but are connected
through a shared standard or
patented technology.
This enables data portability
between different kind of cloud
while retaining their individual
benefits.
AFRALTI Processing can be hosted in the 10
Community Cloud
A community cloud belong to a
group of organizations with similar
interests. The convergence of their
interests may be social or
commercial.
This cloud can also be called semi-
private or semi-public cloud. It can
be operated remotely or locally
depending upon the agreements
terms of the organizations sharing
AFRALTI
it. 11
Public Clouds - Advantages
Public clouds often cost less than
private clouds to initially set up,
and move IT spending from a
capital-expense-based to an
operating-expense-based model.
They can offer the fastest route to
adopting cloud technology, since
services can immediately be
accessed.
The shared resource pool for
AFRALTI public clouds is often larger than12
Private Clouds - Advantages
Access to a large resource pool that
offers new choices for running
workloads.
Not burdened by public network
bandwidth and availability issues
No potential security exposures that
can be associated with public clouds.
Readily auditable and can provide a
more secure environment with high
availability.
Provide a potentially smoother
AFRALTI migration path from a traditional IT 13
Hybrid Clouds - Advantages
An enterprise can decide which
services are offered through public
or private clouds and at what
service levels
Enterprises can meet strict
security and service level
agreements for critical services.

AFRALTI 14
Cloud computing Services

AFRALTI 15
Infrastructure-as-a-Service
(IaaS)
A service model that involves
outsourcing the basic
infrastructure used to support
operations--including storage,
hardware, servers, and
networking components.
The service provider owns the
infrastructure equipment and
is responsible for housing,
running, and maintaining it.
The customer typically pays
on a per-use basis.
AFRALTI
The customer uses their own 16
Platform-as-a-Service (PaaS)
A service model that involves
outsourcing the basic
infrastructure and platform
(Windows, Linux, Unix, Mac
OS)
PaaS facilitates deploying
applications without the cost
and complexity of buying and
managing the underlying
hardware and software where
the applications are hosted.
AFRALTI
The customer uses their own 17
Software-as-a-Service (SaaS)
Also referred to as
“software on demand,” this
service model involves
outsourcing the
infrastructure, platform,
and software/applications.
Typically, these services
are available to the
customer for a fee, pay-as-
you-go, or a no charge
AFRALTI
model. 18
Threats to Cloud Security
 Data Breach - A single cloud can hold sensitive
data like credit card details or personal
information.
 Data Loss - Data stored on the cloud which is
not backed up locally by consumers results in
permanent data loss.
 Account Hacking - Consumers access their
cloud accounts using usernames and passwords.
 Disgruntled Insider - A disgruntled employee
could decide to compromise the data on the
cloud to hurt company's reputation.
 Technology Vulnerabilities - Every technology
vulnerabilities which can be exploited by
AFRALTI hackers. 19
Cloud Threats Safeguards
 Data Backup - Create local backup or create a
backup cache in a different cloud.
 Update Backup Regularly - Create and
update backup regularly
 Strong password - User complex password or
even use two step authentication.
 Data Encryption - converts readable data into
coded form using a secret key.
 Have a Disciplined Online Behavior - Always
log out and keep "Remember Password" option
disabled.
 Avoid Keeping Sensitive Information on
Cloud - Do not upload credit card information,
AFRALTI passport details, and intimate pictures 20
Cloud Services Issues
 Data Ownership - There is always a
question of who owns data after uploading on
the cloud.
 Data Location - With data centers scattered
around the world, consumers should be wary
of the location of the servers that host their
files due to different privacy laws.
 Data Migration - When data is migrated
from one data center to another in a different
country for maintenance purposes, user are
exposed to a host of privacy issues
 Data Permanency - When users delete data
on the cloud there's no assurance that data
AFRALTI is permanently deleted due to the way data21
Summary
Describe Cloud Computing
How Cloud Works
Explain Cloud Architecture
Types of Clouds Computing
Services
Advantages of Cloud
Cloud Threats

AFRALTI 22

You might also like