Cloud Computing: How Secure is it?



cloud computing how secure is it this PowerPoint presentation will explain exactly what the term cloud computing really means and where it came from it will also outline the different types of cloud computing benefits drawbacks and actions being taken to ensure user security and privacy when using the cloud we will begin with an introduction to cloud computing as well as a diagram and its structure followed by the different types of cloud computing the practice and history of cloud computing benefits drawbacks privacy issues security issues hacking into the cloud and what the government is doing to protect users of the cloud cloud computing is essentially an extreme form of outsourcing in the delivery of hosted services via the Internet the cloud acts as a virtual server that users can access via the internet on an as-needed basis cloud computing includes any subscription based or paper use service that extends IT capabilities allowing users to access their stored information remotely this is a diagram of the cloud the name cloud computing comes from the use of a cloud shaped symbol that represents the complex structure that is the cloud the cloud itself contains the infrastructure platform and applications that links remote services with users data software and computation allowing the users of computing resources to be delivered over a network like the internet the cloud providers manage the infrastructure and platforms on which the applications run the infrastructure is typically off-site and provided by a third party in the form of computers or more often as virtual machines the computing platform includes the operating system programming language execution environment database and web server which allow developers to run software solutions on a cloud platform without the cost and complexity of buying and managing the underlying software end-users of the cloud can then access these applications through a web browser or mobile app on devices such as personal laptops desktops tablets and smartphones there are many different types of cloud computing software as the service delivers a single application through the web browser to thousands of customers using a multi-tenant architecture examples include salesforce.com and Google Apps infrastructure as a service has the capability provided to the consumer for processing storage networks and other resources where they have the ability to deploy and run arbitrary software examples include Amazon cloud formation Rackspace Tara mark and Windows Azure virtual machines platform as a service related to SaaS this variation delivers development environments where you build your own application that runs on the providers infrastructure and are delivered to users via the Internet examples include force comm cog head Google App Engine and Yahoo pipes utility computing offers storage and virtual servers that IT can access on demand mainly used for supplemental non mission-critical needs examples include amazon.com Sun and IBM web service in the cloud is also related related to SaaS this service offers api's enabling developers to exploit functionality over the Internet rather than delivering full-blown applications examples include strike iron Zig Knight Google Maps ADP payroll processing the US Postal Service a Bloomberg managed service providers MSP is one of the oldest forms of cloud computing this is a managed service application exposed to IT rather than end-users such as virus scanning service for email examples include manage security platforms delivered by secure works IBM and Verizon as well as anti-spam services such as Postini service commerce platforms is a hybrid of SAS and MSP this service offers an interactive hub for trading environments such as expense management systems that allow users to order travel or secretarial services and coordinates it with delivery and pricing specifications entered by the users examples include Rearden Commerce and arriba Internet integration is also related to SaaS internet integration is the integration of cloud-based services connecting SaaS providers to service buses and consumers examples include opt source and GrandCentral the practice and history of cloud computing where did this term come from and where did it all start the concept of the cloud and cloud computing is actually as old as the internet itself however the term did not come around until August of 2006 when while at a search-engine conference in San Jose California Google CEO Eric Schmidt introduced the term cloud computing to the world in February of 2007 Google Docs was introduced this is what really sparked the cloud revolution although other products such as Amazon Web Services and salesforce.com were already on the market Google Docs is what really sparked interest benefits of cloud computing it eliminates the need for companies to host their own service and purchase expensive software this results in major cost savings for large businesses who manage and store large amounts of data it also reduces the need for users to plan far in advance for expansion and loss of data it removes the need for more inexpensive hardware such as memory it allows users to access data across broad networks on an as-needed basis and it also increases speed and elasticity of the release of certain capabilities it does not come without its drawbacks though the drawbacks include security and privacy security is one of the most concerning issues for cloud computing next to privacy it is a concern in terms of both legal and compliance and user trusts as well as user needs other drawbacks include availability and possibility of data lock-in where can where customers are unable to properly extract their data cost and time of transferring data across the cloud transferring just one terabyte can cost anywhere from $100 to $150 and take up to a month finally the risks of bugs and removing errors in large sale scale distribution systems to further explore privacy issues unfortunately we are living in an age where our level of privacy is rapidly decreasing and users of the cloud are no different facing security and privacy issues from every angle responsibilities for these issues Falls not only on the cloud user but also on the cloud vendor and all other third party users who have access Google is one of the most prominent offenders when it comes to collecting user data as they have been following user activity through all of their services including YouTube Gmail and search for years soon they will be launching a new program that puts together an entire profile of users credit card companies and banks are no better in fact MasterCard is actually moving toward packaging user data and selling it to advertisers to help them better target consumers who are interested in different categories from travel to clothing security issues one of the main apprehensions that users of the cloud and cloud computing have is how secure is my information the following are the key issues users face in the security department location where the data is actually stored most users have no idea in which jurisdiction or even which country for that matter data segregation how vendors keep a certain degree of separation between one customers data and another encryption also known as encoding or converting data or information into code this is one way that vendors isolate one users data from another recoverability how quickly and effectively can a user's information be recovered after a large disaster and long term viability what will happen to user information should a vendor go out of business or be acquired by another larger company finally hacking this is the most daunting issue for most users what if someone hacks into my information and shares it with the world hacking is an extremely frightening issue for almost all consumers who participate in cloud computing in some way there have been several high profile attacks on companies such as Citigroup Inc Sony Corp and even Apple on August 3rd 2012 journalist Matt Honan was made an example of when in his Apple iCloud account along with his gmail account MacBook Air iPhone iPad and Twitter were all hacked and wiped clean luckily there are several steps that users can take to avoid this nightmare from happening to them first back up everything to multiple locations both in the cloud and on the ground also password protection have many different passwords that are very difficult for each and every account that requires a password do not link accounts together this was one of hone ins major downfalls once they gained access to one it was easier and easier to gain access to the rest finally optimize the use of two-factor authentication used by both Google and Facebook this service combines something you know like a password with something you have like an object finally how the government is protecting users of the cloud in September of 2009 the government launched the federal cloud computing initiative embracing the very real changes in technology in 1986 the government puts into effect the stored Communications Act a complex statute based on the operation of early computer networks the Act seeks to regulate two primary uses of computer networks electronic communication services and remote computer services the national initiative of standards and technology is an organization that supports nice it has released a guidelines on security and privacy in public computing that manages security and privacy issues in cloud computing nice stands for the national initiative for cybersecurity education it is an organization that assists in educating the general public and federal employees alike on the importance of improving cyber practices the organization offers programs and workshops on IT security cyber security tech support tech support scams among other things in conclusion we are rapidly moving forward in technology whether we want to or not and these changes are going to affect the way we manage and store our data although there are there are so many obstacles to overcome when it comes to protecting the privacy and security of our information stored in the cloud there are also many possibilities

8 Comments

  1. fretboard 267 said:

    well done!

    June 27, 2019
    Reply
  2. kumudu dissanayaka said:

    nice this

    June 27, 2019
    Reply
  3. tariq shah said:

    Explained very well

    June 27, 2019
    Reply
  4. Ashraf Abdou said:

    where i find ppt

    June 27, 2019
    Reply
  5. Kasun Mawella said:

    tx a lot 🙂 its helped me for my assignment 

    June 27, 2019
    Reply
  6. gampa sreenivasulu said:

    really nice presentation.   Thanks..

    June 27, 2019
    Reply
  7. Manu Mathew said:

    Really good, Well explained. Thanks

    June 27, 2019
    Reply
  8. Ace Shev said:

    You were awesome! Helped me alot in my assignment. Btw cool accent

    June 27, 2019
    Reply

Leave a Reply

Your email address will not be published. Required fields are marked *