SlideShare uma empresa Scribd logo
1 de 28
Overview on Cloud Computing & Cloud Computing Security German University in Cairo (GUC)
Technical Presentation     Page  Outline ,[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object]
Technical Presentation     Page  What is Cloud Computing ?  Experts Opinion !!  “ We’ve redefined Cloud Computing to include  everything that we already do.  . . . I don’t understand what we would do differently in the light of Cloud Computing other than change the wording of some of our ads.” Larry Ellison , Founder of Oracle Richard Stallman , GNU “ It’s  stupidity . It’s  worse than stupidity : it’s a marketing hype campaign” Ron Rivest , The  R  of RSA  “ Cloud Computing will become a focal point of our work in security.  I’m optimistic …”
Technical Presentation     Page  What is Cloud Computing ?  Google‘s Opinion !!
Technical Presentation     Page  What is Cloud Computing ?  The Formal Definiton ,[object Object],[object Object],[object Object],[object Object],[object Object]
Technical Presentation     Page  What is Cloud Computing ?  Some of the Advantages of Cloud Computing ,[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object]
Sensor Networks Seminar     Page  What is Cloud Computing ?  Cloud Deployment Models ,[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object]
Sensor Networks Seminar     Page  What is Cloud Computing ?  Cloud Service Models Cloud Computing basically means selling“  X -as-a-Service“  Software-as-a-Service (SaaS):  Consumer can use the provider‘s software or application that are running on the cloud infrastructure, but can‘t manage or control the underlying infrastructure. Examples, Gmail, Google Apps, Google Docs.  Platform-as-a-Service (PaaS):  Consumers develop their own software or applications using tools, programming languages supported by the provider. Examples, Google App Engine, Windows Azure, SpringSource.  Infrastructure-as-a-Service(IaaS):  Consumer is granted the capability to provision processing, storage, Hardware and computational resources by which he can use to run any arbitary software. The consumer has control over the operating systems, storage, deployed applications and limited control over networking components.
Technical Presentaion     Page  What is Cloud Computing ?  Another way to look at it !!
Technical Presentation     Page  Cloud Security If Clouds are so great, why aren‘t everyone using it ?! ,[object Object],[object Object]
Technical Presentation     Page  Cloud Security Anatomy of  Fear  in the Cloud ,[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object]
Technical Presentation     Page  Cloud Security Attack Modeling ,[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object]
Technichal Presentation     Page  Cloud Security Threat Model
Technical Presentation     Page  Cloud Security Who could be the attacker ?  ,[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object]
Sensor Networks Seminar     Page  Cloud Security  Capability of the Attacker (Insider) ,[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object]
Technical Presentation     Page  Cloud Security Capability of the Attacker (Outsider) ,[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object]
Technical Presentation     Page  Cloud Security Threat Model
Sensor Networks Seminar     Page  Assets and Attacker Goals (Outsider)  Cloud Computing  ,[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object]
Technical Presentation     Page  Cloud Security Threat Model
Technical Presentation     Page  Cloud Security Threats - Confidentiality  ,[object Object],[object Object],[object Object],[object Object]
Technical Presentation     Page  Cloud Security Threats – Integrity  ,[object Object],[object Object],[object Object],[object Object]
Technical Presentation     Page  Cloud Security Threats – Availbility  ,[object Object],[object Object],[object Object],[object Object],[object Object],[object Object]
Technical Presentation     Page  Real Examples – Data Loss  Cloud Security "Regrettably, based on  Microsoft /Danger's latest recovery assessment of their systems, we must now inform you that personal information stored on your device—such as contacts, calendar entries, to-do lists or photos—that is no longer on your Sidekick almost certainly has been lost as a result of a server failure at Microsoft/Danger."
Technical Presentation     Page  Real Examples – Downtimes  Cloud Security
Technical Presentation     Page  Cloud Security Real Examples – Phishing  “ hey! check out this funny blog about you...”
Technichal Presntation     Page  Cloud Security Real Examples – Botnets
Sensor Networks Seminar     Page  Summary & Conclusion ,[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object]
Technichal Presentation     Page  Questions !??

Mais conteúdo relacionado

Mais procurados

SOME SECURITY CHALLENGES IN CLOUD COMPUTING
SOME SECURITY CHALLENGES  IN CLOUD COMPUTINGSOME SECURITY CHALLENGES  IN CLOUD COMPUTING
SOME SECURITY CHALLENGES IN CLOUD COMPUTING
Hoang Nguyen
 
The Security and Privacy Threats to Cloud Computing
The Security and Privacy Threats to Cloud ComputingThe Security and Privacy Threats to Cloud Computing
The Security and Privacy Threats to Cloud Computing
Ankit Singh
 
Cloud Computing Security
Cloud Computing SecurityCloud Computing Security
Cloud Computing Security
Dhaval Dave
 
Cloud computing security from single to multi clouds
Cloud computing security from single to multi cloudsCloud computing security from single to multi clouds
Cloud computing security from single to multi clouds
Cholavaram Sai
 

Mais procurados (20)

SOME SECURITY CHALLENGES IN CLOUD COMPUTING
SOME SECURITY CHALLENGES  IN CLOUD COMPUTINGSOME SECURITY CHALLENGES  IN CLOUD COMPUTING
SOME SECURITY CHALLENGES IN CLOUD COMPUTING
 
The Security and Privacy Threats to Cloud Computing
The Security and Privacy Threats to Cloud ComputingThe Security and Privacy Threats to Cloud Computing
The Security and Privacy Threats to Cloud Computing
 
security Issues of cloud computing
security Issues of cloud computingsecurity Issues of cloud computing
security Issues of cloud computing
 
Chap 6 cloud security
Chap 6 cloud securityChap 6 cloud security
Chap 6 cloud security
 
Cloud Computing Security Issues
Cloud Computing Security Issues Cloud Computing Security Issues
Cloud Computing Security Issues
 
Privacy and security in the cloud Challenges and solutions for our future inf...
Privacy and security in the cloud Challenges and solutions for our future inf...Privacy and security in the cloud Challenges and solutions for our future inf...
Privacy and security in the cloud Challenges and solutions for our future inf...
 
Data Confidentiality in Cloud Computing
Data Confidentiality in Cloud ComputingData Confidentiality in Cloud Computing
Data Confidentiality in Cloud Computing
 
Cloud computing security from single to multiple
Cloud computing security from single to multipleCloud computing security from single to multiple
Cloud computing security from single to multiple
 
Cloud Computing & Security Concerns
Cloud Computing & Security ConcernsCloud Computing & Security Concerns
Cloud Computing & Security Concerns
 
Cloud Computing Security
Cloud Computing SecurityCloud Computing Security
Cloud Computing Security
 
Security Issues of Cloud Computing
Security Issues of Cloud ComputingSecurity Issues of Cloud Computing
Security Issues of Cloud Computing
 
PhD Projects in Cloud Computing Security Research Topics
PhD Projects in Cloud Computing Security Research TopicsPhD Projects in Cloud Computing Security Research Topics
PhD Projects in Cloud Computing Security Research Topics
 
Cloud Security ("securing the cloud")
Cloud Security ("securing the cloud")Cloud Security ("securing the cloud")
Cloud Security ("securing the cloud")
 
Cloud computing security from single to multi clouds
Cloud computing security from single to multi cloudsCloud computing security from single to multi clouds
Cloud computing security from single to multi clouds
 
Cloud computing-security-issues
Cloud computing-security-issuesCloud computing-security-issues
Cloud computing-security-issues
 
Cloud computing and its security issues
Cloud computing and its security issuesCloud computing and its security issues
Cloud computing and its security issues
 
Lecture01: Introduction to Security and Privacy in Cloud Computing
Lecture01: Introduction to Security and Privacy in Cloud ComputingLecture01: Introduction to Security and Privacy in Cloud Computing
Lecture01: Introduction to Security and Privacy in Cloud Computing
 
Cloud Computing and Security - ISACA Hyderabad Chapter Presentation
Cloud Computing and Security - ISACA Hyderabad Chapter PresentationCloud Computing and Security - ISACA Hyderabad Chapter Presentation
Cloud Computing and Security - ISACA Hyderabad Chapter Presentation
 
Security issue in cloud by himanshu tiwari
Security issue in cloud by himanshu tiwariSecurity issue in cloud by himanshu tiwari
Security issue in cloud by himanshu tiwari
 
Security and Privacy in Cloud Computing - a High-level view
Security and Privacy in Cloud Computing - a High-level viewSecurity and Privacy in Cloud Computing - a High-level view
Security and Privacy in Cloud Computing - a High-level view
 

Destaque

Target audience 3
Target audience 3Target audience 3
Target audience 3
Dalveer
 
Presentation skills with guided sign post
Presentation skills with guided sign postPresentation skills with guided sign post
Presentation skills with guided sign post
Timothy Wooi
 
Target Audience Characteristics
Target Audience CharacteristicsTarget Audience Characteristics
Target Audience Characteristics
meggarven
 

Destaque (19)

Wireless hacking and security
Wireless hacking and securityWireless hacking and security
Wireless hacking and security
 
5 technical review 1
5  technical review 15  technical review 1
5 technical review 1
 
Target audience
Target audienceTarget audience
Target audience
 
Target audience 3
Target audience 3Target audience 3
Target audience 3
 
Target audience updated
Target audience updatedTarget audience updated
Target audience updated
 
[114] DRC hubo technical review
[114] DRC hubo technical review[114] DRC hubo technical review
[114] DRC hubo technical review
 
My target audience
My target audienceMy target audience
My target audience
 
A2 Target Audience
A2 Target AudienceA2 Target Audience
A2 Target Audience
 
Presentation skills with guided sign post
Presentation skills with guided sign postPresentation skills with guided sign post
Presentation skills with guided sign post
 
Target Audience
Target AudienceTarget Audience
Target Audience
 
Data Gathering and ethics
Data Gathering and ethicsData Gathering and ethics
Data Gathering and ethics
 
Basic Communication
Basic Communication Basic Communication
Basic Communication
 
Constructive performance feedback
Constructive performance feedbackConstructive performance feedback
Constructive performance feedback
 
Target Audience Characteristics
Target Audience CharacteristicsTarget Audience Characteristics
Target Audience Characteristics
 
Types Of Business Organisation
Types Of Business OrganisationTypes Of Business Organisation
Types Of Business Organisation
 
The Project Management Process - Week 9 Performance Management
The Project Management Process - Week 9   Performance ManagementThe Project Management Process - Week 9   Performance Management
The Project Management Process - Week 9 Performance Management
 
Presentation Preparation: How To Be Above Average
Presentation Preparation: How To Be Above AveragePresentation Preparation: How To Be Above Average
Presentation Preparation: How To Be Above Average
 
PowerPoint Presentation Development
PowerPoint Presentation DevelopmentPowerPoint Presentation Development
PowerPoint Presentation Development
 
The Project Management Process - Week 7 Managing Teams
The Project Management Process - Week 7   Managing TeamsThe Project Management Process - Week 7   Managing Teams
The Project Management Process - Week 7 Managing Teams
 

Semelhante a Presentation copy

Security in cloud computing kashyap kunal
Security in cloud computing  kashyap kunalSecurity in cloud computing  kashyap kunal
Security in cloud computing kashyap kunal
Kashyap Kunal
 
Effectively and Securely Using the Cloud Computing Paradigm
Effectively and Securely Using the Cloud Computing ParadigmEffectively and Securely Using the Cloud Computing Paradigm
Effectively and Securely Using the Cloud Computing Paradigm
fanc1985
 
Iirdem a novel approach for enhancing security in multi cloud environment
Iirdem a novel approach for enhancing security in multi  cloud environmentIirdem a novel approach for enhancing security in multi  cloud environment
Iirdem a novel approach for enhancing security in multi cloud environment
Iaetsd Iaetsd
 
Security Issues in Cloud Computing by rahul abhishek
Security Issues in Cloud Computing  by rahul abhishekSecurity Issues in Cloud Computing  by rahul abhishek
Security Issues in Cloud Computing by rahul abhishek
Er. rahul abhishek
 
CMST&210 Pillow talk Position 1 Why do you think you may.docx
CMST&210 Pillow talk Position 1 Why do you think you may.docxCMST&210 Pillow talk Position 1 Why do you think you may.docx
CMST&210 Pillow talk Position 1 Why do you think you may.docx
mccormicknadine86
 

Semelhante a Presentation copy (20)

Security in cloud computing kashyap kunal
Security in cloud computing  kashyap kunalSecurity in cloud computing  kashyap kunal
Security in cloud computing kashyap kunal
 
Cloud computing
Cloud computingCloud computing
Cloud computing
 
Securing The Journey To The Cloud
Securing The Journey To The Cloud Securing The Journey To The Cloud
Securing The Journey To The Cloud
 
CLOUD COMPUTING.pptx
CLOUD COMPUTING.pptxCLOUD COMPUTING.pptx
CLOUD COMPUTING.pptx
 
UNIT -V.docx
UNIT -V.docxUNIT -V.docx
UNIT -V.docx
 
Cloud intrusion detection System
Cloud intrusion detection SystemCloud intrusion detection System
Cloud intrusion detection System
 
Introduction to Cloud computing
Introduction to Cloud computingIntroduction to Cloud computing
Introduction to Cloud computing
 
Understanding Cloud Computing
Understanding Cloud ComputingUnderstanding Cloud Computing
Understanding Cloud Computing
 
Effectively and Securely Using the Cloud Computing Paradigm
Effectively and Securely Using the Cloud Computing ParadigmEffectively and Securely Using the Cloud Computing Paradigm
Effectively and Securely Using the Cloud Computing Paradigm
 
Iirdem a novel approach for enhancing security in multi cloud environment
Iirdem a novel approach for enhancing security in multi  cloud environmentIirdem a novel approach for enhancing security in multi  cloud environment
Iirdem a novel approach for enhancing security in multi cloud environment
 
Security Issues in Cloud Computing by rahul abhishek
Security Issues in Cloud Computing  by rahul abhishekSecurity Issues in Cloud Computing  by rahul abhishek
Security Issues in Cloud Computing by rahul abhishek
 
Literature Review: Security on cloud computing
Literature Review: Security on cloud computingLiterature Review: Security on cloud computing
Literature Review: Security on cloud computing
 
Celera Networks on Cloud Computing
Celera Networks on Cloud Computing Celera Networks on Cloud Computing
Celera Networks on Cloud Computing
 
Solutions of cloud computing security issues
Solutions of cloud computing security issuesSolutions of cloud computing security issues
Solutions of cloud computing security issues
 
Basic Overview Of Cloud Computing
Basic Overview Of Cloud ComputingBasic Overview Of Cloud Computing
Basic Overview Of Cloud Computing
 
Cc unit 1 updated
Cc unit 1 updatedCc unit 1 updated
Cc unit 1 updated
 
CMST&210 Pillow talk Position 1 Why do you think you may.docx
CMST&210 Pillow talk Position 1 Why do you think you may.docxCMST&210 Pillow talk Position 1 Why do you think you may.docx
CMST&210 Pillow talk Position 1 Why do you think you may.docx
 
Eb31854857
Eb31854857Eb31854857
Eb31854857
 
Cloud Computing Security Challenges
Cloud Computing Security ChallengesCloud Computing Security Challenges
Cloud Computing Security Challenges
 
Implementing security groups in open stack
Implementing security groups in open stackImplementing security groups in open stack
Implementing security groups in open stack
 

Último

Artificial Intelligence: Facts and Myths
Artificial Intelligence: Facts and MythsArtificial Intelligence: Facts and Myths
Artificial Intelligence: Facts and Myths
Joaquim Jorge
 
CNv6 Instructor Chapter 6 Quality of Service
CNv6 Instructor Chapter 6 Quality of ServiceCNv6 Instructor Chapter 6 Quality of Service
CNv6 Instructor Chapter 6 Quality of Service
giselly40
 
IAC 2024 - IA Fast Track to Search Focused AI Solutions
IAC 2024 - IA Fast Track to Search Focused AI SolutionsIAC 2024 - IA Fast Track to Search Focused AI Solutions
IAC 2024 - IA Fast Track to Search Focused AI Solutions
Enterprise Knowledge
 

Último (20)

The Role of Taxonomy and Ontology in Semantic Layers - Heather Hedden.pdf
The Role of Taxonomy and Ontology in Semantic Layers - Heather Hedden.pdfThe Role of Taxonomy and Ontology in Semantic Layers - Heather Hedden.pdf
The Role of Taxonomy and Ontology in Semantic Layers - Heather Hedden.pdf
 
Presentation on how to chat with PDF using ChatGPT code interpreter
Presentation on how to chat with PDF using ChatGPT code interpreterPresentation on how to chat with PDF using ChatGPT code interpreter
Presentation on how to chat with PDF using ChatGPT code interpreter
 
Raspberry Pi 5: Challenges and Solutions in Bringing up an OpenGL/Vulkan Driv...
Raspberry Pi 5: Challenges and Solutions in Bringing up an OpenGL/Vulkan Driv...Raspberry Pi 5: Challenges and Solutions in Bringing up an OpenGL/Vulkan Driv...
Raspberry Pi 5: Challenges and Solutions in Bringing up an OpenGL/Vulkan Driv...
 
Strategies for Unlocking Knowledge Management in Microsoft 365 in the Copilot...
Strategies for Unlocking Knowledge Management in Microsoft 365 in the Copilot...Strategies for Unlocking Knowledge Management in Microsoft 365 in the Copilot...
Strategies for Unlocking Knowledge Management in Microsoft 365 in the Copilot...
 
ProductAnonymous-April2024-WinProductDiscovery-MelissaKlemke
ProductAnonymous-April2024-WinProductDiscovery-MelissaKlemkeProductAnonymous-April2024-WinProductDiscovery-MelissaKlemke
ProductAnonymous-April2024-WinProductDiscovery-MelissaKlemke
 
Artificial Intelligence: Facts and Myths
Artificial Intelligence: Facts and MythsArtificial Intelligence: Facts and Myths
Artificial Intelligence: Facts and Myths
 
From Event to Action: Accelerate Your Decision Making with Real-Time Automation
From Event to Action: Accelerate Your Decision Making with Real-Time AutomationFrom Event to Action: Accelerate Your Decision Making with Real-Time Automation
From Event to Action: Accelerate Your Decision Making with Real-Time Automation
 
Understanding Discord NSFW Servers A Guide for Responsible Users.pdf
Understanding Discord NSFW Servers A Guide for Responsible Users.pdfUnderstanding Discord NSFW Servers A Guide for Responsible Users.pdf
Understanding Discord NSFW Servers A Guide for Responsible Users.pdf
 
Powerful Google developer tools for immediate impact! (2023-24 C)
Powerful Google developer tools for immediate impact! (2023-24 C)Powerful Google developer tools for immediate impact! (2023-24 C)
Powerful Google developer tools for immediate impact! (2023-24 C)
 
Strategies for Landing an Oracle DBA Job as a Fresher
Strategies for Landing an Oracle DBA Job as a FresherStrategies for Landing an Oracle DBA Job as a Fresher
Strategies for Landing an Oracle DBA Job as a Fresher
 
How to convert PDF to text with Nanonets
How to convert PDF to text with NanonetsHow to convert PDF to text with Nanonets
How to convert PDF to text with Nanonets
 
Finology Group – Insurtech Innovation Award 2024
Finology Group – Insurtech Innovation Award 2024Finology Group – Insurtech Innovation Award 2024
Finology Group – Insurtech Innovation Award 2024
 
How to Troubleshoot Apps for the Modern Connected Worker
How to Troubleshoot Apps for the Modern Connected WorkerHow to Troubleshoot Apps for the Modern Connected Worker
How to Troubleshoot Apps for the Modern Connected Worker
 
CNv6 Instructor Chapter 6 Quality of Service
CNv6 Instructor Chapter 6 Quality of ServiceCNv6 Instructor Chapter 6 Quality of Service
CNv6 Instructor Chapter 6 Quality of Service
 
Evaluating the top large language models.pdf
Evaluating the top large language models.pdfEvaluating the top large language models.pdf
Evaluating the top large language models.pdf
 
2024: Domino Containers - The Next Step. News from the Domino Container commu...
2024: Domino Containers - The Next Step. News from the Domino Container commu...2024: Domino Containers - The Next Step. News from the Domino Container commu...
2024: Domino Containers - The Next Step. News from the Domino Container commu...
 
The 7 Things I Know About Cyber Security After 25 Years | April 2024
The 7 Things I Know About Cyber Security After 25 Years | April 2024The 7 Things I Know About Cyber Security After 25 Years | April 2024
The 7 Things I Know About Cyber Security After 25 Years | April 2024
 
presentation ICT roal in 21st century education
presentation ICT roal in 21st century educationpresentation ICT roal in 21st century education
presentation ICT roal in 21st century education
 
Workshop - Best of Both Worlds_ Combine KG and Vector search for enhanced R...
Workshop - Best of Both Worlds_ Combine  KG and Vector search for  enhanced R...Workshop - Best of Both Worlds_ Combine  KG and Vector search for  enhanced R...
Workshop - Best of Both Worlds_ Combine KG and Vector search for enhanced R...
 
IAC 2024 - IA Fast Track to Search Focused AI Solutions
IAC 2024 - IA Fast Track to Search Focused AI SolutionsIAC 2024 - IA Fast Track to Search Focused AI Solutions
IAC 2024 - IA Fast Track to Search Focused AI Solutions
 

Presentation copy

  • 1. Overview on Cloud Computing & Cloud Computing Security German University in Cairo (GUC)
  • 2.
  • 3. Technical Presentation  Page What is Cloud Computing ? Experts Opinion !! “ We’ve redefined Cloud Computing to include everything that we already do. . . . I don’t understand what we would do differently in the light of Cloud Computing other than change the wording of some of our ads.” Larry Ellison , Founder of Oracle Richard Stallman , GNU “ It’s stupidity . It’s worse than stupidity : it’s a marketing hype campaign” Ron Rivest , The R of RSA “ Cloud Computing will become a focal point of our work in security. I’m optimistic …”
  • 4. Technical Presentation  Page What is Cloud Computing ? Google‘s Opinion !!
  • 5.
  • 6.
  • 7.
  • 8. Sensor Networks Seminar  Page What is Cloud Computing ? Cloud Service Models Cloud Computing basically means selling“ X -as-a-Service“ Software-as-a-Service (SaaS): Consumer can use the provider‘s software or application that are running on the cloud infrastructure, but can‘t manage or control the underlying infrastructure. Examples, Gmail, Google Apps, Google Docs. Platform-as-a-Service (PaaS): Consumers develop their own software or applications using tools, programming languages supported by the provider. Examples, Google App Engine, Windows Azure, SpringSource. Infrastructure-as-a-Service(IaaS): Consumer is granted the capability to provision processing, storage, Hardware and computational resources by which he can use to run any arbitary software. The consumer has control over the operating systems, storage, deployed applications and limited control over networking components.
  • 9. Technical Presentaion  Page What is Cloud Computing ? Another way to look at it !!
  • 10.
  • 11.
  • 12.
  • 13. Technichal Presentation  Page Cloud Security Threat Model
  • 14.
  • 15.
  • 16.
  • 17. Technical Presentation  Page Cloud Security Threat Model
  • 18.
  • 19. Technical Presentation  Page Cloud Security Threat Model
  • 20.
  • 21.
  • 22.
  • 23. Technical Presentation  Page Real Examples – Data Loss Cloud Security "Regrettably, based on Microsoft /Danger's latest recovery assessment of their systems, we must now inform you that personal information stored on your device—such as contacts, calendar entries, to-do lists or photos—that is no longer on your Sidekick almost certainly has been lost as a result of a server failure at Microsoft/Danger."
  • 24. Technical Presentation  Page Real Examples – Downtimes Cloud Security
  • 25. Technical Presentation  Page Cloud Security Real Examples – Phishing “ hey! check out this funny blog about you...”
  • 26. Technichal Presntation  Page Cloud Security Real Examples – Botnets
  • 27.
  • 28. Technichal Presentation  Page Questions !??