SlideShare a Scribd company logo
1 of 29
Download to read offline
Cloud Security Issues andCloud Security Issues andCloud Security Issues andCloud Security Issues and
Adoption Guideline for ThaiAdoption Guideline for ThaiAdoption Guideline for ThaiAdoption Guideline for Thai
Government AgenciesGovernment AgenciesGovernment AgenciesGovernment Agencies
July 26, 2016
Dr. Sudsanguan Ngamsuriyaroj
Faculty of ICT, Mahidol University
About Me
Assistant Professor
Faculty of ICT, Mahidol University
Teaching
Parallel computing, Cloud computing
Security
Computer Ethics
Research
Security (network, cloud, database)
Parallel computing
Healthcare applications
SIPA TECHNOLOGY MEETUP 2016 - HIGH PERFORMANCE COMPUTING TRENDS AND TECHNOLOGY 2
sudsanguan.nga@mahidol.ac.th
Agenda
Cloud Adoption
General Security Concepts
Cloud Security Model
Cloud Security Issues
3SIPA TECHNOLOGY MEETUP 2016 - HIGH PERFORMANCE COMPUTING TRENDS AND TECHNOLOGY
Cloud Adoption
from Data Center to Cloud
4
http://www.stratoscale.com/blog/cloud/the-journey-from-virtualization-to-cloud-computing/
SIPA TECHNOLOGY MEETUP 2016 - HIGH PERFORMANCE COMPUTING TRENDS AND TECHNOLOGY
Cloud Adoption – Why?
5SIPA TECHNOLOGY MEETUP 2016 - HIGH PERFORMANCE COMPUTING TRENDS AND TECHNOLOGY
Cloud Adoption – Why?
Cost Reduction
6
http://www.opengroup.org/cloud/whitepapers/ccroi/roi.htm
SIPA TECHNOLOGY MEETUP 2016 - HIGH PERFORMANCE COMPUTING TRENDS AND TECHNOLOGY
Are you ready for Cloud?
Which applications will be moved to cloud
Readiness of existing infrastructure
Development of IT personnel (infrastructure and
developers)
How to migrate to cloud
◦ Which cloud model/platform (public, private, hybrid) to use
Budget / ROI
Application users
Schedule to deliver products/services
7SIPA TECHNOLOGY MEETUP 2016 - HIGH PERFORMANCE COMPUTING TRENDS AND TECHNOLOGY
Categories of Applications
1. Public applications: for everyone: web sites
2. External based applications: for customers/ partners
3. Internal based applications: for staff only - emails
4. Private applications: for administration: ERP, HR
8
Which applications will be
moved to Cloud
SIPA TECHNOLOGY MEETUP 2016 - HIGH PERFORMANCE COMPUTING TRENDS AND TECHNOLOGY
Network infrastructure
System infrastructure
Application platforms
BCP – Business Continuity Plan
Infrastructure Maintenance
Audit process
9
Readiness of Existing Infrastructure
SIPA TECHNOLOGY MEETUP 2016 - HIGH PERFORMANCE COMPUTING TRENDS AND TECHNOLOGY
Physical / Logical network diagram (latest update?)
All existing equipment and their capacity
Report of network usage
◦ Bandwidth enough?
◦ Any usage abuse?
What links needed to be updated
10
Readiness of Existing Infrastructure:
Network Ready?
SIPA TECHNOLOGY MEETUP 2016 - HIGH PERFORMANCE COMPUTING TRENDS AND TECHNOLOGY
List of all servers and the applications running
List of all servers no longer used
How long a server will be used
Is there any maintenance?
What workload running and how much the
utilization is?
If there is a new server, a plan to use VM ?
11
Readiness of Existing Infrastructure:
System Ready?
SIPA TECHNOLOGY MEETUP 2016 - HIGH PERFORMANCE COMPUTING TRENDS AND TECHNOLOGY
Workload Forecasted
12
http://www.americanis.net/2013/shift-your-risk-in-the-cloud/
SIPA TECHNOLOGY MEETUP 2016 - HIGH PERFORMANCE COMPUTING TRENDS AND TECHNOLOGY
Workload Analysis
13SIPA TECHNOLOGY MEETUP 2016 - HIGH PERFORMANCE COMPUTING TRENDS AND TECHNOLOGY
What would be Barriers?
Data security and privacy
People with effective skills
Different cloud service providers and platforms
Vendor lock-in
Cloud providers’ reliability and availability
Risks
14
http://www.slideshare.net/ISS-NUS/security-in-smart-city-implementation-
infrastructure-and-people
SIPA TECHNOLOGY MEETUP 2016 - HIGH PERFORMANCE COMPUTING TRENDS AND TECHNOLOGY
General Security Concept
15
http://www.slideshare.net/dr_edw777/chapter-1-overview-11741038
SIPA TECHNOLOGY MEETUP 2016 - HIGH PERFORMANCE COMPUTING TRENDS AND TECHNOLOGY
NIST Reference Architecture
16
Source: NIST Special Publication 500-292, NIST Cloud Computing Reference Architecture
SIPA TECHNOLOGY MEETUP 2016 - HIGH PERFORMANCE COMPUTING TRENDS AND TECHNOLOGY
Cloud Security Model
17
http://www.softwaretestpro.com/ItemAssets/5590/Fig4.jpg
SIPA TECHNOLOGY MEETUP 2016 - HIGH PERFORMANCE COMPUTING TRENDS AND TECHNOLOGY
1. Data breaches/ leaks
2. Data loss
3. Account or service traffic hijacking
4. Insecure interfaces and APIs
5. Denial of services
6. Malicious Insiders
7. Cloud abuse
8. Insufficient due diligence
9. Shared technology vulnerabilities
CSA Notorious 9CSA Notorious 9CSA Notorious 9CSA Notorious 9
Cloud Top Threats in 2013
18
https://downloads.cloudsecurityalliance.org/initiatives/top_
threats/The_Notorious_Nine_Cloud_Computing_Top_Threa
ts_in_2013.pdf
SIPA TECHNOLOGY MEETUP 2016 - HIGH PERFORMANCE COMPUTING TRENDS AND TECHNOLOGY
CSA TreacherousCSA TreacherousCSA TreacherousCSA Treacherous 12121212
Cloud Top Threats in 2016
1. Data Breaches
2. Weak Identity,
Credential and Access
Management
3. Insecure APIs
4. System and Application
Vulnerabilities
5. Account Hijacking
6. Malicious Insiders
19
7. Advanced Persistent
Threats (APTs)
8. Data Loss
9. Insufficient Due Diligence
10.Abuse and Nefarious Use
of Cloud Services
11.Denial of Service
12.Shared Technology Issues
https://cloudsecurityalliance.org/download/the-treacherous-twelve-cloud-
computing-top-threats-in-2016/
SIPA TECHNOLOGY MEETUP 2016 - HIGH PERFORMANCE COMPUTING TRENDS AND TECHNOLOGY
Data Breaches
World's Biggest Data Breaches
Selected losses greater than 30,000 records (updated 11th July 2016)
20
http://www.informationisbeautiful.net/visualizations/worlds-biggest-data-breaches-hacks/
SIPA TECHNOLOGY MEETUP 2016 - HIGH PERFORMANCE COMPUTING TRENDS AND TECHNOLOGY
Data Loss
21
http://www.theregister.co.uk
/2016/05/13/salesforcecom_
crash_caused_data_loss/
http://www.computerworld.com/a
rticle/2973600/cloud-
computing/google-cloud-loses-
data-belgium-itbwcw.html
SIPA TECHNOLOGY MEETUP 2016 - HIGH PERFORMANCE COMPUTING TRENDS AND TECHNOLOGY
Data Security on Cloud
How to protect your data from being observed?
Data Encryption
what about KEY? and Key Management?
encryption algorithm?
How about “homomorphic encryption”?
Data Masking for Sensitive data like bank accounts
maintain a mapping between real and
masked data
22SIPA TECHNOLOGY MEETUP 2016 - HIGH PERFORMANCE COMPUTING TRENDS AND TECHNOLOGY
Data Life Cycle
23
https://securosis.com/tag/data+security+lifecycle
SIPA TECHNOLOGY MEETUP 2016 - HIGH PERFORMANCE COMPUTING TRENDS AND TECHNOLOGY
Cloud Threats and Vulnerabilities
24
Adopted from “Realizing the Benefits of Vulnerability Management in the Cloud” by Gordon MacKay, CTO, Digital
Defense, Inc.
SIPA TECHNOLOGY MEETUP 2016 - HIGH PERFORMANCE COMPUTING TRENDS AND TECHNOLOGY
Cloud Security Issues
25
https://www.eitdigital.eu/fileadmin/files/docs/documents_helsinki/TheoDimitrakos-
EIT_ICT_Labs_Symposium_on_Trusted_Cloud_and_Future_Enterprises-email-no-demo.pdf
SIPA TECHNOLOGY MEETUP 2016 - HIGH PERFORMANCE COMPUTING TRENDS AND TECHNOLOGY
Cloud Security Issues
26
https://www.eitdigital.eu/fileadmin/files/docs/documents_helsinki/TheoDimitrakos-
EIT_ICT_Labs_Symposium_on_Trusted_Cloud_and_Future_Enterprises-email-no-demo.pdf
SIPA TECHNOLOGY MEETUP 2016 - HIGH PERFORMANCE COMPUTING TRENDS AND TECHNOLOGY
Cloud Security Issues
27
https://www.eitdigital.eu/fileadmin/files/docs/documents_helsinki/TheoDimitrakos-
EIT_ICT_Labs_Symposium_on_Trusted_Cloud_and_Future_Enterprises-email-no-demo.pdf
SIPA TECHNOLOGY MEETUP 2016 - HIGH PERFORMANCE COMPUTING TRENDS AND TECHNOLOGY
Cloud Security Issues
28
https://www.eitdigital.eu/fileadmin/files/docs/documents_helsinki/TheoDimitrakos-
EIT_ICT_Labs_Symposium_on_Trusted_Cloud_and_Future_Enterprises-email-no-demo.pdf
SIPA TECHNOLOGY MEETUP 2016 - HIGH PERFORMANCE COMPUTING TRENDS AND TECHNOLOGY
Q&A
Thank you
SIPA TECHNOLOGY MEETUP 2016 - HIGH PERFORMANCE COMPUTING TRENDS AND TECHNOLOGY 29

More Related Content

What's hot

Cloud computing understanding security risk and management
Cloud computing   understanding security risk and managementCloud computing   understanding security risk and management
Cloud computing understanding security risk and managementShamsundar Machale (CISSP, CEH)
 
Cloud Computing and Security - ISACA Hyderabad Chapter Presentation
Cloud Computing and Security - ISACA Hyderabad Chapter PresentationCloud Computing and Security - ISACA Hyderabad Chapter Presentation
Cloud Computing and Security - ISACA Hyderabad Chapter PresentationVenkateswar Reddy Melachervu
 
Cloud computing security issues and challenges
Cloud computing security issues and challengesCloud computing security issues and challenges
Cloud computing security issues and challengesKresimir Popovic
 
Cloud Security - Security Aspects of Cloud Computing
Cloud Security - Security Aspects of Cloud ComputingCloud Security - Security Aspects of Cloud Computing
Cloud Security - Security Aspects of Cloud ComputingJim Geovedi
 
Evaluation Of The Data Security Methods In Cloud Computing Environments
Evaluation Of The Data Security Methods In Cloud Computing EnvironmentsEvaluation Of The Data Security Methods In Cloud Computing Environments
Evaluation Of The Data Security Methods In Cloud Computing Environmentsijfcstjournal
 
Cloud Computing Risk Management (Multi Venue)
Cloud Computing Risk Management (Multi Venue)Cloud Computing Risk Management (Multi Venue)
Cloud Computing Risk Management (Multi Venue)Brian K. Dickard
 
Security Issues of Cloud Computing
Security Issues of Cloud ComputingSecurity Issues of Cloud Computing
Security Issues of Cloud ComputingFalgun Rathod
 
SOME SECURITY CHALLENGES IN CLOUD COMPUTING
SOME SECURITY CHALLENGES  IN CLOUD COMPUTINGSOME SECURITY CHALLENGES  IN CLOUD COMPUTING
SOME SECURITY CHALLENGES IN CLOUD COMPUTINGHoang Nguyen
 
Cloud Computing Security
Cloud Computing SecurityCloud Computing Security
Cloud Computing SecurityDhaval Dave
 
Infrastructure Security by Sivamurthy Hiremath
Infrastructure Security by Sivamurthy HiremathInfrastructure Security by Sivamurthy Hiremath
Infrastructure Security by Sivamurthy HiremathClubHack
 
Cloud Computing Security Issues in Infrastructure as a Service” report
Cloud Computing Security Issues in Infrastructure as a Service” reportCloud Computing Security Issues in Infrastructure as a Service” report
Cloud Computing Security Issues in Infrastructure as a Service” reportVivek Maurya
 
Cloud Computing Security Issues
Cloud Computing Security IssuesCloud Computing Security Issues
Cloud Computing Security IssuesStelios Krasadakis
 
security Issues of cloud computing
security Issues of cloud computingsecurity Issues of cloud computing
security Issues of cloud computingprachupanchal
 
Sukumar Nayak-Detailed-Cloud Risk Management and Audit
Sukumar Nayak-Detailed-Cloud Risk Management and AuditSukumar Nayak-Detailed-Cloud Risk Management and Audit
Sukumar Nayak-Detailed-Cloud Risk Management and AuditSukumar Nayak
 
Security issue in cloud by himanshu tiwari
Security issue in cloud by himanshu tiwariSecurity issue in cloud by himanshu tiwari
Security issue in cloud by himanshu tiwaribhanu krishna
 
Cloud computing security & forensics (manu)
Cloud computing security & forensics (manu)Cloud computing security & forensics (manu)
Cloud computing security & forensics (manu)ClubHack
 
Cloud computing-security-issues
Cloud computing-security-issuesCloud computing-security-issues
Cloud computing-security-issuesAleem Mohammed
 

What's hot (20)

Cloud computing understanding security risk and management
Cloud computing   understanding security risk and managementCloud computing   understanding security risk and management
Cloud computing understanding security risk and management
 
Cloud Computing and Security - ISACA Hyderabad Chapter Presentation
Cloud Computing and Security - ISACA Hyderabad Chapter PresentationCloud Computing and Security - ISACA Hyderabad Chapter Presentation
Cloud Computing and Security - ISACA Hyderabad Chapter Presentation
 
Cloud computing security issues and challenges
Cloud computing security issues and challengesCloud computing security issues and challenges
Cloud computing security issues and challenges
 
Cloud Security - Security Aspects of Cloud Computing
Cloud Security - Security Aspects of Cloud ComputingCloud Security - Security Aspects of Cloud Computing
Cloud Security - Security Aspects of Cloud Computing
 
Evaluation Of The Data Security Methods In Cloud Computing Environments
Evaluation Of The Data Security Methods In Cloud Computing EnvironmentsEvaluation Of The Data Security Methods In Cloud Computing Environments
Evaluation Of The Data Security Methods In Cloud Computing Environments
 
Cloud Computing Risk Management (Multi Venue)
Cloud Computing Risk Management (Multi Venue)Cloud Computing Risk Management (Multi Venue)
Cloud Computing Risk Management (Multi Venue)
 
Security Issues of Cloud Computing
Security Issues of Cloud ComputingSecurity Issues of Cloud Computing
Security Issues of Cloud Computing
 
SOME SECURITY CHALLENGES IN CLOUD COMPUTING
SOME SECURITY CHALLENGES  IN CLOUD COMPUTINGSOME SECURITY CHALLENGES  IN CLOUD COMPUTING
SOME SECURITY CHALLENGES IN CLOUD COMPUTING
 
Cloud Computing Security
Cloud Computing SecurityCloud Computing Security
Cloud Computing Security
 
Infrastructure Security by Sivamurthy Hiremath
Infrastructure Security by Sivamurthy HiremathInfrastructure Security by Sivamurthy Hiremath
Infrastructure Security by Sivamurthy Hiremath
 
Cloud Computing Security Issues
Cloud Computing Security Issues Cloud Computing Security Issues
Cloud Computing Security Issues
 
Cloud Computing Security Issues in Infrastructure as a Service” report
Cloud Computing Security Issues in Infrastructure as a Service” reportCloud Computing Security Issues in Infrastructure as a Service” report
Cloud Computing Security Issues in Infrastructure as a Service” report
 
Cloud Computing Security Issues
Cloud Computing Security IssuesCloud Computing Security Issues
Cloud Computing Security Issues
 
Security in Cloud Computing
Security in Cloud ComputingSecurity in Cloud Computing
Security in Cloud Computing
 
security Issues of cloud computing
security Issues of cloud computingsecurity Issues of cloud computing
security Issues of cloud computing
 
Sukumar Nayak-Detailed-Cloud Risk Management and Audit
Sukumar Nayak-Detailed-Cloud Risk Management and AuditSukumar Nayak-Detailed-Cloud Risk Management and Audit
Sukumar Nayak-Detailed-Cloud Risk Management and Audit
 
Security issue in cloud by himanshu tiwari
Security issue in cloud by himanshu tiwariSecurity issue in cloud by himanshu tiwari
Security issue in cloud by himanshu tiwari
 
Cloud Encryption
Cloud EncryptionCloud Encryption
Cloud Encryption
 
Cloud computing security & forensics (manu)
Cloud computing security & forensics (manu)Cloud computing security & forensics (manu)
Cloud computing security & forensics (manu)
 
Cloud computing-security-issues
Cloud computing-security-issuesCloud computing-security-issues
Cloud computing-security-issues
 

Viewers also liked

Keep Calm and CF Push on Azure
Keep Calm and CF Push on AzureKeep Calm and CF Push on Azure
Keep Calm and CF Push on AzureVMware Tanzu
 
Financial Risk Management: Integrated Solutions to Help Financial Institution...
Financial Risk Management: Integrated Solutions to Help Financial Institution...Financial Risk Management: Integrated Solutions to Help Financial Institution...
Financial Risk Management: Integrated Solutions to Help Financial Institution...IBM Banking
 
cloud scheduling
cloud schedulingcloud scheduling
cloud schedulingMudit Verma
 
An Evolving Security Landscape – Security Patterns in the Cloud
An Evolving Security Landscape – Security Patterns in the CloudAn Evolving Security Landscape – Security Patterns in the Cloud
An Evolving Security Landscape – Security Patterns in the CloudAmazon Web Services
 
AWS Security Best Practices and Design Patterns
AWS Security Best Practices and Design PatternsAWS Security Best Practices and Design Patterns
AWS Security Best Practices and Design PatternsAmazon Web Services
 
Financial risk management ppt @ mba finance
Financial risk management  ppt @ mba financeFinancial risk management  ppt @ mba finance
Financial risk management ppt @ mba financeBabasab Patil
 

Viewers also liked (6)

Keep Calm and CF Push on Azure
Keep Calm and CF Push on AzureKeep Calm and CF Push on Azure
Keep Calm and CF Push on Azure
 
Financial Risk Management: Integrated Solutions to Help Financial Institution...
Financial Risk Management: Integrated Solutions to Help Financial Institution...Financial Risk Management: Integrated Solutions to Help Financial Institution...
Financial Risk Management: Integrated Solutions to Help Financial Institution...
 
cloud scheduling
cloud schedulingcloud scheduling
cloud scheduling
 
An Evolving Security Landscape – Security Patterns in the Cloud
An Evolving Security Landscape – Security Patterns in the CloudAn Evolving Security Landscape – Security Patterns in the Cloud
An Evolving Security Landscape – Security Patterns in the Cloud
 
AWS Security Best Practices and Design Patterns
AWS Security Best Practices and Design PatternsAWS Security Best Practices and Design Patterns
AWS Security Best Practices and Design Patterns
 
Financial risk management ppt @ mba finance
Financial risk management  ppt @ mba financeFinancial risk management  ppt @ mba finance
Financial risk management ppt @ mba finance
 

Similar to Cloud security and adoption

Security in Smart City Implementation: Infrastructure and People
Security in Smart City Implementation: Infrastructure and PeopleSecurity in Smart City Implementation: Infrastructure and People
Security in Smart City Implementation: Infrastructure and PeopleNUS-ISS
 
EuroCACS 2016 There are giants in the sky
EuroCACS 2016 There are giants in the skyEuroCACS 2016 There are giants in the sky
EuroCACS 2016 There are giants in the skyCarlos Chalico
 
Palo Alto Networks Soc Ent Okt2009
Palo Alto Networks Soc Ent Okt2009Palo Alto Networks Soc Ent Okt2009
Palo Alto Networks Soc Ent Okt2009Zernike College
 
Cloud Data Protection for the Masses
Cloud Data Protection for the MassesCloud Data Protection for the Masses
Cloud Data Protection for the MassesIRJET Journal
 
Mạng chuyển mạch thế hệ mới
Mạng chuyển mạch thế hệ mớiMạng chuyển mạch thế hệ mới
Mạng chuyển mạch thế hệ mớiSunmedia Corporation
 
Network Management Megatrends 2016: Hybrid Cloud, Network Analytics and the I...
Network Management Megatrends 2016: Hybrid Cloud, Network Analytics and the I...Network Management Megatrends 2016: Hybrid Cloud, Network Analytics and the I...
Network Management Megatrends 2016: Hybrid Cloud, Network Analytics and the I...Enterprise Management Associates
 
Security TechTalk | AWS Public Sector Summit 2016
Security TechTalk | AWS Public Sector Summit 2016Security TechTalk | AWS Public Sector Summit 2016
Security TechTalk | AWS Public Sector Summit 2016Amazon Web Services
 
IRJET- Survey on Security Threats and Remedies in Cloud Computing
IRJET-  	  Survey on Security Threats and Remedies in Cloud ComputingIRJET-  	  Survey on Security Threats and Remedies in Cloud Computing
IRJET- Survey on Security Threats and Remedies in Cloud ComputingIRJET Journal
 
Palo alto networks next generation firewalls
Palo alto networks next generation firewallsPalo alto networks next generation firewalls
Palo alto networks next generation firewallsCastleforce
 
Security and Virtualization in the Data Center
Security and Virtualization in the Data CenterSecurity and Virtualization in the Data Center
Security and Virtualization in the Data CenterCisco Canada
 
Spark Streaming the Industrial IoT
Spark Streaming the Industrial IoTSpark Streaming the Industrial IoT
Spark Streaming the Industrial IoTJim Haughwout
 
Ramin elahi fog_computing_ecosystem_final_dec22_updated
Ramin elahi fog_computing_ecosystem_final_dec22_updatedRamin elahi fog_computing_ecosystem_final_dec22_updated
Ramin elahi fog_computing_ecosystem_final_dec22_updatedHarshitParkar6677
 
100%-ный контроль для 100%-ной безопасности
100%-ный контроль для 100%-ной безопасности100%-ный контроль для 100%-ной безопасности
100%-ный контроль для 100%-ной безопасностиАльбина Минуллина
 
Informe: ¿Quién tiene la conexión a Internet más rápida del mundo?
Informe: ¿Quién tiene la conexión a Internet más rápida del mundo?Informe: ¿Quién tiene la conexión a Internet más rápida del mundo?
Informe: ¿Quién tiene la conexión a Internet más rápida del mundo?Aura Systems Perú
 
Akamai State of Internet: Q3 2013
Akamai State of Internet: Q3 2013Akamai State of Internet: Q3 2013
Akamai State of Internet: Q3 2013Dario Caliendo
 
VOLUME 6, NUMBER 3 3RD QUARTER, 2013 REPORT The State of the Internet
VOLUME 6, NUMBER 3 3RD QUARTER, 2013 REPORT The State of the InternetVOLUME 6, NUMBER 3 3RD QUARTER, 2013 REPORT The State of the Internet
VOLUME 6, NUMBER 3 3RD QUARTER, 2013 REPORT The State of the InternetAkamai Technologies
 
Reporte Estado del Internet
Reporte Estado del InternetReporte Estado del Internet
Reporte Estado del InternetHabacuc Guzman
 

Similar to Cloud security and adoption (20)

Cloud computing
Cloud computing Cloud computing
Cloud computing
 
Security in Smart City Implementation: Infrastructure and People
Security in Smart City Implementation: Infrastructure and PeopleSecurity in Smart City Implementation: Infrastructure and People
Security in Smart City Implementation: Infrastructure and People
 
EuroCACS 2016 There are giants in the sky
EuroCACS 2016 There are giants in the skyEuroCACS 2016 There are giants in the sky
EuroCACS 2016 There are giants in the sky
 
Palo Alto Networks Soc Ent Okt2009
Palo Alto Networks Soc Ent Okt2009Palo Alto Networks Soc Ent Okt2009
Palo Alto Networks Soc Ent Okt2009
 
Cloud Data Protection for the Masses
Cloud Data Protection for the MassesCloud Data Protection for the Masses
Cloud Data Protection for the Masses
 
Mạng chuyển mạch thế hệ mới
Mạng chuyển mạch thế hệ mớiMạng chuyển mạch thế hệ mới
Mạng chuyển mạch thế hệ mới
 
Network Management Megatrends 2016: Hybrid Cloud, Network Analytics and the I...
Network Management Megatrends 2016: Hybrid Cloud, Network Analytics and the I...Network Management Megatrends 2016: Hybrid Cloud, Network Analytics and the I...
Network Management Megatrends 2016: Hybrid Cloud, Network Analytics and the I...
 
Security TechTalk | AWS Public Sector Summit 2016
Security TechTalk | AWS Public Sector Summit 2016Security TechTalk | AWS Public Sector Summit 2016
Security TechTalk | AWS Public Sector Summit 2016
 
IRJET- Survey on Security Threats and Remedies in Cloud Computing
IRJET-  	  Survey on Security Threats and Remedies in Cloud ComputingIRJET-  	  Survey on Security Threats and Remedies in Cloud Computing
IRJET- Survey on Security Threats and Remedies in Cloud Computing
 
Palo alto networks next generation firewalls
Palo alto networks next generation firewallsPalo alto networks next generation firewalls
Palo alto networks next generation firewalls
 
3.2_Securing Microgrids, Substations, and Distributed Autonomous Systems_Lawr...
3.2_Securing Microgrids, Substations, and Distributed Autonomous Systems_Lawr...3.2_Securing Microgrids, Substations, and Distributed Autonomous Systems_Lawr...
3.2_Securing Microgrids, Substations, and Distributed Autonomous Systems_Lawr...
 
Security and Virtualization in the Data Center
Security and Virtualization in the Data CenterSecurity and Virtualization in the Data Center
Security and Virtualization in the Data Center
 
Spark Streaming the Industrial IoT
Spark Streaming the Industrial IoTSpark Streaming the Industrial IoT
Spark Streaming the Industrial IoT
 
Ramin elahi fog_computing_ecosystem_final_dec22_updated
Ramin elahi fog_computing_ecosystem_final_dec22_updatedRamin elahi fog_computing_ecosystem_final_dec22_updated
Ramin elahi fog_computing_ecosystem_final_dec22_updated
 
100%-ный контроль для 100%-ной безопасности
100%-ный контроль для 100%-ной безопасности100%-ный контроль для 100%-ной безопасности
100%-ный контроль для 100%-ной безопасности
 
Informe: ¿Quién tiene la conexión a Internet más rápida del mundo?
Informe: ¿Quién tiene la conexión a Internet más rápida del mundo?Informe: ¿Quién tiene la conexión a Internet más rápida del mundo?
Informe: ¿Quién tiene la conexión a Internet más rápida del mundo?
 
Akamai State of Internet: Q3 2013
Akamai State of Internet: Q3 2013Akamai State of Internet: Q3 2013
Akamai State of Internet: Q3 2013
 
VOLUME 6, NUMBER 3 3RD QUARTER, 2013 REPORT The State of the Internet
VOLUME 6, NUMBER 3 3RD QUARTER, 2013 REPORT The State of the InternetVOLUME 6, NUMBER 3 3RD QUARTER, 2013 REPORT The State of the Internet
VOLUME 6, NUMBER 3 3RD QUARTER, 2013 REPORT The State of the Internet
 
Reporte Estado del Internet
Reporte Estado del InternetReporte Estado del Internet
Reporte Estado del Internet
 
Losing Control to the Cloud
Losing Control to the CloudLosing Control to the Cloud
Losing Control to the Cloud
 

Recently uploaded

Developer Data Modeling Mistakes: From Postgres to NoSQL
Developer Data Modeling Mistakes: From Postgres to NoSQLDeveloper Data Modeling Mistakes: From Postgres to NoSQL
Developer Data Modeling Mistakes: From Postgres to NoSQLScyllaDB
 
Transcript: New from BookNet Canada for 2024: BNC CataList - Tech Forum 2024
Transcript: New from BookNet Canada for 2024: BNC CataList - Tech Forum 2024Transcript: New from BookNet Canada for 2024: BNC CataList - Tech Forum 2024
Transcript: New from BookNet Canada for 2024: BNC CataList - Tech Forum 2024BookNet Canada
 
The Role of FIDO in a Cyber Secure Netherlands: FIDO Paris Seminar.pptx
The Role of FIDO in a Cyber Secure Netherlands: FIDO Paris Seminar.pptxThe Role of FIDO in a Cyber Secure Netherlands: FIDO Paris Seminar.pptx
The Role of FIDO in a Cyber Secure Netherlands: FIDO Paris Seminar.pptxLoriGlavin3
 
Advanced Computer Architecture – An Introduction
Advanced Computer Architecture – An IntroductionAdvanced Computer Architecture – An Introduction
Advanced Computer Architecture – An IntroductionDilum Bandara
 
How to write a Business Continuity Plan
How to write a Business Continuity PlanHow to write a Business Continuity Plan
How to write a Business Continuity PlanDatabarracks
 
SALESFORCE EDUCATION CLOUD | FEXLE SERVICES
SALESFORCE EDUCATION CLOUD | FEXLE SERVICESSALESFORCE EDUCATION CLOUD | FEXLE SERVICES
SALESFORCE EDUCATION CLOUD | FEXLE SERVICESmohitsingh558521
 
Generative AI for Technical Writer or Information Developers
Generative AI for Technical Writer or Information DevelopersGenerative AI for Technical Writer or Information Developers
Generative AI for Technical Writer or Information DevelopersRaghuram Pandurangan
 
Scanning the Internet for External Cloud Exposures via SSL Certs
Scanning the Internet for External Cloud Exposures via SSL CertsScanning the Internet for External Cloud Exposures via SSL Certs
Scanning the Internet for External Cloud Exposures via SSL CertsRizwan Syed
 
Gen AI in Business - Global Trends Report 2024.pdf
Gen AI in Business - Global Trends Report 2024.pdfGen AI in Business - Global Trends Report 2024.pdf
Gen AI in Business - Global Trends Report 2024.pdfAddepto
 
Dev Dives: Streamline document processing with UiPath Studio Web
Dev Dives: Streamline document processing with UiPath Studio WebDev Dives: Streamline document processing with UiPath Studio Web
Dev Dives: Streamline document processing with UiPath Studio WebUiPathCommunity
 
Unleash Your Potential - Namagunga Girls Coding Club
Unleash Your Potential - Namagunga Girls Coding ClubUnleash Your Potential - Namagunga Girls Coding Club
Unleash Your Potential - Namagunga Girls Coding ClubKalema Edgar
 
Are Multi-Cloud and Serverless Good or Bad?
Are Multi-Cloud and Serverless Good or Bad?Are Multi-Cloud and Serverless Good or Bad?
Are Multi-Cloud and Serverless Good or Bad?Mattias Andersson
 
Moving Beyond Passwords: FIDO Paris Seminar.pdf
Moving Beyond Passwords: FIDO Paris Seminar.pdfMoving Beyond Passwords: FIDO Paris Seminar.pdf
Moving Beyond Passwords: FIDO Paris Seminar.pdfLoriGlavin3
 
DevEX - reference for building teams, processes, and platforms
DevEX - reference for building teams, processes, and platformsDevEX - reference for building teams, processes, and platforms
DevEX - reference for building teams, processes, and platformsSergiu Bodiu
 
DSPy a system for AI to Write Prompts and Do Fine Tuning
DSPy a system for AI to Write Prompts and Do Fine TuningDSPy a system for AI to Write Prompts and Do Fine Tuning
DSPy a system for AI to Write Prompts and Do Fine TuningLars Bell
 
Unraveling Multimodality with Large Language Models.pdf
Unraveling Multimodality with Large Language Models.pdfUnraveling Multimodality with Large Language Models.pdf
Unraveling Multimodality with Large Language Models.pdfAlex Barbosa Coqueiro
 
unit 4 immunoblotting technique complete.pptx
unit 4 immunoblotting technique complete.pptxunit 4 immunoblotting technique complete.pptx
unit 4 immunoblotting technique complete.pptxBkGupta21
 
Passkey Providers and Enabling Portability: FIDO Paris Seminar.pptx
Passkey Providers and Enabling Portability: FIDO Paris Seminar.pptxPasskey Providers and Enabling Portability: FIDO Paris Seminar.pptx
Passkey Providers and Enabling Portability: FIDO Paris Seminar.pptxLoriGlavin3
 
DevoxxFR 2024 Reproducible Builds with Apache Maven
DevoxxFR 2024 Reproducible Builds with Apache MavenDevoxxFR 2024 Reproducible Builds with Apache Maven
DevoxxFR 2024 Reproducible Builds with Apache MavenHervé Boutemy
 

Recently uploaded (20)

Developer Data Modeling Mistakes: From Postgres to NoSQL
Developer Data Modeling Mistakes: From Postgres to NoSQLDeveloper Data Modeling Mistakes: From Postgres to NoSQL
Developer Data Modeling Mistakes: From Postgres to NoSQL
 
Transcript: New from BookNet Canada for 2024: BNC CataList - Tech Forum 2024
Transcript: New from BookNet Canada for 2024: BNC CataList - Tech Forum 2024Transcript: New from BookNet Canada for 2024: BNC CataList - Tech Forum 2024
Transcript: New from BookNet Canada for 2024: BNC CataList - Tech Forum 2024
 
The Role of FIDO in a Cyber Secure Netherlands: FIDO Paris Seminar.pptx
The Role of FIDO in a Cyber Secure Netherlands: FIDO Paris Seminar.pptxThe Role of FIDO in a Cyber Secure Netherlands: FIDO Paris Seminar.pptx
The Role of FIDO in a Cyber Secure Netherlands: FIDO Paris Seminar.pptx
 
Advanced Computer Architecture – An Introduction
Advanced Computer Architecture – An IntroductionAdvanced Computer Architecture – An Introduction
Advanced Computer Architecture – An Introduction
 
How to write a Business Continuity Plan
How to write a Business Continuity PlanHow to write a Business Continuity Plan
How to write a Business Continuity Plan
 
SALESFORCE EDUCATION CLOUD | FEXLE SERVICES
SALESFORCE EDUCATION CLOUD | FEXLE SERVICESSALESFORCE EDUCATION CLOUD | FEXLE SERVICES
SALESFORCE EDUCATION CLOUD | FEXLE SERVICES
 
Generative AI for Technical Writer or Information Developers
Generative AI for Technical Writer or Information DevelopersGenerative AI for Technical Writer or Information Developers
Generative AI for Technical Writer or Information Developers
 
Scanning the Internet for External Cloud Exposures via SSL Certs
Scanning the Internet for External Cloud Exposures via SSL CertsScanning the Internet for External Cloud Exposures via SSL Certs
Scanning the Internet for External Cloud Exposures via SSL Certs
 
DMCC Future of Trade Web3 - Special Edition
DMCC Future of Trade Web3 - Special EditionDMCC Future of Trade Web3 - Special Edition
DMCC Future of Trade Web3 - Special Edition
 
Gen AI in Business - Global Trends Report 2024.pdf
Gen AI in Business - Global Trends Report 2024.pdfGen AI in Business - Global Trends Report 2024.pdf
Gen AI in Business - Global Trends Report 2024.pdf
 
Dev Dives: Streamline document processing with UiPath Studio Web
Dev Dives: Streamline document processing with UiPath Studio WebDev Dives: Streamline document processing with UiPath Studio Web
Dev Dives: Streamline document processing with UiPath Studio Web
 
Unleash Your Potential - Namagunga Girls Coding Club
Unleash Your Potential - Namagunga Girls Coding ClubUnleash Your Potential - Namagunga Girls Coding Club
Unleash Your Potential - Namagunga Girls Coding Club
 
Are Multi-Cloud and Serverless Good or Bad?
Are Multi-Cloud and Serverless Good or Bad?Are Multi-Cloud and Serverless Good or Bad?
Are Multi-Cloud and Serverless Good or Bad?
 
Moving Beyond Passwords: FIDO Paris Seminar.pdf
Moving Beyond Passwords: FIDO Paris Seminar.pdfMoving Beyond Passwords: FIDO Paris Seminar.pdf
Moving Beyond Passwords: FIDO Paris Seminar.pdf
 
DevEX - reference for building teams, processes, and platforms
DevEX - reference for building teams, processes, and platformsDevEX - reference for building teams, processes, and platforms
DevEX - reference for building teams, processes, and platforms
 
DSPy a system for AI to Write Prompts and Do Fine Tuning
DSPy a system for AI to Write Prompts and Do Fine TuningDSPy a system for AI to Write Prompts and Do Fine Tuning
DSPy a system for AI to Write Prompts and Do Fine Tuning
 
Unraveling Multimodality with Large Language Models.pdf
Unraveling Multimodality with Large Language Models.pdfUnraveling Multimodality with Large Language Models.pdf
Unraveling Multimodality with Large Language Models.pdf
 
unit 4 immunoblotting technique complete.pptx
unit 4 immunoblotting technique complete.pptxunit 4 immunoblotting technique complete.pptx
unit 4 immunoblotting technique complete.pptx
 
Passkey Providers and Enabling Portability: FIDO Paris Seminar.pptx
Passkey Providers and Enabling Portability: FIDO Paris Seminar.pptxPasskey Providers and Enabling Portability: FIDO Paris Seminar.pptx
Passkey Providers and Enabling Portability: FIDO Paris Seminar.pptx
 
DevoxxFR 2024 Reproducible Builds with Apache Maven
DevoxxFR 2024 Reproducible Builds with Apache MavenDevoxxFR 2024 Reproducible Builds with Apache Maven
DevoxxFR 2024 Reproducible Builds with Apache Maven
 

Cloud security and adoption