SlideShare uma empresa Scribd logo
1 de 28
Baixar para ler offline
Security	
  &	
  Privacy	
  Issues	
  
                 in	
  
The	
  Hype	
  
“The interesting thing about cloud
  computing is that we’ve redefined cloud
  computing to include everything that we
  already do. I can’t think of anything that
  isn’t cloud computing with all of these
  announcements. The computer industry
  is the only industry that is more fashion-
  driven than women’s fashion. Maybe I’m
  an idiot, but I have no idea what anyone
  is talking about. What is it? It’s complete
  gibberish. It’s insane. When is this
  idiocy going to stop?”

Larry Ellison, CEO, Oracle      (WSJ 9/25/08)
Video	
  
Closer	
  to	
  Earth	
  
•  Let’s	
  presume	
  that	
  Cloud	
  Compu>ng	
  
   is	
  real.	
  	
  
•  What	
  is	
  it?	
  
•  Let’s	
  try	
  to	
  cut	
  through	
  the	
  
   hyperbole	
  and	
  define	
  Cloud	
  
   Compu>ng	
  and	
  see	
  what	
  it	
  has	
  to	
  
   offer	
  consumers	
  and	
  organiza>ons.	
  	
  
Example:	
  MicrosoK	
  
Sor>ng	
  things	
  out…	
  




                     U>lity	
  or	
  
                     Infrastructure	
  



                                          PlaMorm	
  
             SoKware	
  
Infrastructure	
  as	
  a	
  Service	
  
•  Amazon	
  sells	
  compu>ng	
  power	
  in	
  a	
  
   way	
  similar	
  to	
  how	
  we	
  get	
  electricity	
  
   from	
  the	
  power	
  company.	
  
•  Uses	
  a	
  pay-­‐as-­‐you-­‐go	
  model	
  for	
  
   offering	
  VM	
  instances,	
  compu>ng	
  
   power	
  and	
  storage	
  on	
  demand.	
  
PlaMorm	
  as	
  a	
  Service	
  
•  One	
  step	
  above	
  the	
  u>lity,	
  you	
  find	
  
   the	
  PaaS	
  providers,	
  like	
  Google	
  App	
  
   Engine,	
  Salesforce’	
  force.com,	
  and	
  
   the	
  recently	
  announced	
  MicrosoK	
  
   Azure	
  plaMorm.	
  	
  
•  Here	
  you	
  develop	
  apps	
  and	
  leverage	
  
   a	
  common	
  development	
  framework	
  
   and	
  plaMorm	
  for	
  delivery.	
  
SoKware	
  as	
  a	
  Service	
  
•  SoKware	
  as	
  a	
  Service	
  (SaaS)	
  is	
  what	
  
   most	
  people	
  are	
  familiar	
  with.	
  This	
  is	
  
   where	
  many	
  of	
  the	
  common	
  Web	
  2.0	
  
   applica>ons	
  are,	
  like:	
  Flickr,	
  Gmail,	
  
   Google	
  Apps,	
  Facebook,	
  TwiZer....	
  
•  There	
  are	
  also	
  enterprise	
  
   applica>ons,	
  such	
  as	
  SAP,	
  Oracle,	
  
   MicrosoK	
  and	
  others	
  aZemp>ng	
  to	
  
   gain	
  market	
  share	
  here.	
  
Terminology	
  
•  Let’s	
  face	
  it,	
  the	
  use	
  of	
  all	
  these	
  
   acronyms	
  can	
  get	
  confusing!	
  
•  SOA	
  and	
  SaaS	
  oKen	
  get	
  confused.	
  
•  The	
  u>lity	
  and	
  plaMorm	
  services	
  are	
  
   oKen	
  called	
  nothing	
  more	
  than	
  the	
  
   evolu>on	
  of	
  third-­‐party	
  hos>ng	
  
   services	
  that	
  companies	
  have	
  used	
  for	
  
   years.	
  	
  
•  There	
  are	
  good	
  reasons	
  these	
  
   assump>ons	
  are	
  incorrect.	
  
SOA	
  is	
  dead…?	
  
“SOA met its demise on January 1, 2009, when it was
  wiped out by the catastrophic impact of the economic
  recession. SOA is survived by its offspring: mashups,
  BPM, SaaS, Cloud Computing, and all other
  architectural approaches that depend on “services.”
  Manes’ real point, to quote her is that “we should not be
  talking about an architectural concept that has no
  universally accepted definition and an indefensible
  value proposition. Instead we should be talking about
  concrete things (like services) and concrete
  architectural practices (like application portfolio
  management) that deliver real value to the business.”


Anne Thomas Manes, Burton Group
Consumers	
  
•  Cloud	
  Compu>ng	
  is	
  a	
  new	
  name	
  for	
  things	
  
   consumers	
  are	
  already	
  doing.	
  
•  Consumers	
  are	
  >red	
  of	
  being	
  IT	
  techs.	
  
•  Consumers	
  want	
  to	
  DO	
  things	
  online,	
  and	
  	
  
   have	
  the	
  	
  Internet	
  cloud	
   I	
  don’t	
  care	
  
   be	
  as	
                                 what’s	
  up	
  
                                            there,	
  as	
  long	
  
   simple	
  as	
                           as	
  it	
  WORKS!	
  
   Cable	
  TV.	
  
The	
  Business	
  Case	
  
•    Cost	
  Savings	
  from	
  economies	
  of	
  scale	
  
•    Scalability	
  
•    Elas>city	
  
•    Reliability	
  
•    (and	
  in	
  some	
  cases,	
  they	
  enjoy	
  a	
  
     transfer	
  of	
  liability	
  by	
  outsourcing	
  
     services)	
  
2007




       Source: www.cio.com/article/print/
       109706
Source: www.cio.com/article/print/
109706
Where	
  does	
  it	
  make	
  sense?	
  
•  Start-­‐ups	
  
•  Apps	
  that	
  are	
  not	
  processing	
  key	
  
   data	
  
•  Apps	
  that	
  benefit	
  greatly	
  from	
  
   economies	
  of	
  scale,	
  and	
  that	
  require	
  
   high	
  availability	
  and	
  DRP	
  
•  Apps	
  that	
  need	
  periodic,	
  huge	
  
   capacity	
  or	
  CPU	
  processing	
  
Where	
  does	
  it	
  not	
  make	
  sense?	
  
•  Key	
  apps	
  that	
  are	
  earning	
  your	
  bread	
  
   and	
  buZer	
  
•  Apps	
  that	
  touch	
  personal	
  data	
  or	
  
   process	
  high-­‐value/consumer	
  
   transac>ons	
  should	
  be	
  considered	
  
   carefully	
  
•  Most	
  cloud	
  compu>ng	
  works	
  well	
  for	
  
   highly	
  paralell,	
  but	
  not	
  serial	
  apps	
  
On-­‐site	
  vs.	
  Off-­‐site	
  
•  PaaS	
  can	
  be	
  hosted	
  at	
  your	
  data	
  center,	
  
   outsourced,	
  or	
  hosted	
  in	
  a	
  hybrid	
  environment	
  
   like	
  this	
  example.	
             Source: cohesiveft.com/vpncubed
Concern	
  in	
  the	
  Cloud	
  
•    Security	
  
•    Control	
  
•    Performance	
  
•    Support	
  
•    Vendor	
  Lock-­‐In	
  
•    Speed	
  of	
  Scaling	
  
•    Configurability	
  
Security	
  Concerns	
  
•  CIA	
  +	
  Privacy	
  
•  Can	
  you	
  extend	
  your	
  policies	
  to	
  the	
  
   cloud?	
  
•  Regulatory	
  compliance	
  
•  Managing	
  data	
  on	
  shared	
  systems	
  
•  Forensics	
  
•  Audi>ng	
  
•  Segrega>on	
  of	
  data	
  
•  Portability	
  &	
  Interoperability	
  
•  Reliability	
  &	
  Manageability	
  
In	
  The	
  News	
  
•  Monster.com Breach May Preface
   Targeted Attacks
•  Salesforce.com Admits

   Data Loss
•  Millions of Gmail

   Users Left in the

   Lurch
•  Gmail is down,

   down, down
More…	
  
•  United	
  Airlines	
  Flight	
  Opera>ons	
  
   Computer	
  System	
  Failure	
  
•  San	
  Francisco	
  Power	
  Grid	
  Failure	
  
•  PayPal	
  Subscrip>on	
  Processing	
  Fails	
  
•  Skype	
  Down	
  for	
  Days	
  
•  LAX	
  TSA	
  Screening	
  System	
  Failure	
  
   	
  
•  What	
  if	
  Google	
  were	
  to	
  disappear	
  for	
  a	
  
   few	
  days?	
  Or,	
  Facebook?	
  Yahoo?	
  
Compliance	
  in	
  the	
  Cloud	
  
•  Let	
  me	
  just	
  list	
  some	
  common	
  U.S.	
  
   regula>ons	
  and	
  speak	
  to	
  them:	
  
            •  PCI	
  
            •  SOX	
  
            •  HIPAA	
  
            •  GLB	
  
            •  California	
  Breach	
  Law	
  (SB1386)	
  
Future	
  Trends	
  
•  The	
  Web	
  as	
  a	
  Par>cipatory	
  Worldwide	
  
   Communica>ons	
  Media	
  (Wikipedia,	
  
   Facebook,	
  YouTube…)	
  
•  The	
  Need	
  to	
  Use	
  Less	
  Energy	
  
•  Innova>on	
  Impera>ve	
  
•  Quest	
  for	
  Simplicity	
  	
  
•  Structure	
  Out	
  of	
  Chaos	
  



          Source: www.cio.com/article/438371/
          Cloud_Computing_Hype_Versus_Reality
Grinch	
  in	
  the	
  Cloud	
  
•  The	
  Grinch:	
  It	
  came	
  without	
  segrega>on.	
  It	
  came	
  without	
  
   recovery	
  goals.	
  It	
  came	
  without	
  adequate	
  physical,	
  logical,	
  or	
  
   personnel	
  access	
  controls.	
  It	
  could	
  have	
  been	
  high,	
  it	
  could	
  
   have	
  been	
  low,	
  I	
  just	
  have	
  no	
  clue	
  where	
  the	
  data	
  may	
  flow!	
  
•  Narrator:	
  Then	
  the	
  Grinch	
  thought	
  of	
  something	
  he	
  hadn't	
  
   before.	
  	
  
•  The	
  Grinch:	
  Maybe	
  the	
  perfect	
  solu>on	
  doesn't	
  	
  
   come	
  from	
  a	
  store.	
  Maybe	
  solving	
  business	
  
   problems	
  securely...	
  	
  
•  Narrator:	
  He	
  thought	
  	
  
•  The	
  Grinch:	
  ...means	
  a	
  liZle	
  bit	
  more.	
  	
  
   	
  
Useful	
  Resources	
  
•  World	
  Privacy	
  Forum,	
  
   www.worldprivacyforum.org	
  
•  Security	
  Monks	
  Blog,	
  
   hZp://blog.securitymonks.com/2009/01/25/
   recent-­‐cloud-­‐pos>ngs/	
  
•  Ra>onal	
  Survivability	
  Blog,	
  
   hZp://ra>onalsecurity.typepad.com/	
  

Mais conteúdo relacionado

Mais procurados

SOME SECURITY CHALLENGES IN CLOUD COMPUTING
SOME SECURITY CHALLENGES  IN CLOUD COMPUTINGSOME SECURITY CHALLENGES  IN CLOUD COMPUTING
SOME SECURITY CHALLENGES IN CLOUD COMPUTING
Hoang Nguyen
 
Cloud computing security & forensics (manu)
Cloud computing security & forensics (manu)Cloud computing security & forensics (manu)
Cloud computing security & forensics (manu)
ClubHack
 
Cloud computing security from single to multi clouds
Cloud computing security from single to multi cloudsCloud computing security from single to multi clouds
Cloud computing security from single to multi clouds
Cholavaram Sai
 
Cloud Computing Security Issues in Infrastructure as a Service”
Cloud Computing Security Issues in Infrastructure as a Service”Cloud Computing Security Issues in Infrastructure as a Service”
Cloud Computing Security Issues in Infrastructure as a Service”
Vivek Maurya
 

Mais procurados (20)

Security in cloud computing
Security in cloud computingSecurity in cloud computing
Security in cloud computing
 
Cloud computing security and privacy
Cloud computing security and privacyCloud computing security and privacy
Cloud computing security and privacy
 
Authentication cloud
Authentication cloudAuthentication cloud
Authentication cloud
 
Cloud Computing & Security Concerns
Cloud Computing & Security ConcernsCloud Computing & Security Concerns
Cloud Computing & Security Concerns
 
Cloud security
Cloud security Cloud security
Cloud security
 
Cloud computing security from single to multiple
Cloud computing security from single to multipleCloud computing security from single to multiple
Cloud computing security from single to multiple
 
security Issues of cloud computing
security Issues of cloud computingsecurity Issues of cloud computing
security Issues of cloud computing
 
SOME SECURITY CHALLENGES IN CLOUD COMPUTING
SOME SECURITY CHALLENGES  IN CLOUD COMPUTINGSOME SECURITY CHALLENGES  IN CLOUD COMPUTING
SOME SECURITY CHALLENGES IN CLOUD COMPUTING
 
Security & privacy challenges in cloud computing
Security & privacy challenges in cloud computingSecurity & privacy challenges in cloud computing
Security & privacy challenges in cloud computing
 
Cloud computing security & forensics (manu)
Cloud computing security & forensics (manu)Cloud computing security & forensics (manu)
Cloud computing security & forensics (manu)
 
Cloud computing security from single to multi clouds
Cloud computing security from single to multi cloudsCloud computing security from single to multi clouds
Cloud computing security from single to multi clouds
 
Cloud computing security
Cloud computing securityCloud computing security
Cloud computing security
 
Cloud computing security
Cloud computing security Cloud computing security
Cloud computing security
 
Cloud computing security issues and challenges
Cloud computing security issues and challengesCloud computing security issues and challenges
Cloud computing security issues and challenges
 
Security Issues of Cloud Computing
Security Issues of Cloud ComputingSecurity Issues of Cloud Computing
Security Issues of Cloud Computing
 
Cloud Computing Security Issues in Infrastructure as a Service”
Cloud Computing Security Issues in Infrastructure as a Service”Cloud Computing Security Issues in Infrastructure as a Service”
Cloud Computing Security Issues in Infrastructure as a Service”
 
On technical security issues in cloud computing
On technical security issues in cloud computingOn technical security issues in cloud computing
On technical security issues in cloud computing
 
Cloud Security And Privacy
Cloud Security And PrivacyCloud Security And Privacy
Cloud Security And Privacy
 
Cloud Computing - Security Benefits and Risks
Cloud Computing - Security Benefits and RisksCloud Computing - Security Benefits and Risks
Cloud Computing - Security Benefits and Risks
 
Cloud Computing security issues
Cloud Computing security issuesCloud Computing security issues
Cloud Computing security issues
 

Destaque

Journey to the cloud
Journey to the cloudJourney to the cloud
Journey to the cloud
Chris Avis
 
soCloud: distributed multi-cloud platform for deploying, executing and managi...
soCloud: distributed multi-cloud platform for deploying, executing and managi...soCloud: distributed multi-cloud platform for deploying, executing and managi...
soCloud: distributed multi-cloud platform for deploying, executing and managi...
Fawaz Fernand PARAISO
 

Destaque (19)

Security & Privacy In Cloud Computing
Security & Privacy In Cloud ComputingSecurity & Privacy In Cloud Computing
Security & Privacy In Cloud Computing
 
Cloud security ppt
Cloud security pptCloud security ppt
Cloud security ppt
 
Lessons Learned from an early Multi-Cloud journey
Lessons Learned from an early Multi-Cloud journeyLessons Learned from an early Multi-Cloud journey
Lessons Learned from an early Multi-Cloud journey
 
Journey to the cloud
Journey to the cloudJourney to the cloud
Journey to the cloud
 
Data Centre Evolution: Securing Your Journey to the Cloud
Data Centre Evolution: Securing Your Journey to the CloudData Centre Evolution: Securing Your Journey to the Cloud
Data Centre Evolution: Securing Your Journey to the Cloud
 
soCloud: distributed multi-cloud platform for deploying, executing and managi...
soCloud: distributed multi-cloud platform for deploying, executing and managi...soCloud: distributed multi-cloud platform for deploying, executing and managi...
soCloud: distributed multi-cloud platform for deploying, executing and managi...
 
Cloud Computing : Top to Bottom
Cloud Computing : Top to BottomCloud Computing : Top to Bottom
Cloud Computing : Top to Bottom
 
Security and Privacy in Cloud Computing - a High-level view
Security and Privacy in Cloud Computing - a High-level viewSecurity and Privacy in Cloud Computing - a High-level view
Security and Privacy in Cloud Computing - a High-level view
 
C-SEC|2016 Session 3 How to pass and get certify on the new cyber/cloud secur...
C-SEC|2016 Session 3 How to pass and get certify on the new cyber/cloud secur...C-SEC|2016 Session 3 How to pass and get certify on the new cyber/cloud secur...
C-SEC|2016 Session 3 How to pass and get certify on the new cyber/cloud secur...
 
Standing on the clouds
Standing on the cloudsStanding on the clouds
Standing on the clouds
 
Philip Hung Cao - Cloud security, the journey has begun
Philip Hung Cao - Cloud security, the journey has begunPhilip Hung Cao - Cloud security, the journey has begun
Philip Hung Cao - Cloud security, the journey has begun
 
Cloud Security & Privacy Standard Slide
Cloud Security & Privacy Standard SlideCloud Security & Privacy Standard Slide
Cloud Security & Privacy Standard Slide
 
How Privacy in the Cloud Affects End-Users
How Privacy in the Cloud Affects End-UsersHow Privacy in the Cloud Affects End-Users
How Privacy in the Cloud Affects End-Users
 
Journey to the Cloud, Hype or Opportunity
Journey to the Cloud, Hype or OpportunityJourney to the Cloud, Hype or Opportunity
Journey to the Cloud, Hype or Opportunity
 
Dimension Data – Enabling the Journey to the Cloud: Real Examples
Dimension Data – Enabling the Journey to the Cloud: Real ExamplesDimension Data – Enabling the Journey to the Cloud: Real Examples
Dimension Data – Enabling the Journey to the Cloud: Real Examples
 
الحوسبة السحابية في بيئة المكتبات / إعداد محمد عبدالحميد معوض
الحوسبة السحابية في بيئة المكتبات / إعداد محمد عبدالحميد معوضالحوسبة السحابية في بيئة المكتبات / إعداد محمد عبدالحميد معوض
الحوسبة السحابية في بيئة المكتبات / إعداد محمد عبدالحميد معوض
 
محاضرة الحوسبة السحابية لـ د.هبة كردي @SCSWomen #تقنيةوتواصل
محاضرة الحوسبة السحابية لـ د.هبة كردي @SCSWomen #تقنيةوتواصلمحاضرة الحوسبة السحابية لـ د.هبة كردي @SCSWomen #تقنيةوتواصل
محاضرة الحوسبة السحابية لـ د.هبة كردي @SCSWomen #تقنيةوتواصل
 
الدرس الرابع : خدمات الحوسبة السحابية
الدرس الرابع : خدمات الحوسبة السحابيةالدرس الرابع : خدمات الحوسبة السحابية
الدرس الرابع : خدمات الحوسبة السحابية
 
التقرير الحوسبة السحابيه-
التقرير  الحوسبة السحابيه-التقرير  الحوسبة السحابيه-
التقرير الحوسبة السحابيه-
 

Semelhante a Security & Privacy in Cloud Computing

Cloud computing and zuora
Cloud computing and zuoraCloud computing and zuora
Cloud computing and zuora
rmoyal
 
Trends in recent technology
Trends in recent technologyTrends in recent technology
Trends in recent technology
sai krishna
 
Agora2013 Yugo Neumorni
Agora2013 Yugo NeumorniAgora2013 Yugo Neumorni
Agora2013 Yugo Neumorni
Agora Group
 
Cloud computing.pptx
Cloud computing.pptxCloud computing.pptx
Cloud computing.pptx
andrewbourget
 
cloud session uklug
cloud session uklugcloud session uklug
cloud session uklug
dominion
 

Semelhante a Security & Privacy in Cloud Computing (20)

Cloud computing and zuora
Cloud computing and zuoraCloud computing and zuora
Cloud computing and zuora
 
Getting Started in the Nonprofit Cloud
Getting Started in the Nonprofit CloudGetting Started in the Nonprofit Cloud
Getting Started in the Nonprofit Cloud
 
Lecture 6 cloud
Lecture 6   cloudLecture 6   cloud
Lecture 6 cloud
 
Enabling Cloud Computing
Enabling Cloud ComputingEnabling Cloud Computing
Enabling Cloud Computing
 
Trends in recent technology
Trends in recent technologyTrends in recent technology
Trends in recent technology
 
Cloud Computing Contracts and Services: What's Really Happening Out There? T...
Cloud Computing Contracts and Services:  What's Really Happening Out There? T...Cloud Computing Contracts and Services:  What's Really Happening Out There? T...
Cloud Computing Contracts and Services: What's Really Happening Out There? T...
 
Navigating through the Cloud - 7 feb 2012 at Institute for Information Manage...
Navigating through the Cloud - 7 feb 2012 at Institute for Information Manage...Navigating through the Cloud - 7 feb 2012 at Institute for Information Manage...
Navigating through the Cloud - 7 feb 2012 at Institute for Information Manage...
 
Cloud Computing Overview
Cloud Computing OverviewCloud Computing Overview
Cloud Computing Overview
 
The cyber security hype cycle is upon us
The cyber security hype cycle is upon usThe cyber security hype cycle is upon us
The cyber security hype cycle is upon us
 
Agora2013 Yugo Neumorni
Agora2013 Yugo NeumorniAgora2013 Yugo Neumorni
Agora2013 Yugo Neumorni
 
Cloud computing: identifying and managing legal risks
Cloud computing: identifying and managing legal risksCloud computing: identifying and managing legal risks
Cloud computing: identifying and managing legal risks
 
cloud computing Architecture in Details.ppt
cloud computing Architecture in Details.pptcloud computing Architecture in Details.ppt
cloud computing Architecture in Details.ppt
 
Tech essentials for Product managers
Tech essentials for Product managersTech essentials for Product managers
Tech essentials for Product managers
 
Cloud Security - Cloud Arena - Tim Willoughby
Cloud Security - Cloud Arena - Tim WilloughbyCloud Security - Cloud Arena - Tim Willoughby
Cloud Security - Cloud Arena - Tim Willoughby
 
Cloud computing.pptx
Cloud computing.pptxCloud computing.pptx
Cloud computing.pptx
 
Cloud storage & cloud computing
Cloud storage & cloud computingCloud storage & cloud computing
Cloud storage & cloud computing
 
Cloud Computing 101
Cloud Computing 101Cloud Computing 101
Cloud Computing 101
 
The Cloud Imperative – What, Why, When and How
The Cloud Imperative – What, Why, When and HowThe Cloud Imperative – What, Why, When and How
The Cloud Imperative – What, Why, When and How
 
cloud session uklug
cloud session uklugcloud session uklug
cloud session uklug
 
Intro to Cloud Computing
Intro to Cloud ComputingIntro to Cloud Computing
Intro to Cloud Computing
 

Mais de John D. Johnson

Mais de John D. Johnson (14)

Security & Privacy Considerations for Advancing Technology
Security & Privacy Considerations for Advancing TechnologySecurity & Privacy Considerations for Advancing Technology
Security & Privacy Considerations for Advancing Technology
 
IoT and the industrial Internet of Things - june 20 2019
IoT and the industrial Internet of Things - june 20 2019IoT and the industrial Internet of Things - june 20 2019
IoT and the industrial Internet of Things - june 20 2019
 
All The Things: Security, Privacy & Safety in a World of Connected Devices
All The Things: Security, Privacy & Safety in a World of Connected DevicesAll The Things: Security, Privacy & Safety in a World of Connected Devices
All The Things: Security, Privacy & Safety in a World of Connected Devices
 
Fundamentals of Light and Matter
Fundamentals of Light and MatterFundamentals of Light and Matter
Fundamentals of Light and Matter
 
CERIAS Symposium: John Johnson, Future of Cybersecurity 2050
CERIAS Symposium: John Johnson, Future of Cybersecurity 2050CERIAS Symposium: John Johnson, Future of Cybersecurity 2050
CERIAS Symposium: John Johnson, Future of Cybersecurity 2050
 
Managing Enterprise Risk: Why U No Haz Metrics?
Managing Enterprise Risk: Why U No Haz Metrics?Managing Enterprise Risk: Why U No Haz Metrics?
Managing Enterprise Risk: Why U No Haz Metrics?
 
Presenting Metrics to the Executive Team
Presenting Metrics to the Executive TeamPresenting Metrics to the Executive Team
Presenting Metrics to the Executive Team
 
Big Data: Big Deal or Big Brother?
Big Data: Big Deal or Big Brother?Big Data: Big Deal or Big Brother?
Big Data: Big Deal or Big Brother?
 
The Journey to Cyber Resilience in a World of Fear, Uncertainty and Doubt
The Journey to Cyber Resilience in a World of Fear, Uncertainty and DoubtThe Journey to Cyber Resilience in a World of Fear, Uncertainty and Doubt
The Journey to Cyber Resilience in a World of Fear, Uncertainty and Doubt
 
Cyber Education ISACA 25 April 2017
Cyber Education ISACA 25 April 2017Cyber Education ISACA 25 April 2017
Cyber Education ISACA 25 April 2017
 
Discovering a Universe Beyond the Cosmic Shore
Discovering a Universe Beyond the Cosmic ShoreDiscovering a Universe Beyond the Cosmic Shore
Discovering a Universe Beyond the Cosmic Shore
 
AITP Presentation on Mobile Security
AITP Presentation on Mobile SecurityAITP Presentation on Mobile Security
AITP Presentation on Mobile Security
 
Mars Talk for IEEE
Mars Talk for IEEEMars Talk for IEEE
Mars Talk for IEEE
 
2011 SC Magazine Insider Threat Keynote
2011 SC Magazine Insider Threat Keynote2011 SC Magazine Insider Threat Keynote
2011 SC Magazine Insider Threat Keynote
 

Security & Privacy in Cloud Computing

  • 1. Security  &  Privacy  Issues   in  
  • 2. The  Hype   “The interesting thing about cloud computing is that we’ve redefined cloud computing to include everything that we already do. I can’t think of anything that isn’t cloud computing with all of these announcements. The computer industry is the only industry that is more fashion- driven than women’s fashion. Maybe I’m an idiot, but I have no idea what anyone is talking about. What is it? It’s complete gibberish. It’s insane. When is this idiocy going to stop?” Larry Ellison, CEO, Oracle (WSJ 9/25/08)
  • 4. Closer  to  Earth   •  Let’s  presume  that  Cloud  Compu>ng   is  real.     •  What  is  it?   •  Let’s  try  to  cut  through  the   hyperbole  and  define  Cloud   Compu>ng  and  see  what  it  has  to   offer  consumers  and  organiza>ons.    
  • 5.
  • 7. Sor>ng  things  out…   U>lity  or   Infrastructure   PlaMorm   SoKware  
  • 8. Infrastructure  as  a  Service   •  Amazon  sells  compu>ng  power  in  a   way  similar  to  how  we  get  electricity   from  the  power  company.   •  Uses  a  pay-­‐as-­‐you-­‐go  model  for   offering  VM  instances,  compu>ng   power  and  storage  on  demand.  
  • 9. PlaMorm  as  a  Service   •  One  step  above  the  u>lity,  you  find   the  PaaS  providers,  like  Google  App   Engine,  Salesforce’  force.com,  and   the  recently  announced  MicrosoK   Azure  plaMorm.     •  Here  you  develop  apps  and  leverage   a  common  development  framework   and  plaMorm  for  delivery.  
  • 10. SoKware  as  a  Service   •  SoKware  as  a  Service  (SaaS)  is  what   most  people  are  familiar  with.  This  is   where  many  of  the  common  Web  2.0   applica>ons  are,  like:  Flickr,  Gmail,   Google  Apps,  Facebook,  TwiZer....   •  There  are  also  enterprise   applica>ons,  such  as  SAP,  Oracle,   MicrosoK  and  others  aZemp>ng  to   gain  market  share  here.  
  • 11. Terminology   •  Let’s  face  it,  the  use  of  all  these   acronyms  can  get  confusing!   •  SOA  and  SaaS  oKen  get  confused.   •  The  u>lity  and  plaMorm  services  are   oKen  called  nothing  more  than  the   evolu>on  of  third-­‐party  hos>ng   services  that  companies  have  used  for   years.     •  There  are  good  reasons  these   assump>ons  are  incorrect.  
  • 12. SOA  is  dead…?   “SOA met its demise on January 1, 2009, when it was wiped out by the catastrophic impact of the economic recession. SOA is survived by its offspring: mashups, BPM, SaaS, Cloud Computing, and all other architectural approaches that depend on “services.” Manes’ real point, to quote her is that “we should not be talking about an architectural concept that has no universally accepted definition and an indefensible value proposition. Instead we should be talking about concrete things (like services) and concrete architectural practices (like application portfolio management) that deliver real value to the business.” Anne Thomas Manes, Burton Group
  • 13. Consumers   •  Cloud  Compu>ng  is  a  new  name  for  things   consumers  are  already  doing.   •  Consumers  are  >red  of  being  IT  techs.   •  Consumers  want  to  DO  things  online,  and     have  the    Internet  cloud   I  don’t  care   be  as   what’s  up   there,  as  long   simple  as   as  it  WORKS!   Cable  TV.  
  • 14. The  Business  Case   •  Cost  Savings  from  economies  of  scale   •  Scalability   •  Elas>city   •  Reliability   •  (and  in  some  cases,  they  enjoy  a   transfer  of  liability  by  outsourcing   services)  
  • 15. 2007 Source: www.cio.com/article/print/ 109706
  • 17. Where  does  it  make  sense?   •  Start-­‐ups   •  Apps  that  are  not  processing  key   data   •  Apps  that  benefit  greatly  from   economies  of  scale,  and  that  require   high  availability  and  DRP   •  Apps  that  need  periodic,  huge   capacity  or  CPU  processing  
  • 18.
  • 19. Where  does  it  not  make  sense?   •  Key  apps  that  are  earning  your  bread   and  buZer   •  Apps  that  touch  personal  data  or   process  high-­‐value/consumer   transac>ons  should  be  considered   carefully   •  Most  cloud  compu>ng  works  well  for   highly  paralell,  but  not  serial  apps  
  • 20. On-­‐site  vs.  Off-­‐site   •  PaaS  can  be  hosted  at  your  data  center,   outsourced,  or  hosted  in  a  hybrid  environment   like  this  example.   Source: cohesiveft.com/vpncubed
  • 21. Concern  in  the  Cloud   •  Security   •  Control   •  Performance   •  Support   •  Vendor  Lock-­‐In   •  Speed  of  Scaling   •  Configurability  
  • 22. Security  Concerns   •  CIA  +  Privacy   •  Can  you  extend  your  policies  to  the   cloud?   •  Regulatory  compliance   •  Managing  data  on  shared  systems   •  Forensics   •  Audi>ng   •  Segrega>on  of  data   •  Portability  &  Interoperability   •  Reliability  &  Manageability  
  • 23. In  The  News   •  Monster.com Breach May Preface Targeted Attacks •  Salesforce.com Admits
 Data Loss •  Millions of Gmail
 Users Left in the
 Lurch •  Gmail is down,
 down, down
  • 24. More…   •  United  Airlines  Flight  Opera>ons   Computer  System  Failure   •  San  Francisco  Power  Grid  Failure   •  PayPal  Subscrip>on  Processing  Fails   •  Skype  Down  for  Days   •  LAX  TSA  Screening  System  Failure     •  What  if  Google  were  to  disappear  for  a   few  days?  Or,  Facebook?  Yahoo?  
  • 25. Compliance  in  the  Cloud   •  Let  me  just  list  some  common  U.S.   regula>ons  and  speak  to  them:   •  PCI   •  SOX   •  HIPAA   •  GLB   •  California  Breach  Law  (SB1386)  
  • 26. Future  Trends   •  The  Web  as  a  Par>cipatory  Worldwide   Communica>ons  Media  (Wikipedia,   Facebook,  YouTube…)   •  The  Need  to  Use  Less  Energy   •  Innova>on  Impera>ve   •  Quest  for  Simplicity     •  Structure  Out  of  Chaos   Source: www.cio.com/article/438371/ Cloud_Computing_Hype_Versus_Reality
  • 27. Grinch  in  the  Cloud   •  The  Grinch:  It  came  without  segrega>on.  It  came  without   recovery  goals.  It  came  without  adequate  physical,  logical,  or   personnel  access  controls.  It  could  have  been  high,  it  could   have  been  low,  I  just  have  no  clue  where  the  data  may  flow!   •  Narrator:  Then  the  Grinch  thought  of  something  he  hadn't   before.     •  The  Grinch:  Maybe  the  perfect  solu>on  doesn't     come  from  a  store.  Maybe  solving  business   problems  securely...     •  Narrator:  He  thought     •  The  Grinch:  ...means  a  liZle  bit  more.      
  • 28. Useful  Resources   •  World  Privacy  Forum,   www.worldprivacyforum.org   •  Security  Monks  Blog,   hZp://blog.securitymonks.com/2009/01/25/ recent-­‐cloud-­‐pos>ngs/   •  Ra>onal  Survivability  Blog,   hZp://ra>onalsecurity.typepad.com/