SlideShare uma empresa Scribd logo
1 de 26
INFORMATION SECURITY
 WELCOME TO THE GROUP PRESENTATION
1
Topic Name and details
Mitigations to ensure the confidentiality, integrity and
availability of the data stored on these providers? Discuss
mitigations for both the cloud providers and also the end
users.
 Vaishal Shah(30129756)
 Kawalpreet Kaur(30116373)
 Vidit Darji(30309034)
 Gagandeep Kaur(30129485)
2
Introduction of Cloud Providers
 It is a firm which delivers cloud computing that relies
on services and solution to individuals and business. It
is also known as utility computing provider.
 Based on the business model. There are many
solutions
 Infrastructure as a Service(IAAS)
 Software as service(SAAS)
 Platform as service(PAAS)
3
What is Confidentiality, integrity,
availability
 is also known as CIA triad
 structure made to guide policies for information
security within an organization.
 Are considered to be crucial elements components of
society.
4
Confidentiality, integrity,
availability
 Confidentiality is a set of rules or procedures that
restricts the boundary to use or access to information.
 Integrity is the assurance that the information
gathered is trustworthy and reliable.
 Availability is a guarantee of accurate access to the
information by authorized people.
5
Dropbox, Google docs
 Dropbox is a cloud storage service, sometimes
referred to as an online backup service, that is
frequently used for file sharing and collaboration. It is
increasingly being used in enterprises.
 This service is as a warehouse used by government
organizations, banks, post offices, video stores and
libraries to allow people to drop items.
6
Diagrammatical representation of
Dropbox, Google Drive
7
Figures about Dropbox, Google
Drive
8
Problems or Issues related to ensure Confidentiality,
Availability, Integrity by cloud providers
 Malicious behaviour of insiders.
 Incomplete or insecure data completion.
 Management interface vulnerability.
9
Issues contd.
 Loss of Governance.
 Isolation of failure.
 Compliance and legal risks.
10
Mitigations to ensure confidentiality, integrity and
availability of cloud providers
 The cloud is still new so
the push for effective
controls over the
protection of information
in the cloud is also
nascent. But every
problem comes with a
solution so there are
fewer security solutions
for the cloud providers
than there are for securing
physical devices in a
traditional infrastructure.
 CIA Triad
11
Confidentiality
 Data encryption
 User IDs and passwords
 Biometric verification and security tokens, key fobs
and soft tokens.
 Data confidentiality may involve special training for
those privy to such documents
 Storing Information only on air gapped computers,
disconnected storage devices or, for highly sensitive
information, in hard copy form only
12
Integrity
 Maintaining consistency, accuracy and trustworthiness
 Ensuring data from unauthorized access
 EMP(electromagnetic pulse) or server crash.
 Some data might include checksums,
even cryptographic checksums for verification of
integrity.
 Back ups or redundancies must be available to restore
the affected data to its correct state.
13
Availability
 Maintaining all hardware, performing hardware
repairs
 Providing adequate communication bandwidth
 Preventing occurrence of bottlenecks
 Back up copy must be stored in a geographically
isolated location
 Use of firewalls and proxy servers
 Fast and adaptive disaster recovery
14
Mitigations Cont..
 Cloud Access Security Brokers(CASBs) : Niche
market has been trying to reduce the severity of
information shared on cloud providers so this market
came up with Cloud Access Security
Brokers(CASBs) defined as a strategy to mitigate this
problem.
 Context Awareness also allows the CASB providers to
employ heuristic analysis on Cloud bound traffic, to do
some form of anomaly detection to identify malicious
or erroneous traffic. This is an area that they are all
investing heavily in today.
15
Problems for cloud providers
 Data integrity
 Data theft
 Privacy issue
 Data loss
 Data location
16
Data integrity
 User can access the data from any where
 Lack of data integrity in cloud
Data Theft
 Cost affective and flexible for operation
 High possibility of data stolen from other user
17
ssue
 Make sure that customer’s private information secure
 Keep watching who is access the data
Data Loss
 Due to financial problem when vendor closes,
customer will loss data
 Customer can not be able to access the data because
vendor shut down
18
Data location
 Anyone don’t know the location of data
 Vendor not reveal the location of data
19
Mitigation of cloud providers
 Identify the assets
 Analyze the risk
 Apple security countermeasure
 Conduct post-run
20
Problems faced by users of cloud
services
 Privacy
 Security
 Data breaches
 Data protection
21
Mitigations for users of cloud services
• Privileged user Access
• Regulatory Compliance
• Data Location
• Demonstrable customer care
22
Mitigations Cont..
• Data Segregation
• Recovery
• Investigative support/Search ability
• Long-term viability
23
References https://www.techopedia.com/definition/133/cloud-
provider
 http://www.cloud-
council.org/Security_for_Cloud_Computing-
Final_080912.pdf
 https://www.google.com.au/search?q=image+of+dropbo
x,+google+docs
 http://www.slideshare.net/pcalcada/apresentao-cm-
1524115
 http://www.cloudcouncil.org/Security_for_Cloud_Comp
uting-Final_080912.pdf
 http://whatis.techtarget.com/definition/Confidentiality-
integrity-and-availability-CIA
24
ANY QUESTIONS
??????
25
THANK YOU
26

Mais conteúdo relacionado

Mais procurados

Basics of Information System Security
Basics of Information System SecurityBasics of Information System Security
Basics of Information System Securitychauhankapil
 
Information security and other issues
Information security and other issuesInformation security and other issues
Information security and other issuesHaseeb Ahmed Awan
 
INFORMATION SECURITY
INFORMATION SECURITYINFORMATION SECURITY
INFORMATION SECURITYAhmed Moussa
 
Data Governance Solutions With Seclore and Stash
Data Governance Solutions With Seclore and StashData Governance Solutions With Seclore and Stash
Data Governance Solutions With Seclore and StashSeclore
 
Information security
Information security Information security
Information security AishaIshaq4
 
Introduction to security
Introduction to securityIntroduction to security
Introduction to securityMukesh Chinta
 
Inbound Data Protection
Inbound Data ProtectionInbound Data Protection
Inbound Data ProtectionSeclore
 
Data security strategies and drivers
Data security strategies and driversData security strategies and drivers
Data security strategies and driversFreeform Dynamics
 
20100224 Presentation at RGIT Mumbai - Information Security Awareness
20100224 Presentation at RGIT Mumbai - Information Security Awareness20100224 Presentation at RGIT Mumbai - Information Security Awareness
20100224 Presentation at RGIT Mumbai - Information Security AwarenessDinesh O Bareja
 
Seclore: Information Rights Management
Seclore: Information Rights ManagementSeclore: Information Rights Management
Seclore: Information Rights ManagementRahul Neel Mani
 
Compliance regulations with Data Centric Security | Seclore
Compliance regulations with Data Centric Security | SecloreCompliance regulations with Data Centric Security | Seclore
Compliance regulations with Data Centric Security | SecloreSeclore
 
Customer Data Privacy & Protection | Seclore
Customer Data Privacy & Protection | SecloreCustomer Data Privacy & Protection | Seclore
Customer Data Privacy & Protection | SecloreSeclore
 
Benefits of automating data protection | Seclore
Benefits of automating data protection | SecloreBenefits of automating data protection | Seclore
Benefits of automating data protection | SecloreSeclore
 
Information Security and Privacy - Public Sector actions, policies and regula...
Information Security and Privacy - Public Sector actions, policies and regula...Information Security and Privacy - Public Sector actions, policies and regula...
Information Security and Privacy - Public Sector actions, policies and regula...The University of Texas (UTRGV)
 
Application Data Security | Seclore
Application Data Security | SecloreApplication Data Security | Seclore
Application Data Security | SecloreSeclore
 
Data Security For Insurance Solutions
Data Security For Insurance SolutionsData Security For Insurance Solutions
Data Security For Insurance SolutionsSeclore
 

Mais procurados (20)

Basics of Information System Security
Basics of Information System SecurityBasics of Information System Security
Basics of Information System Security
 
IT security
IT securityIT security
IT security
 
Information security
Information securityInformation security
Information security
 
Information security and other issues
Information security and other issuesInformation security and other issues
Information security and other issues
 
INFORMATION SECURITY
INFORMATION SECURITYINFORMATION SECURITY
INFORMATION SECURITY
 
Data Security
Data SecurityData Security
Data Security
 
Data Governance Solutions With Seclore and Stash
Data Governance Solutions With Seclore and StashData Governance Solutions With Seclore and Stash
Data Governance Solutions With Seclore and Stash
 
Information security
Information security Information security
Information security
 
Introduction to security
Introduction to securityIntroduction to security
Introduction to security
 
Inbound Data Protection
Inbound Data ProtectionInbound Data Protection
Inbound Data Protection
 
Data security strategies and drivers
Data security strategies and driversData security strategies and drivers
Data security strategies and drivers
 
20100224 Presentation at RGIT Mumbai - Information Security Awareness
20100224 Presentation at RGIT Mumbai - Information Security Awareness20100224 Presentation at RGIT Mumbai - Information Security Awareness
20100224 Presentation at RGIT Mumbai - Information Security Awareness
 
Data Security
Data SecurityData Security
Data Security
 
Seclore: Information Rights Management
Seclore: Information Rights ManagementSeclore: Information Rights Management
Seclore: Information Rights Management
 
Compliance regulations with Data Centric Security | Seclore
Compliance regulations with Data Centric Security | SecloreCompliance regulations with Data Centric Security | Seclore
Compliance regulations with Data Centric Security | Seclore
 
Customer Data Privacy & Protection | Seclore
Customer Data Privacy & Protection | SecloreCustomer Data Privacy & Protection | Seclore
Customer Data Privacy & Protection | Seclore
 
Benefits of automating data protection | Seclore
Benefits of automating data protection | SecloreBenefits of automating data protection | Seclore
Benefits of automating data protection | Seclore
 
Information Security and Privacy - Public Sector actions, policies and regula...
Information Security and Privacy - Public Sector actions, policies and regula...Information Security and Privacy - Public Sector actions, policies and regula...
Information Security and Privacy - Public Sector actions, policies and regula...
 
Application Data Security | Seclore
Application Data Security | SecloreApplication Data Security | Seclore
Application Data Security | Seclore
 
Data Security For Insurance Solutions
Data Security For Insurance SolutionsData Security For Insurance Solutions
Data Security For Insurance Solutions
 

Destaque

Introduction to Information Security
Introduction to Information SecurityIntroduction to Information Security
Introduction to Information SecurityDr. Loganathan R
 
Understanding High Availability - Introducing the Theory and Concepts of High...
Understanding High Availability - Introducing the Theory and Concepts of High...Understanding High Availability - Introducing the Theory and Concepts of High...
Understanding High Availability - Introducing the Theory and Concepts of High...Astute Systems
 
Introduction to Hacking
Introduction to HackingIntroduction to Hacking
Introduction to HackingRishabha Garg
 
InformationSecurity
InformationSecurityInformationSecurity
InformationSecuritylearnt
 
Information Security Management System ISO/IEC 27001:2005
Information Security Management System ISO/IEC 27001:2005Information Security Management System ISO/IEC 27001:2005
Information Security Management System ISO/IEC 27001:2005ControlCase
 

Destaque (9)

Introduction to Information Security
Introduction to Information SecurityIntroduction to Information Security
Introduction to Information Security
 
Availability and Business Resiliency Strategies
Availability and Business Resiliency StrategiesAvailability and Business Resiliency Strategies
Availability and Business Resiliency Strategies
 
Understanding High Availability - Introducing the Theory and Concepts of High...
Understanding High Availability - Introducing the Theory and Concepts of High...Understanding High Availability - Introducing the Theory and Concepts of High...
Understanding High Availability - Introducing the Theory and Concepts of High...
 
Introduction to Hacking
Introduction to HackingIntroduction to Hacking
Introduction to Hacking
 
Web Security
Web SecurityWeb Security
Web Security
 
Database Security
Database SecurityDatabase Security
Database Security
 
InformationSecurity
InformationSecurityInformationSecurity
InformationSecurity
 
Information Security and the SDLC
Information Security and the SDLCInformation Security and the SDLC
Information Security and the SDLC
 
Information Security Management System ISO/IEC 27001:2005
Information Security Management System ISO/IEC 27001:2005Information Security Management System ISO/IEC 27001:2005
Information Security Management System ISO/IEC 27001:2005
 

Semelhante a Mitigations for Ensuring CIA in Cloud Services

Information security group presentation
Information security group presentationInformation security group presentation
Information security group presentationvaishalshah01
 
Practical advice for cloud data protection ulf mattsson - oracle nyoug sep ...
Practical advice for cloud data protection   ulf mattsson - oracle nyoug sep ...Practical advice for cloud data protection   ulf mattsson - oracle nyoug sep ...
Practical advice for cloud data protection ulf mattsson - oracle nyoug sep ...Ulf Mattsson
 
Cloud Auditing With Zero Knowledge Privacy
Cloud Auditing With Zero Knowledge PrivacyCloud Auditing With Zero Knowledge Privacy
Cloud Auditing With Zero Knowledge PrivacyIJERA Editor
 
A proposed Solution: Data Availability and Error Correction in Cloud Computing
A proposed Solution: Data Availability and Error Correction in Cloud ComputingA proposed Solution: Data Availability and Error Correction in Cloud Computing
A proposed Solution: Data Availability and Error Correction in Cloud ComputingCSCJournals
 
Cloud data governance, risk management and compliance ny metro joint cyber...
Cloud data governance, risk management and compliance    ny metro joint cyber...Cloud data governance, risk management and compliance    ny metro joint cyber...
Cloud data governance, risk management and compliance ny metro joint cyber...Ulf Mattsson
 
A Survey on Different Techniques Used in Decentralized Cloud Computing
A Survey on Different Techniques Used in Decentralized Cloud ComputingA Survey on Different Techniques Used in Decentralized Cloud Computing
A Survey on Different Techniques Used in Decentralized Cloud ComputingEditor IJCATR
 
Data Privacy And Security Issues In Cloud Computing.pdf
Data Privacy And Security Issues In Cloud Computing.pdfData Privacy And Security Issues In Cloud Computing.pdf
Data Privacy And Security Issues In Cloud Computing.pdfCiente
 
Research Report on Preserving Data Confidentiality & Data Integrity in ...
Research Report on Preserving  Data  Confidentiality  &  Data  Integrity  in ...Research Report on Preserving  Data  Confidentiality  &  Data  Integrity  in ...
Research Report on Preserving Data Confidentiality & Data Integrity in ...Manish Sahani
 
Security and privacy in cloud computing.pptx
Security and privacy in cloud computing.pptxSecurity and privacy in cloud computing.pptx
Security and privacy in cloud computing.pptxTRSrinidi
 
Module 5-cloud computing-SECURITY IN THE CLOUD
Module 5-cloud computing-SECURITY IN THE CLOUDModule 5-cloud computing-SECURITY IN THE CLOUD
Module 5-cloud computing-SECURITY IN THE CLOUDSweta Kumari Barnwal
 
Securing sensitive data for the health care industry
Securing sensitive data for the health care industrySecuring sensitive data for the health care industry
Securing sensitive data for the health care industryCloudMask inc.
 
Encryption Technique for a Trusted Cloud Computing Environment
Encryption Technique for a Trusted Cloud Computing EnvironmentEncryption Technique for a Trusted Cloud Computing Environment
Encryption Technique for a Trusted Cloud Computing EnvironmentIOSR Journals
 
Encryption Technique for a Trusted Cloud Computing Environment
Encryption Technique for a Trusted Cloud Computing EnvironmentEncryption Technique for a Trusted Cloud Computing Environment
Encryption Technique for a Trusted Cloud Computing EnvironmentIOSR Journals
 
Encryption Technique for a Trusted Cloud Computing Environment
Encryption Technique for a Trusted Cloud Computing EnvironmentEncryption Technique for a Trusted Cloud Computing Environment
Encryption Technique for a Trusted Cloud Computing EnvironmentIOSR Journals
 
A study on security issues in cloud based e learning
A study on security issues in cloud based e learningA study on security issues in cloud based e learning
A study on security issues in cloud based e learningManimaran A
 
Data security in the cloud
Data security in the cloud Data security in the cloud
Data security in the cloud IBM Security
 
Altourage presents: Cloud Security
Altourage presents: Cloud SecurityAltourage presents: Cloud Security
Altourage presents: Cloud SecurityAltourage
 

Semelhante a Mitigations for Ensuring CIA in Cloud Services (20)

Information security group presentation
Information security group presentationInformation security group presentation
Information security group presentation
 
Practical advice for cloud data protection ulf mattsson - oracle nyoug sep ...
Practical advice for cloud data protection   ulf mattsson - oracle nyoug sep ...Practical advice for cloud data protection   ulf mattsson - oracle nyoug sep ...
Practical advice for cloud data protection ulf mattsson - oracle nyoug sep ...
 
Cloud Auditing With Zero Knowledge Privacy
Cloud Auditing With Zero Knowledge PrivacyCloud Auditing With Zero Knowledge Privacy
Cloud Auditing With Zero Knowledge Privacy
 
Turtles, Trust and The Future of Cybersecurity
Turtles, Trust and The Future of Cybersecurity Turtles, Trust and The Future of Cybersecurity
Turtles, Trust and The Future of Cybersecurity
 
A proposed Solution: Data Availability and Error Correction in Cloud Computing
A proposed Solution: Data Availability and Error Correction in Cloud ComputingA proposed Solution: Data Availability and Error Correction in Cloud Computing
A proposed Solution: Data Availability and Error Correction in Cloud Computing
 
Cloud data governance, risk management and compliance ny metro joint cyber...
Cloud data governance, risk management and compliance    ny metro joint cyber...Cloud data governance, risk management and compliance    ny metro joint cyber...
Cloud data governance, risk management and compliance ny metro joint cyber...
 
A Survey on Different Techniques Used in Decentralized Cloud Computing
A Survey on Different Techniques Used in Decentralized Cloud ComputingA Survey on Different Techniques Used in Decentralized Cloud Computing
A Survey on Different Techniques Used in Decentralized Cloud Computing
 
Data Privacy And Security Issues In Cloud Computing.pdf
Data Privacy And Security Issues In Cloud Computing.pdfData Privacy And Security Issues In Cloud Computing.pdf
Data Privacy And Security Issues In Cloud Computing.pdf
 
Research Report on Preserving Data Confidentiality & Data Integrity in ...
Research Report on Preserving  Data  Confidentiality  &  Data  Integrity  in ...Research Report on Preserving  Data  Confidentiality  &  Data  Integrity  in ...
Research Report on Preserving Data Confidentiality & Data Integrity in ...
 
Security and privacy in cloud computing.pptx
Security and privacy in cloud computing.pptxSecurity and privacy in cloud computing.pptx
Security and privacy in cloud computing.pptx
 
Module 5-cloud computing-SECURITY IN THE CLOUD
Module 5-cloud computing-SECURITY IN THE CLOUDModule 5-cloud computing-SECURITY IN THE CLOUD
Module 5-cloud computing-SECURITY IN THE CLOUD
 
Securing sensitive data for the health care industry
Securing sensitive data for the health care industrySecuring sensitive data for the health care industry
Securing sensitive data for the health care industry
 
Encryption Technique for a Trusted Cloud Computing Environment
Encryption Technique for a Trusted Cloud Computing EnvironmentEncryption Technique for a Trusted Cloud Computing Environment
Encryption Technique for a Trusted Cloud Computing Environment
 
Encryption Technique for a Trusted Cloud Computing Environment
Encryption Technique for a Trusted Cloud Computing EnvironmentEncryption Technique for a Trusted Cloud Computing Environment
Encryption Technique for a Trusted Cloud Computing Environment
 
H017155360
H017155360H017155360
H017155360
 
Encryption Technique for a Trusted Cloud Computing Environment
Encryption Technique for a Trusted Cloud Computing EnvironmentEncryption Technique for a Trusted Cloud Computing Environment
Encryption Technique for a Trusted Cloud Computing Environment
 
A study on security issues in cloud based e learning
A study on security issues in cloud based e learningA study on security issues in cloud based e learning
A study on security issues in cloud based e learning
 
Data security in the cloud
Data security in the cloud Data security in the cloud
Data security in the cloud
 
Altourage presents: Cloud Security
Altourage presents: Cloud SecurityAltourage presents: Cloud Security
Altourage presents: Cloud Security
 
Cloud security
Cloud securityCloud security
Cloud security
 

Mais de vaishalshah01

Mais de vaishalshah01 (9)

Erp slides
Erp slidesErp slides
Erp slides
 
Healthcare industry
Healthcare industryHealthcare industry
Healthcare industry
 
Supi ppt
Supi pptSupi ppt
Supi ppt
 
Cloud computing ppt
Cloud computing pptCloud computing ppt
Cloud computing ppt
 
Cloud computing ppt
Cloud computing pptCloud computing ppt
Cloud computing ppt
 
Cloud computing ppt
Cloud computing pptCloud computing ppt
Cloud computing ppt
 
Cloud computing ppt
Cloud computing pptCloud computing ppt
Cloud computing ppt
 
Cloud computing ppt
Cloud computing pptCloud computing ppt
Cloud computing ppt
 
Cloud computing report
Cloud computing reportCloud computing report
Cloud computing report
 

Último

USPS® Forced Meter Migration - How to Know if Your Postage Meter Will Soon be...
USPS® Forced Meter Migration - How to Know if Your Postage Meter Will Soon be...USPS® Forced Meter Migration - How to Know if Your Postage Meter Will Soon be...
USPS® Forced Meter Migration - How to Know if Your Postage Meter Will Soon be...Postal Advocate Inc.
 
GRADE 4 - SUMMATIVE TEST QUARTER 4 ALL SUBJECTS
GRADE 4 - SUMMATIVE TEST QUARTER 4 ALL SUBJECTSGRADE 4 - SUMMATIVE TEST QUARTER 4 ALL SUBJECTS
GRADE 4 - SUMMATIVE TEST QUARTER 4 ALL SUBJECTSJoshuaGantuangco2
 
Judging the Relevance and worth of ideas part 2.pptx
Judging the Relevance  and worth of ideas part 2.pptxJudging the Relevance  and worth of ideas part 2.pptx
Judging the Relevance and worth of ideas part 2.pptxSherlyMaeNeri
 
Influencing policy (training slides from Fast Track Impact)
Influencing policy (training slides from Fast Track Impact)Influencing policy (training slides from Fast Track Impact)
Influencing policy (training slides from Fast Track Impact)Mark Reed
 
Difference Between Search & Browse Methods in Odoo 17
Difference Between Search & Browse Methods in Odoo 17Difference Between Search & Browse Methods in Odoo 17
Difference Between Search & Browse Methods in Odoo 17Celine George
 
Barangay Council for the Protection of Children (BCPC) Orientation.pptx
Barangay Council for the Protection of Children (BCPC) Orientation.pptxBarangay Council for the Protection of Children (BCPC) Orientation.pptx
Barangay Council for the Protection of Children (BCPC) Orientation.pptxCarlos105
 
Incoming and Outgoing Shipments in 3 STEPS Using Odoo 17
Incoming and Outgoing Shipments in 3 STEPS Using Odoo 17Incoming and Outgoing Shipments in 3 STEPS Using Odoo 17
Incoming and Outgoing Shipments in 3 STEPS Using Odoo 17Celine George
 
Science 7 Quarter 4 Module 2: Natural Resources.pptx
Science 7 Quarter 4 Module 2: Natural Resources.pptxScience 7 Quarter 4 Module 2: Natural Resources.pptx
Science 7 Quarter 4 Module 2: Natural Resources.pptxMaryGraceBautista27
 
THEORIES OF ORGANIZATION-PUBLIC ADMINISTRATION
THEORIES OF ORGANIZATION-PUBLIC ADMINISTRATIONTHEORIES OF ORGANIZATION-PUBLIC ADMINISTRATION
THEORIES OF ORGANIZATION-PUBLIC ADMINISTRATIONHumphrey A Beña
 
4.16.24 21st Century Movements for Black Lives.pptx
4.16.24 21st Century Movements for Black Lives.pptx4.16.24 21st Century Movements for Black Lives.pptx
4.16.24 21st Century Movements for Black Lives.pptxmary850239
 
ECONOMIC CONTEXT - PAPER 1 Q3: NEWSPAPERS.pptx
ECONOMIC CONTEXT - PAPER 1 Q3: NEWSPAPERS.pptxECONOMIC CONTEXT - PAPER 1 Q3: NEWSPAPERS.pptx
ECONOMIC CONTEXT - PAPER 1 Q3: NEWSPAPERS.pptxiammrhaywood
 
Procuring digital preservation CAN be quick and painless with our new dynamic...
Procuring digital preservation CAN be quick and painless with our new dynamic...Procuring digital preservation CAN be quick and painless with our new dynamic...
Procuring digital preservation CAN be quick and painless with our new dynamic...Jisc
 
Student Profile Sample - We help schools to connect the data they have, with ...
Student Profile Sample - We help schools to connect the data they have, with ...Student Profile Sample - We help schools to connect the data they have, with ...
Student Profile Sample - We help schools to connect the data they have, with ...Seán Kennedy
 
Choosing the Right CBSE School A Comprehensive Guide for Parents
Choosing the Right CBSE School A Comprehensive Guide for ParentsChoosing the Right CBSE School A Comprehensive Guide for Parents
Choosing the Right CBSE School A Comprehensive Guide for Parentsnavabharathschool99
 
FILIPINO PSYCHology sikolohiyang pilipino
FILIPINO PSYCHology sikolohiyang pilipinoFILIPINO PSYCHology sikolohiyang pilipino
FILIPINO PSYCHology sikolohiyang pilipinojohnmickonozaleda
 
Global Lehigh Strategic Initiatives (without descriptions)
Global Lehigh Strategic Initiatives (without descriptions)Global Lehigh Strategic Initiatives (without descriptions)
Global Lehigh Strategic Initiatives (without descriptions)cama23
 
ENGLISH6-Q4-W3.pptxqurter our high choom
ENGLISH6-Q4-W3.pptxqurter our high choomENGLISH6-Q4-W3.pptxqurter our high choom
ENGLISH6-Q4-W3.pptxqurter our high choomnelietumpap1
 
Field Attribute Index Feature in Odoo 17
Field Attribute Index Feature in Odoo 17Field Attribute Index Feature in Odoo 17
Field Attribute Index Feature in Odoo 17Celine George
 
Concurrency Control in Database Management system
Concurrency Control in Database Management systemConcurrency Control in Database Management system
Concurrency Control in Database Management systemChristalin Nelson
 
call girls in Kamla Market (DELHI) 🔝 >༒9953330565🔝 genuine Escort Service 🔝✔️✔️
call girls in Kamla Market (DELHI) 🔝 >༒9953330565🔝 genuine Escort Service 🔝✔️✔️call girls in Kamla Market (DELHI) 🔝 >༒9953330565🔝 genuine Escort Service 🔝✔️✔️
call girls in Kamla Market (DELHI) 🔝 >༒9953330565🔝 genuine Escort Service 🔝✔️✔️9953056974 Low Rate Call Girls In Saket, Delhi NCR
 

Último (20)

USPS® Forced Meter Migration - How to Know if Your Postage Meter Will Soon be...
USPS® Forced Meter Migration - How to Know if Your Postage Meter Will Soon be...USPS® Forced Meter Migration - How to Know if Your Postage Meter Will Soon be...
USPS® Forced Meter Migration - How to Know if Your Postage Meter Will Soon be...
 
GRADE 4 - SUMMATIVE TEST QUARTER 4 ALL SUBJECTS
GRADE 4 - SUMMATIVE TEST QUARTER 4 ALL SUBJECTSGRADE 4 - SUMMATIVE TEST QUARTER 4 ALL SUBJECTS
GRADE 4 - SUMMATIVE TEST QUARTER 4 ALL SUBJECTS
 
Judging the Relevance and worth of ideas part 2.pptx
Judging the Relevance  and worth of ideas part 2.pptxJudging the Relevance  and worth of ideas part 2.pptx
Judging the Relevance and worth of ideas part 2.pptx
 
Influencing policy (training slides from Fast Track Impact)
Influencing policy (training slides from Fast Track Impact)Influencing policy (training slides from Fast Track Impact)
Influencing policy (training slides from Fast Track Impact)
 
Difference Between Search & Browse Methods in Odoo 17
Difference Between Search & Browse Methods in Odoo 17Difference Between Search & Browse Methods in Odoo 17
Difference Between Search & Browse Methods in Odoo 17
 
Barangay Council for the Protection of Children (BCPC) Orientation.pptx
Barangay Council for the Protection of Children (BCPC) Orientation.pptxBarangay Council for the Protection of Children (BCPC) Orientation.pptx
Barangay Council for the Protection of Children (BCPC) Orientation.pptx
 
Incoming and Outgoing Shipments in 3 STEPS Using Odoo 17
Incoming and Outgoing Shipments in 3 STEPS Using Odoo 17Incoming and Outgoing Shipments in 3 STEPS Using Odoo 17
Incoming and Outgoing Shipments in 3 STEPS Using Odoo 17
 
Science 7 Quarter 4 Module 2: Natural Resources.pptx
Science 7 Quarter 4 Module 2: Natural Resources.pptxScience 7 Quarter 4 Module 2: Natural Resources.pptx
Science 7 Quarter 4 Module 2: Natural Resources.pptx
 
THEORIES OF ORGANIZATION-PUBLIC ADMINISTRATION
THEORIES OF ORGANIZATION-PUBLIC ADMINISTRATIONTHEORIES OF ORGANIZATION-PUBLIC ADMINISTRATION
THEORIES OF ORGANIZATION-PUBLIC ADMINISTRATION
 
4.16.24 21st Century Movements for Black Lives.pptx
4.16.24 21st Century Movements for Black Lives.pptx4.16.24 21st Century Movements for Black Lives.pptx
4.16.24 21st Century Movements for Black Lives.pptx
 
ECONOMIC CONTEXT - PAPER 1 Q3: NEWSPAPERS.pptx
ECONOMIC CONTEXT - PAPER 1 Q3: NEWSPAPERS.pptxECONOMIC CONTEXT - PAPER 1 Q3: NEWSPAPERS.pptx
ECONOMIC CONTEXT - PAPER 1 Q3: NEWSPAPERS.pptx
 
Procuring digital preservation CAN be quick and painless with our new dynamic...
Procuring digital preservation CAN be quick and painless with our new dynamic...Procuring digital preservation CAN be quick and painless with our new dynamic...
Procuring digital preservation CAN be quick and painless with our new dynamic...
 
Student Profile Sample - We help schools to connect the data they have, with ...
Student Profile Sample - We help schools to connect the data they have, with ...Student Profile Sample - We help schools to connect the data they have, with ...
Student Profile Sample - We help schools to connect the data they have, with ...
 
Choosing the Right CBSE School A Comprehensive Guide for Parents
Choosing the Right CBSE School A Comprehensive Guide for ParentsChoosing the Right CBSE School A Comprehensive Guide for Parents
Choosing the Right CBSE School A Comprehensive Guide for Parents
 
FILIPINO PSYCHology sikolohiyang pilipino
FILIPINO PSYCHology sikolohiyang pilipinoFILIPINO PSYCHology sikolohiyang pilipino
FILIPINO PSYCHology sikolohiyang pilipino
 
Global Lehigh Strategic Initiatives (without descriptions)
Global Lehigh Strategic Initiatives (without descriptions)Global Lehigh Strategic Initiatives (without descriptions)
Global Lehigh Strategic Initiatives (without descriptions)
 
ENGLISH6-Q4-W3.pptxqurter our high choom
ENGLISH6-Q4-W3.pptxqurter our high choomENGLISH6-Q4-W3.pptxqurter our high choom
ENGLISH6-Q4-W3.pptxqurter our high choom
 
Field Attribute Index Feature in Odoo 17
Field Attribute Index Feature in Odoo 17Field Attribute Index Feature in Odoo 17
Field Attribute Index Feature in Odoo 17
 
Concurrency Control in Database Management system
Concurrency Control in Database Management systemConcurrency Control in Database Management system
Concurrency Control in Database Management system
 
call girls in Kamla Market (DELHI) 🔝 >༒9953330565🔝 genuine Escort Service 🔝✔️✔️
call girls in Kamla Market (DELHI) 🔝 >༒9953330565🔝 genuine Escort Service 🔝✔️✔️call girls in Kamla Market (DELHI) 🔝 >༒9953330565🔝 genuine Escort Service 🔝✔️✔️
call girls in Kamla Market (DELHI) 🔝 >༒9953330565🔝 genuine Escort Service 🔝✔️✔️
 

Mitigations for Ensuring CIA in Cloud Services

  • 1. INFORMATION SECURITY  WELCOME TO THE GROUP PRESENTATION 1
  • 2. Topic Name and details Mitigations to ensure the confidentiality, integrity and availability of the data stored on these providers? Discuss mitigations for both the cloud providers and also the end users.  Vaishal Shah(30129756)  Kawalpreet Kaur(30116373)  Vidit Darji(30309034)  Gagandeep Kaur(30129485) 2
  • 3. Introduction of Cloud Providers  It is a firm which delivers cloud computing that relies on services and solution to individuals and business. It is also known as utility computing provider.  Based on the business model. There are many solutions  Infrastructure as a Service(IAAS)  Software as service(SAAS)  Platform as service(PAAS) 3
  • 4. What is Confidentiality, integrity, availability  is also known as CIA triad  structure made to guide policies for information security within an organization.  Are considered to be crucial elements components of society. 4
  • 5. Confidentiality, integrity, availability  Confidentiality is a set of rules or procedures that restricts the boundary to use or access to information.  Integrity is the assurance that the information gathered is trustworthy and reliable.  Availability is a guarantee of accurate access to the information by authorized people. 5
  • 6. Dropbox, Google docs  Dropbox is a cloud storage service, sometimes referred to as an online backup service, that is frequently used for file sharing and collaboration. It is increasingly being used in enterprises.  This service is as a warehouse used by government organizations, banks, post offices, video stores and libraries to allow people to drop items. 6
  • 8. Figures about Dropbox, Google Drive 8
  • 9. Problems or Issues related to ensure Confidentiality, Availability, Integrity by cloud providers  Malicious behaviour of insiders.  Incomplete or insecure data completion.  Management interface vulnerability. 9
  • 10. Issues contd.  Loss of Governance.  Isolation of failure.  Compliance and legal risks. 10
  • 11. Mitigations to ensure confidentiality, integrity and availability of cloud providers  The cloud is still new so the push for effective controls over the protection of information in the cloud is also nascent. But every problem comes with a solution so there are fewer security solutions for the cloud providers than there are for securing physical devices in a traditional infrastructure.  CIA Triad 11
  • 12. Confidentiality  Data encryption  User IDs and passwords  Biometric verification and security tokens, key fobs and soft tokens.  Data confidentiality may involve special training for those privy to such documents  Storing Information only on air gapped computers, disconnected storage devices or, for highly sensitive information, in hard copy form only 12
  • 13. Integrity  Maintaining consistency, accuracy and trustworthiness  Ensuring data from unauthorized access  EMP(electromagnetic pulse) or server crash.  Some data might include checksums, even cryptographic checksums for verification of integrity.  Back ups or redundancies must be available to restore the affected data to its correct state. 13
  • 14. Availability  Maintaining all hardware, performing hardware repairs  Providing adequate communication bandwidth  Preventing occurrence of bottlenecks  Back up copy must be stored in a geographically isolated location  Use of firewalls and proxy servers  Fast and adaptive disaster recovery 14
  • 15. Mitigations Cont..  Cloud Access Security Brokers(CASBs) : Niche market has been trying to reduce the severity of information shared on cloud providers so this market came up with Cloud Access Security Brokers(CASBs) defined as a strategy to mitigate this problem.  Context Awareness also allows the CASB providers to employ heuristic analysis on Cloud bound traffic, to do some form of anomaly detection to identify malicious or erroneous traffic. This is an area that they are all investing heavily in today. 15
  • 16. Problems for cloud providers  Data integrity  Data theft  Privacy issue  Data loss  Data location 16
  • 17. Data integrity  User can access the data from any where  Lack of data integrity in cloud Data Theft  Cost affective and flexible for operation  High possibility of data stolen from other user 17
  • 18. ssue  Make sure that customer’s private information secure  Keep watching who is access the data Data Loss  Due to financial problem when vendor closes, customer will loss data  Customer can not be able to access the data because vendor shut down 18
  • 19. Data location  Anyone don’t know the location of data  Vendor not reveal the location of data 19
  • 20. Mitigation of cloud providers  Identify the assets  Analyze the risk  Apple security countermeasure  Conduct post-run 20
  • 21. Problems faced by users of cloud services  Privacy  Security  Data breaches  Data protection 21
  • 22. Mitigations for users of cloud services • Privileged user Access • Regulatory Compliance • Data Location • Demonstrable customer care 22
  • 23. Mitigations Cont.. • Data Segregation • Recovery • Investigative support/Search ability • Long-term viability 23
  • 24. References https://www.techopedia.com/definition/133/cloud- provider  http://www.cloud- council.org/Security_for_Cloud_Computing- Final_080912.pdf  https://www.google.com.au/search?q=image+of+dropbo x,+google+docs  http://www.slideshare.net/pcalcada/apresentao-cm- 1524115  http://www.cloudcouncil.org/Security_for_Cloud_Comp uting-Final_080912.pdf  http://whatis.techtarget.com/definition/Confidentiality- integrity-and-availability-CIA 24

Notas do Editor

  1. CASBs are either on-premise, or cloud-based (or both) security policy enforcement points. Placed between your end users and the various cloud service providers, they can inspect traffic, manage and enforce policy, alert on anomalous behavior, and in most cases provide some level of DLP enforcement. These Cloud Access Security Brokers can identify individuals' access into Cloud Service Providers that are affiliated with the broker. Currently these number in the  hundreds if not thousands. For “Sanctioned” Cloud Applications (those services for which your enterprise has procured directly) end user access can be strictly enforced by context: Who you are (Role based access) Where you are coming from (corporate network, public Internet, Wi-Fi, geographic region) What device you are using (Corporate laptop, Home PC, Tablet or phone) What time of day you're working (Are you authorized to work during this time?)