Cloud Computing Security. Agenda. Cloud Computing Security Computer Security Computer Security Services Cloud Computing Security Issues Dangers and Vulnerabilities Attackers Threats , Concerns, Assets Cloud Computing Security Domains Solutions and Recommendations. Security Services.
Download Policy: Content on the Website is provided to you AS IS for your information and personal use and may not be sold / licensed / shared on other websites without getting consent from its author.While downloading, if for some reason you are not able to download a presentation, the publisher may have deleted the file from their server.
Authorized to Know
Data Has Not Been
Data Never LossMachine Never Fail
Traditional system security mostly means keeping bad guys out
The attacker needs to either compromise the auth/access control system, or impersonate existing users
Consumer’s loss of control
Multiple independent users share the same physical infrastructure
So, an attacker can legitimately be in the same physical machine as the target
How to find out where the target is located
How to be co-located with the target in the same (physical) machine
How to gather information about the target
At a Broad level, Two major Questions :
Service contracts should address these 13 domains