0% found this document useful (0 votes)
30 views8 pages

Cyber Security (Cloud Security) - 6

Uploaded by

Satyajit
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as PDF, TXT or read online on Scribd
0% found this document useful (0 votes)
30 views8 pages

Cyber Security (Cloud Security) - 6

Uploaded by

Satyajit
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as PDF, TXT or read online on Scribd
You are on page 1/ 8

Mobile Device Security

• Mobile security also known as wireless security.


• Mobile security is the protection of smartphones, tablets, laptops and other portable computing devices, and the
networks they connect to, from threats and vulnerabilities associated with wireless computing.

Components of mobile device security

Endpoint security:
 protect corporations by monitoring the files and processes on every mobile device that accesses a network.
 By constantly scanning for malicious behavior, endpoint security can identify threats early on.
 When they find malicious behavior, endpoint solutions quickly alert security teams, so threats are removed before
they can do any damage.

VPN:
 A virtual private network, or VPN, is an encrypted connection over the Internet from a device to a network.
 The encrypted connection helps ensure that sensitive data is safely transmitted.
 It prevents unauthorized people from eavesdropping on the traffic and allows the user to conduct remote work
safely.
 Secure web gateway:
 Secure web gateways provide powerful, overarching cloud security. Cloud security can operate at the DNS and IP layers to defend
against phishing, malware, and ransomware earlier.
 By integrating security with the cloud, you can identify an attack on one location and immediately prevent it at other branches.
 Cloud Access Security Broker (CASB), a tool that functions as a gateway between on-premises infrastructure and cloud applications
(Salesforce, Dropbox, etc.).
 A CASB identifies malicious cloud-based applications and protects against breaches with a cloud data loss prevention (DLP) engine.

 Email security:
 Email is the primary tool for attackers spreading ransomware and other malware.
 Proper email security includes advanced threat protection capabilities that detect, block, and remediate threats faster; prevent data
loss; and secure important information in transit with end-to-end encryption.
Mobile device security vendors and products
There are several vendors that offer mobile device management and security tools. Some of the tools available include:
• Scalefusion
• Hexnode Unified Endpoint Management
• Microsoft Enterprise Mobility + Security
• VMware Workspace ONE Unified Endpoint Management
• Google Endpoint Management
• N-able Remote Monitoring and Management
Cloud Security
 The term cloud refers to a network or the internet.
 Large number of servers that are connected through the Internet.
 It is a technology that uses remote servers on the internet to store, manage, and access data online rather than local drives.
 The cloud enables users to access the same files and applications from almost any device, because the computing and storage
takes place on servers in a data center, instead of locally on the user device.
 Examples:
• Google Cloud
• Amazon Web Services (AWS)
• Microsoft Azure
• IBM Cloud
• Alibaba Cloud
Benefits of Cloud Computing
1. Global Reach: Cloud services are typically accessible from various locations around the world, allowing
businesses to reach a global audience and provide services to customers in different geographic regions.

2. Scalability: Cloud services allow you to scale up or down your computing resources as needed, without the
need for significant hardware investments. This flexibility is particularly useful for businesses with fluctuating
workloads.

3. Backup and Disaster Recovery: Cloud platforms often provide built-in backup and disaster recovery options,
reducing the risk of data loss in case of hardware failures, accidents, or other unforeseen events.

4. Cost Savings: Cloud computing eliminates the need for upfront capital expenditures on hardware and reduces
the cost of maintaining and managing data centers. Instead, you pay for the resources you use on a subscription
or pay-as-you-go basis.

5. Accessibility: Cloud services are accessible from anywhere with an internet connection. This facilitates remote
work and collaboration, enabling teams to access and work on projects from different locations and devices.
Different cloud Models
• 1) Software as a Service (SaaS)
• The SaaS model facilitates users to access the software and other programs in a cloud.
• Using the SaaS solution eliminates the need for in-house applications, data storage, and support for the application
administration.
• Companies pay to use the SaaS resources on a user basis.
Example:
Google Workspace, Dropbox, Salesforce, Cisco WebEx, Concur, GoToMeeting
2 ) Platform as a Service (PaaS)
• PaaS is a cloud computing service that allows users application development platforms to develop cloud applications
and services .
• In PaaS, an individual or a company is not required to buy the software and hardware to develop the applications.
Examples:
Google App Engine, Azure services platform of Google, Amazon’s relational database services (RDS)
3)Infrastructure as a Service (Iaas)
This service provides servers, storage and other virtualize resources.
Examples:
AWS, Google Compute Engine
security challenges
Lack of visibility
It's easy to lose track of how your data is being accessed and by whom, since many cloud services are accessed
outside of corporate networks and through third parties.
Data Breaches:
Storing sensitive data in the cloud can make it a target for hackers. Organizations need to ensure robust encryption,
access controls, and proper authentication mechanisms to prevent unauthorized access to data.
Identity and Access Management (IAM):
Managing user identities and access controls across multiple cloud services can be complex. Misconfigured IAM
settings can lead to unauthorized access or data exposure.
Insecure APIs:
Cloud services often expose APIs (Application Programming Interfaces) for managing and interacting with resources.
Insecure APIs can be exploited by attackers to gain unauthorized access or manipulate resources.
Compliance and Regulatory Issues:
Different industries and regions have specific compliance requirements. Ensuring that cloud services meet these
regulatory standards can be challenging
Security Measures in Cloud Computing
• Cloud network provide security measures and technology to protect online stored resources from leakage, theft,
and data loss.
Firewall
 Firewall is the central part of cloud architecture.
 The firewall protects the network and the perimeter of end-users.
 It also protects traffic between various apps stored in the cloud.
Infrastructure Security
 Infrastructure includes data centers, servers, networks, storage systems, and other hardware components that enable the
delivery of cloud services to customers.
 Ensuring the security of this infrastructure is crucial to maintaining the confidentiality, integrity, and availability of data and
applications hosted in the cloud.
Data Security and Storage
some strategies and practices to secure data in cloud computing:
Encryption
Access Controls
Multi-Factor Authentication (MFA)
Contd….
Data Classification:
• Classify data based on its sensitivity and importance.
• Apply appropriate security controls and access restrictions based on data classification levels.
• Not all data requires the same level of protection.

Data Loss Prevention (DLP):


• Implement DLP solutions to monitor and prevent the unauthorized movement or transfer of sensitive data.
• DLP tools can detect and block data leakage attempts, helping to prevent data breaches.
Data Masking and Tokenization:
• For particularly sensitive data, consider using data masking or tokenization techniques.
• Data masking involves substituting real data with fictional data in non-production environments, while tokenization
replaces sensitive data with randomly generated tokens.
Regular Backups and Disaster Recovery:
• Implement a robust backup and disaster recovery plan to ensure data can be restored in case of data loss, corruption, or
system failures.
• Regularly test your backup and recovery procedures.

You might also like