Unit 4 Cloud Security 25
Unit 4 Cloud Security 25
Unit 4
• Crucial aspects in maintaining cloud security
If you use a system that provides improved accessibility and opens up the
platform to multi-node access, then you need to take into account the risks
associated with this improvement.
One way this can be done is by adding an element of control, in the form of
access control, to afford a degree of risk mitigation. Information-centric
access control (as opposed to access control lists) can help to balance
improved accessibility with risk, by associating access rules with different
data objects within an open and accessible platform, without losing the
inherent usability of that platform.
The cloud computing model opens up old and new data
security risks. By its very definition, Cloud computing is a
development that is meant to allow more open
accessibility and easier and improved data sharing. Data
are uploaded into a cloud and stored in a data center, for
access by users from that data center; or in a more fully
cloud-based model, the data themselves are created in
the cloud and stored and accessed from the cloud (again
via a data center). The most obvious risk in this scenario
is that associated with the storage of that data. A user
uploading or creating cloud-based data include those
data that are stored and maintained by a third-party
cloud provider such as Google, Amazon, Microsoft, and
so on.
Data security has several risks associated with it:
• Firstly, it is necessary to protect the data during upload into the
data center to ensure that the data do not get hijacked on the
way into the database.
• Secondly, it is necessary to the stores the data in the data
center to ensure that they are encrypted at all times.
• Thirdly, and perhaps less obvious, the access to those data
need to be controlled; this control should also be applied to
the hosting company, including the administrators of the data
center. In addition, an area often forgotten in the application of
security to a data resource is the protection of that resource
during its use—that is, during a collaboration step as part of a
document workflow process.
Other issues that complicate the area of hosted data
include ensuring that the various data security acts and
rules are adhered to; this becomes particularly
complicated when you consider the cross border
implications of cloud computing and the hosting of data
in a country other than that originating the data.
The Internet and mobile devices have effectively opened
up new points at which data can leak; and as new
methods of communicating emerge, they will open up
even more potential for information loss
The Internet and mobile devices have effectively opened up
new points at which data can leak; and as new methods of
communicating emerge, they will open up even more
potential for information loss.
Cloud data security is the practice of protecting data and
other digital information assets from security threats,
human error, and insider threats. It leverages technology,
policies, and processes to keep your data confidential and
still accessible to those who need it in cloud-based
environments.
What is breach of data ??
A data breach is a confirmed incident in which
sensitive, confidential or otherwise protected data
has been accessed and/or disclosed in an
unauthorized fashion. Data breaches may involve
personal health information (PHI), personally
identifiable information (PII), trade secrets or
intellectual property.
Data breach is one of the biggest issues in both
government and corporate information security
today.
In India , one cyber crime takes place every 8
minutes.
These include phishing, scanning or probing, site
intrusions, defacements, virus or malicious code,
ransomware and denial-of-service attacks.
There has to be a concerted effort to treat cyber
security seriously... The vast majority of
organizations are looking at cyber security as a
compliance task and thus do the minimum
possible to achieve that.
organizations are facing these days .
Cloud Vulnerability..
Top cybersecurity threats that
AI-Enhanced Cyberthreats.
AI Fuzzing.
Deep-fake.
Cyber attackers have:-
1. Motive / Objective
2. Method
3. Vulnerability
Threat Possible event that can harm an
information system. Can lead to the risk
to the organization.
Importance of
data privacy
Malicious
insider
Insider Negligent
Threat insider
Accidental
insider
Insider Threat Defence and Response Plan
Monitor all files, emails and activity on core data sources
Determine who has access to that data, why? And time allotted?
Online Threats,
Hacking and Buying Illegal Vacation Creation of fake
Stalking, Cyber
fraud things Robberies profile
bullying
Hardware
Software
Classification of
Vulnerability
Network
Personnel
Physical site
Organizational
Complexity
Familiarity
Connectivity
Software Bugs
Virus
Computer Worm
Availability means that systems and data are accessible at the time users need them. It can be
defined as (1) timely and reliable access to information and the ability to use
it, and (2) for authorized users, timely and reliable access to data and information
services.
Why do we need information / cyber
security?
• Too many users exchange information
• Every individual holds the right to his/her own privacy
• The dark web can cause serious damage
• Need arises to protect data from hackers
• Immense growth of IOT devices
Internet risks
• Inappropriate content
• Ignoring age restrictions
• Friending or communicating with people they don’t
know
• Sharing personal information
• Gambling
Information Warfare
• "Information Warfare is any action to Deny, Exploit, Corrupt or
Destroy the enemy's information and its functions; protecting
ourselves against those actions and exploiting our own military
information functions".
• Information warfare can take many forms: Television, internet
and radio transmission(s) can be jammed. Television, internet
and radio transmission(s) can be hijacked for a disinformation
campaign.
Deny, corrupt, destroy, or exploit an
adversary's information, or influence the
Offensive adversary's perception. Acquiring
dominance , launching attack against
enemy’s computer network and destruct
information
timely fashion
Process
Governance, oversight, policy, reporting
Technology
Firewalls, IDS/ISP, SIEM, anti-malware
Strong passwords, Logging/monitoring
o Access Control: Implement strong access controls, such as multi-factor authentication (MFA), role-based access
control (RBAC), and least privilege principles.
o Data Protection: Encrypt sensitive data both at rest and in transit. Implement data loss prevention (DLP) measures to
prevent unauthorized data transfer.
o Network Security: Configure firewalls, intrusion detection systems (IDS), and intrusion prevention systems (IPS) to
protect network traffic.
o Vulnerability Management: Regularly scan systems for vulnerabilities and patch them promptly.
o Incident Response: Establish incident response plans and procedures to respond effectively to security incidents.
o Use security information and event management (SIEM) tools to monitor network traffic and system logs for suspicious
activity.
o Regularly audit systems and processes to ensure compliance with security policies.
o Implement continuous monitoring and automated security tools to detect and respond to threats in real-time.
Best Practices for Effective Cloud Security Policy Implementation: