Unit 5
Unit 5
network
Network Security :Achieving network security in cloud
computing requires network visibility and monitoring, multiple
layers of firewalls, traffic controls, end-to-end encryption, and
encapsulation protocols for virtual private clouds.
1.Tools that organizations can use to ensure network security
with the cloud include encrypting data, using multi-factor
authentication, installing firewalls, and enabling data loss
prevention.
2.Four principles that organizations can follow include using
layers of firewalls to isolate the zones of a cloud environment,
end-to-end encryption for application traffic on the network,
and using standardized security protocols like IPsec, SSH, or
SSL for virtual private clouds.
3.Organizations should also use
network performance management tools so they can ensure
their cloud service providers are meeting service level
agreements.
A few best practices for Network Security:
Run only one network service on each virtual server
Don not open up direct access to sensitive data
Open only the ports absolutely necessary to support a
server’s service
Limit access to your services to clients who need
access to them
Even if you are not doing load balancing use a reverse
proxy
Use the dynamic nature of the cloud to automate your
security embarrassments
Network Intrusion Detection:
• Port Scans:A port scan is a method for determining which ports on
a network are open. As ports on a computer are the place where
information is sent and received, port scanning is analogous to
knocking on doors to see if someone is home. Running a port scan
on a network or server reveals which ports are open and listening
(receiving information), as well as revealing the presence of security
devices such as firewalls that are present between the sender and the
target. This technique is known as fingerprinting. It is also valuable
for testing network security and the strength of the system’s firewall.
Due to this functionality, it is also a popular reconnaissance tool for
attackers seeking a weak point of access to break into a computer.
• Denial of Service Attacks
• Known vulnerability exploit attempts
The purpose of a Network Intrusion Detection
Implementing Network Intrusion Detection in the cloud
Host Security
It describes how to set up server
Tasks:
Preventing attacks
overall system
Responding to attacks when they occur
user account
Antivirus Protection
alerts
Centralized
Data Segmentation
breach
The compromise of the entire system requires multiple