Cloud Computing: A Risk Assessment Model
|
|
|
- Della Hamilton
- 10 years ago
- Views:
Transcription
1 Cloud Computing: A Risk Assessment Model Alireza Shameli-Sendi and Mohamed Cheriet Synchromedia Laboratory for Cloud Computing École de technologie supérieure Montreal, Canada alirezashameli@synchromediaca, mohamedcheriet@etsmtlca Abstract Cloud computing has recently emerged compelling paradigm by introducing several characteristics such as ondemand self-service, broad network access, resource pooling, rapid elasticity, and measured service Despite the fact that cloud computing offers huge cost benefits for companies, the unique security challenges have been introduced in a cloud environment that make risk assessment challenging Cloud consumers need a protection to their cloud applications against cyber attacks Although some security controls and policies are devised for each element of cloud computing, we need a framework with overall quantitative risk assessment model The aim of this paper is to propose a framework for assessing the security risks associated with cloud computing platforms The fully quantitative, iterative, and incremental approach enables cloud customer/provider to assess and manage cloud security risks A proper result of risk assessment leads to have appropriate risk management mechanism for mitigating risks and reach to an acceptance security level Keywords-Cloud computing; Risk assessment; Risk management; I INTRODUCTION Cloud computing has critical role in today s missioncritical business requirements The cloud provides convenient and on-demand network access to a shared pool of computing resources with great efficiency and minimal management overhead [1] This infrastructure encouraged companies, that were involving with purchasing software or new hardware, start relying on cloud-services On the other hand, we are surrendering all company s sensitive information to a third-party cloud service provider Thus, security is one of the major issues in cloud computing and a critical requirement of the cloud provider (CP) and cloud customer With these points in mind, the organizations have to have right comprehensive about important risks in cloud computing environment [3] This requires proper security Risk Assessment (RA) and then security Risk Management (RM) in cloud Thus, we need an integrated framework for managing security risks in all levels in cloud [2] There are some standards available for risk assessment such as ISO/IEC 27002:2005 [4], NIST risk management guide for information technology systems [5], and best practice documents that are developed by security organizations, such as CERT s OCTAVE [6] method In this sense, cloud security (risk assessment and management) looks unsuitable [7] with current (Manual) information security risk assessment approaches (In spite of difficulty to automate risk assessment in cloud, there are some efforts in this area like Cloud Audit (A6) [8]) If we apply these standards to cloud not only there are no details on how to implement it in cloud computing but also they left some questions unanswered: 1) how to segregate security roles and responsibilities? 2) which activities have to be done by each role?, 3) which artifacts have to be generated by each activity The main contribution of this work is to focus on addressing these questions and find an appropriate solution for risk assessment as a service (RAaaS) in cloud computing The paper is organized as follows: first, we will discuss about the proposed model Then experimental results are given in Section III Finally, Section IV concludes the paper II PROPOSED MODEL The proposed framework is an iterative and incremental approach that can help design, implement, monitor, and manage information security management system in Cloud Computing This approach provides any cloud consumer with a predictable life-cycle security process for the development, adoption, and continual improvement of the Information Security solution In our model, iterations are planned in number, duration, and objective A proper assessment of objectives enables the move to the next iteration successfully As seen in Figure 1, the proposed model includes two dimensions: static, which are disciplines, and dynamic, which are phases In this architecture, the static dimension comprises six disciplines that are represented by business modeling, asset, security policy, implementation, configuration and change management, and project management The dynamic dimension contains four life-cycle phases that are illustrated by inception, analysis and design, construction, and monitoring Also, each phase can iterate The area under the curve that is associated with each discipline shows the relative amount of effort and activity required to perform it over time Along the vertical axis are the disciplines, which are a collection of workflows related to a major area of concern within the overall project From a security management perspective, each phase is concluded by a major milestone In each milestone, there are some major criteria that must be evaluated to determine whether the objectives
2 Table I: Linguistic variables and fuzzy equivalents for the importance weighting of each criterion Linguistic variables Fuzzy triangular Very Low (VL) (0, 0, 01) Low (L) (0, 01, 03) Medium Low (ML) (01, 03, 05) Medium (M) (03, 05, 07) Medium High (MH) (05, 07, 09) High (H) (07, 09, 10) Very High (VH) (09, 10, 10) Table II: Linguistic variables and fuzzy numbers for the criterion ratings Figure 1: Architecture (Phases: dynamic dimension; Disciplines: static dimension) of the phase have been met or not These criteria are the phases objectives that must be reached A workflow consists of some activities that produce a result of observable value Figure 2 presents, identifies and analyzes risk workflow from asset discipline As seen in Figure 2, in each workflow, we have some roles, activities, and artifacts that are integrated to provide the goal of workflow As mentioned, role segregation has not been considered in risk assessment standards and other security models properly Our model proposes appropriate role segregation and makes sure that we establish a framework where we can easy segregate security roles and responsibilities As mentioned, Figure 2 illustrates one of the model workflow that are relevant to the asset discipline Roles segregation is clearly shown in this workflow that includes eight roles: Asset Evaluator, Vulnerability Evaluator, Threat Evaluator, Risk Evaluator, SaaS Security Specialist, PaaS Security Specialist, IaaS Security Specialist, and Data Security Specialist Seven activities have been specified and in fact, each role is responsible to perform the related sub-activities Also, all the artifacts (output of activities) should be updated and each role has to keep updated the related sections of each artifact A Risk Assessment In the proposed model, we use the fuzzy multi-criteria decision making technique for risk assessment in Cloud Computing First, the important coefficients for the basic goals of information security, which are confidentiality, integrity, and availability (CIA) are determined [12] Second, the basic goals of information security are used to calculate the value of each asset Then, vulnerability indices are created for each asset separately In this model, linguistic variables are used to obtain expert opinions for weighting criteria and for rating alternatives as shown in Table I and Table II CIA Triad Evaluation: This step is key to calculating Linguistic variables Fuzzy triangular Very Poor (VP) (0, 0, 1) Poor (P) (0, 1, 3) Medium Poor (MP) (1, 3, 5) Fair (F) (3, 5, 7) Medium Good (MG) (5, 7, 9) Good (G) (7, 9, 10) Very Good (VG) (9, 10, 10) the CP s risks, and we can determine which of these three complimentary goals is more important to a CP The weight of confidentiality (C), integrity (I), and availability (A) are denoted as w C, w I, and w A respectively We use n experts (e) to evaluate the CIA triad x e k i illustrates the expert opinion e in domain i Finally, the base of the CIA triad can be calculated using the following formula: i [1, 2, 3] k [E 1, E 2,, E n ] x e k i = (a, b, c) w C = 1 n [ xe1 1 (+) xe2 1 (+)(+) xen 1 ] w I = 1 n [ xe1 2 (+) xe2 2 (+)(+) xen 2 ] w A = 1 n [ xe1 3 (+) xe2 3 (+)(+) xen 3 ] W = [ w C, w I, w A ] Asset Value: The CIA triad should be used to calculate the value of each asset We use n experts to evaluate each asset Every expert assigns a value from the list of linguistic variables to each part of the CIA triad For example, a large number of important linguistic variables for confidentiality means that this asset s privacy level is very high, and fewer linguistic variables for availability means that the availability of the asset is not as important The asset value could be calculated as follows: (1)
3 Figure 2: Identify and Analyze Risk Workflow i [1, 2, 3] j [A 1, A 2,, A n ] k [E 1, E 2,, E n ] x e k ij = (a, b, c) x ij = 1 n [ xe1 ij (+) xe2 ij (+)(+) xen ij ] Ã = A 1 A 2 A n C I A x 11 x 12 x 13 x 21 x 22 x 23 x n1 x n2 x n3 (2) Then, the combined weights are defuzzified, using the Signed Distance method (w C def, w I def, w A def), and normalized using the following formula: i [1, 2, 3] w i def = widef w i def (4) After defuzzification of each criterion, we calculate the weight matrix: i The next step is to linearly normalize the consolidated matrix through the following relationship (category B is related to the benefit criteria and category C is related to the cost criteria) [10] [11]: r ij = a ij c j, bij c, cij j c j a j c ij, a j b ij, a j a ij if j B if j C c j = max c ij if j B a j = min a ij if j C (3) x 11 x 12 x 1n x 21 x 22 x 2n x m1 x m2 x mn w C def w I def w A def (5) The final step is to establish the asset value matrix by combining the criteria and the defuzzification of fuzzy values by the Signed Distance method for each asset AV i illustrates the calculation of an asset value based on the CIA triad
4 C, Ĩ, Ã = (a, b, c) AV i = C + Ĩ + Ã AV i def = a+2b+c 4 A = A 1 A 2 A n AV 1 def AV 2 def AV n def Vulnerability Effect: A vulnerability is a flaw or weak point in the design or implementation of a system security procedure It could be exploited by an attacker or may affect the security goals of the CIA triad We represent the vulnerability effects with a percentage, and, for better accuracy, we obtain help from n experts We define two criteria: 1) Threat Capability (TC), which illustrates the extent to which the attacker is capable of compromising an asset Expert opinion in evaluating this factor for each asset is based on the recent history of threats against the asset respect to the vulnerabilities; and 2) Control Strength (CS), which indicates the extent to which each asset is resistant to all relevant threats A low linguistic variable for the CS factor means that there is poor security control to this vulnerability and related threats have a high probability of occurring [13] The vulnerability effect could be calculated as an asset value, but the final step in this case is different In the final step, we first defuzzify the fuzzy values using the Signed Distance method for the TC and CS attributes Then, we establish the asset vulnerability matrix This matrix represents n vulnerabilities with two attributes Finally, we calculate the vulnerability effect using the division function: V = T C, CS = (a, b, c) T C i def, CS i def = a+2b+c 4 V 1 T C 1 def CS 1 def V 2 T C 2 def CS 2 def V n T C n def V i = T C i def/cs i def CS n def Threat Effect (TE): We used the CIA triad to calculate threat effects We use n experts to calculate those effects For each threat, we should get help from relevant experts to get better results The calculation method of threats is similar to the one for assets Risk Identification and Impact: The objective of risk identification is to identify all possible risks to the assets In the previous steps, we exposed all the vulnerabilities of each asset We also exposed all threats to the SaaS software In this step, we determine which threats are related to which (6) (7) vulnerability The relationship between each vulnerability and threat is a risk The risk impact is modeled using three parameters: Asset value (A), Vulnerability effect (V ), and Threat effect (T ) Below, we show how the risk impact can be calculated with the fuzzy model R = R 1 R 2 R n A[i 1 ] V [j 1 ] T [k 3 ] A[i 1 ] V [j 2 ] T [k 4 ] A[i n ] V [j m ] T [k l ] Finally, we have an ordered list of risk impact in SaaS layer of cloud computing In the risk management process, the customer provider has to chose appropriate solution to deal with them A Environment III EXPERIMENT RESULTS To better illustrate our approach, we present a case study about an Industrial Car Company This company decides to manage the Enterprise Resource Planning (ERP) systems in a Cloud Computing environment ERP integration can be very complex and time consuming considering the manufacturing process, inventory, shipping, supply-chain management, and accounting Cloud based ERP provides managers and engineers with better performance, resource scalability, and integration The company simple uses secure web browser to login to cloud B Results We used three cloud Decision Makers (DM) in our case study: DM1, DM2, and DM3 The first step in our model is to indicate the importance of asset, vulnerability, and threat criteria (Tables III and VII) Table VII presents the decision makers opinion about the importance of vulnerability criteria They all believe that the history of cloud threats is not very important (C1: Threat Capability) They accentuate preparation to tackle threats by applying secure controls or configurations in all assets in cloud (C2: Control Strength) Of course, they could have a different opinion such that the history of threats against the assets is important than how much each asset is resistant to all relevant threats The literature shows that experts accentuate preparation to tackle threats by applying secure controls or configurations in all layers of cloud (C2: Control Strength) In other hands, they connive at the history of cloud threats (C1: Threat Capability) Table IV illustrates cloud assets in our case study that consists of four assets A1 is Cloud Customer database that has interact with company web application (A2) and ERP software (A3) Cloud Provider exposes a software interface or API (A4) Industrial Car Company uses this interface to manage and interact with cloud services (8)
5 Table III: Importance weightings of the criteria for Cloud Customer DM1 DM2 DM3 C1: Confidentiality VH H VH C2: Integrity VH H VH C3: Availability VH VH H A1 A2 A3 A4 Table IV: Cloud Assets Asset Database Company Website ERP Software Cloud Interfaces and APIs Table VIII illustrates unique vulnerabilities in the cloud respect to the cloud assets [9] Each vulnerability is mapped to an asset As Table VIII shows company web site and ERP software has two vulnerabilities while company database and cloud interface has one As Tables V, IX, and XI illustrate, the experts use the linguistic rating variables to evaluate assets, their related vulnerabilities, and threats with respect to their criteria Table IX column Control Strength represents that all experts believe that there is not enough security control for all vulnerabilities respect to the cloud assets For the threat capability they assigned appropriate linguistic variables based on threat history in the Internet Table XI shows a list of threats with relative values reflecting their potential impact on confidentiality, availability, and integrity in our case study The next steps involve constructing the fuzzy decision matrix and the fuzzy weighted normalized decision matrix Tables VI, X, and XII present the final results after the defuzzification step As Table V illustrates, based on expert opinion, company data is more important compare to other assets Table X shows that vulnerability V5 (Weak Encryption or Authentication Mechanism) has the biggest effect because not only it has good threat history but also there is not very strong implemented security control about it in our cloud computing It looks threat T3 (Crosssite scripting), can bypass access controls, will be very dangerous for our cloud and has high impact on CIA triad The final step is risk assessment involves a process to compute the residual risk arising from each combination of assets with the related vulnerabilities and threats Table XIII illustrates the identified risks in our case study, the impact, and relative rank from the most serious to the least Table V: Ratings of all assets by decision makers under criteria Confidentiality Integrity Availability Asset DM1 DM2 DM3 DM1 DM2 DM3 DM1 DM2 DM3 A1 Database G VG G G VG G VG VG VG A2 Company Website MG MG G G MG G F F G A3 ERP Software G G VG G G G VG VG G A4 Cloud Interfaces and APIs VP P MP F F MG VG VG VG Table VI: Asset Values Confidentiality Integrity Availability Fuzzification Value Defuzzification Value Normal A1 (026,032,033) (026,031,033) (030,033,033) (0811, 0956, 1) A2 (019,026,031) (021,028,032) (014,021,027) (0544,0744,0900) A3 (026,031,033) (023,030,033) (028,032,033) (0767,0933,1) A4 (001,004,010) (012,019,026) (030,033,033) (0433,0567,0689) Table VII: Importance weightings of the vulnerability criteria DM1 DM2 DM3 C1: Threat Capability M MH ML C2: Control Strength VH VH VH Table VIII: Vulnerabilities Id Name Asset V1 Poor Integrity or Backup Control A1 V2 Insertion of unchecked data in restricted system locations A2 V3 Lack of hashes to protect the cookie A2 V4 Flaw in the security design of software A3 V5 Weak Encryption or Authentication Mechanism A3 V6 Insecure Interfaces and APIs A4 Table IX: Ratings of all asset vulnerabilities by decision makers under criteria Threat Capability Control Strength DM1 DM2 DM3 DM1 DM2 DM3 V1 MP MP MP G G MG V2 G MG P MG G G V3 MP MP F F F F V4 MG MP G MG F MP V5 VG G G MG F MG V6 F F P MG F F Table X: Asset vulnerability Effect Threat Capability Control Strength Defuzzification Defuzzification Vulnerability Normal TC Value CS Value Effect V1 (002,005,009) (023,030,035) V2 (007,010,013) (023,030,035) V3 (006,006,010) (018,018,025) V4 (008,011,014) (011,018,025) V5 (014,017,018) (015,023,030) V6 (004,006,010) (013,020,027) Table XI: Ratings of all threats by decision makers under criteria Confidentiality Integrity Availability Asset DM1 DM2 DM3 DM1 DM2 DM3 DM1 DM2 DM3 T1 Data theft MP F P MP F P VP VP VP T2 Unauthorized access VG VG VG VG VG VG F F F T3 Cross-site scripting VG G G VG G G MG F MG T4 Cookie manipulation MG MG G VG VG G P MP MP T5 Data loss/manipulation VG VG VG VG VG VG P VP MP Table XII: Threat Effect Confidentiality Integrity Availability Fuzzification Value Defuzzification Value Normal T1 (004,010,017) (004,010,017) (000,000,004) (009,020,037) T2 (030,033,033) (030,033,033) (015,020,028) (075,087,095) T3 (026,031,033) (026,031,033) (017,025,033) (068,088,100) T4 (019,026,031) (028,032,033) (003,009,017) (049,067,082) T5 (030,033,033) (030,033,033) (001,005,012) (061,072,079) Table XIII: Risks Risk Id Threat Id Vulnerability Id Asset Id Risk Effect Rank R1 T1 V6 A4 40,656 9 R2 T2 V6 A4 158,928 7 R3 T2 V4 A4 298,592 3 R4 T2 V2 A4 163,744 6 R5 T3 V2 A2 213,452 4 R6 T4 V3 A2 183,084 5 R7 T5 V5 A3 458,731 1 R8 T4 V5 A3 426,426 2 R9 T5 V1 A1 118,854 8
6 Table XIV: Risk Level Risk Level Score Number of outcomes Very Low Low Medium (R1,R2,R4,R5,R6,R9) High (R3,R7,R8) Very High C Risk Level and Risk Management To understand risk result, we group similar results in graduated levels ranging from Very Low to Very High as Table XIV illustrates Six risks are in Medium level and three risks are in High level This result is very important for risk management The first step in risk management is to define acceptance risk level In our case study, acceptance risk level is Low It means if all risks fall in Low level, there is no concern in our cloud All risks in our case study pass our threshold and are identified as unacceptable risks The next step in RA is to identify appropriate security designs or safeguards that could mitigate unacceptable risks and reduce them to below acceptable level The main question here is that how much the safeguards cost to mitigate a risk If the cost is very high and the risk reduction is very low, it is obvious that it is not acceptable by cloud customer The next question is that how much is the risk reduction amount by implementing safeguards To answer these questions, we ask cloud expert to verify vulnerabilities list (Table IX) and reevaluate linguistic variables Our framework automatically updates all processes and shows the next level of risk Then we can decide based on implantation cost and risk reduction amount IV CONCLUSION In this paper, we first discussed the main cloud computing characteristics and how these characteristics make hard applying traditional security approaches Then, we focused on the main issues in manual security standards for implementing risk assessment/management in cloud computing Since cloud computing is growing rapidly, providing an efficient and reliable solution for security risk assessment is needed Although having an automated solution is critical and ideal for Risk Assessment as a Service (RAaaS) in cloud, it needs too much effort respect to the cloud computing characteristics In this paper, we proposed a framework for risk assessment/management in cloud computing environment Our main contribution consists of proposing a fuzzy multicriteria decision making technique for analyzing public cloud risks One major benefit of the proposed model is its ability to keep security management continuously within the cloud computing by an iterative and incremental approach The limitation of the model is that it is not fully automated in cloud but it is trying to solve the inefficiency of current traditional risk assessment models that have to be used in cloud As future work, we intend to make use of more sophisticated cloud computing and have some solutions for fully automated risk assessment ACKNOWLEDGMENT This work is partly funded by MSERC RDC to GSTC project and by CRC on Sustainable Smart Eco-Cloud REFERENCES [1] K Ren, C Wang, and Q Wang, Security Challenges for the Public Cloud, IEEE Internet Computing, vol 16, no 1, pp 69-73, 2012 [2] S Subashini and V Kavitha, A survey on security issues in service delivery models of cloud computing, Journal of Network and Computer Applications, vol 34, pp 1-11, 2011 [3] S Ramgovind, M M Eloff, and E Smith, The Management of Security in Cloud Computing, Proceedings of IEEE International Conference on Information Security for South Africa, 2010 [4] ISO/IEC 27002:2005 Information technology Security techniques Code of practice for information security management detail?csnumber=50297 [5] National Institute of Standards and Technology, Gary Stoneburner, Alice Goguen, and Alexis Feringa, NIST SP Risk Management Guide for Information Technology Systems, pp 8-26 [6] C Alberts and A Dorofee, Managing information security risks, The OCTAVE approach, Addison Wesley, ISBN , 2002 [7] B S Kaliski Jr and W Pauley, Toward risk assessment as a service in cloud environments, Proceedings of the 2nd USENIX conference on Hot topics in cloud computing (Hot- Cloud 10), USENIX Association, Berkeley, CA, USA, 2010 [8] Cloud Audit The Automated Audit, Assertion, Assessment, and Assurance API [9] M Theoharidou, N Tsalis, and D Gritzalis, In Cloud We Trust: Risk-Assessment-as-a-Service, Proceedings of the 7th IFIP WG 1111 International Conference, pp , 2013 [10] C T Chen, A fuzzy approach to select the location of the distribution center, Fuzzy Sets and System, vol 118, pp 65-73, 2001 [11] S Y Chou, Y H Chang, and C Y Shen, A fuzzy simple additive weighting system under group decision-making for facility location selection with objective/subjective attributes, Operational Research, vol 189, pp , 2008 [12] A Shameli-Sendi, M Jabbarifar, M Shajari, and M Dagenais, FEMRA: Fuzzy expert model for risk assessment, Proceedings of the Fifth International Conference on Internet Monitoring and Protection, pp 48-53, Barcelona, Spain, 2010 [13] J Jones, An introduction to factor analysis of information risk (FAIR), Norwich Journal of Information Assurance, vol 2, no 1, pp 1-76, 2006
External Supplier Control Requirements
External Supplier Control s Cyber Security For Suppliers Categorised as Low Cyber Risk 1. Asset Protection and System Configuration Barclays Data and the assets or systems storing or processing it must
A Secure System Development Framework for SaaS Applications in Cloud Computing
A Secure System Development Framework for SaaS Applications in Cloud Computing Eren TATAR, Emrah TOMUR AbstractThe adoption of cloud computing is ever increasing through its economical and operational
SERENA SOFTWARE Serena Service Manager Security
SERENA SOFTWARE Serena Service Manager Security 2014-09-08 Table of Contents Who Should Read This Paper?... 3 Overview... 3 Security Aspects... 3 Reference... 6 2 Serena Software Operational Security (On-Demand
IT Security Risk Management Model for Cloud Computing: A Need for a New Escalation Approach.
IT Security Risk Management Model for Cloud Computing: A Need for a New Escalation Approach. Gunnar Wahlgren 1, Stewart Kowalski 2 Stockholm University 1: ([email protected]), 2: ([email protected]) ABSTRACT
Cloud Database Storage Model by Using Key-as-a-Service (KaaS)
www.ijecs.in International Journal Of Engineering And Computer Science ISSN:2319-7242 Volume 4 Issue 7 July 2015, Page No. 13284-13288 Cloud Database Storage Model by Using Key-as-a-Service (KaaS) J.Sivaiah
Keyword: Cloud computing, service model, deployment model, network layer security.
Volume 4, Issue 2, February 2014 ISSN: 2277 128X International Journal of Advanced Research in Computer Science and Software Engineering Research Paper Available online at: www.ijarcsse.com An Emerging
Secure Code Development
ISACA South Florida 7th Annual WOW! Event Copyright Elevate Consult LLC. All Rights Reserved 1 Agenda i. Background ii. iii. iv. Building a Business Case for Secure Coding Top-Down Approach to Develop
A Secure Strategy using Weighted Active Monitoring Load Balancing Algorithm for Maintaining Privacy in Multi-Cloud Environments
IJSTE - International Journal of Science Technology & Engineering Volume 1 Issue 10 April 2015 ISSN (online): 2349-784X A Secure Strategy using Weighted Active Monitoring Load Balancing Algorithm for Maintaining
The Cloud in Regulatory Affairs - Validation, Risk Management and Chances -
45 min Webinar: November 14th, 2014 The Cloud in Regulatory Affairs - Validation, Risk Management and Chances - www.cunesoft.com Rainer Schwarz Cunesoft Holger Spalt ivigilance 2014 Cunesoft GmbH PART
Security Issues in Cloud Computing
Security Issues in Computing CSCI 454/554 Computing w Definition based on NIST: A model for enabling ubiquitous, convenient, on-demand network access to a shared pool of configurable computing resources
A Review on Cloud Computing Vulnerabilities
A Review on Cloud Computing Vulnerabilities Ms. Sugandha Nandedkar, Ms.Sangeeta Kakarwal Asst.Prof., Department of Computer Science and Engineering, DIEMS /Dr. BAMU, Aurangabad, MH, India. Prof. and HOD,
A Trust-Evaluation Metric for Cloud applications
A Trust-Evaluation Metric for Cloud applications Mohammed Alhamad, Tharam Dillon, and Elizabeth Chang Abstract Cloud services are becoming popular in terms of distributed technology because they allow
Certification Report
Certification Report EAL 4+ Evaluation of WatchGuard Issued by: Communications Security Establishment Canada Certification Body Canadian Common Criteria Evaluation and Certification Scheme Government of
SecSDM: A Model for Integrating Security into the Software Development Life Cycle
SecSDM: A Model for Integrating Security into the Software Development Life Cycle Lynn Futcher, Rossouw von Solms Centre for Information Security Studies, Nelson Mandela Metropolitan University, Port Elizabeth,
Security Considerations for Public Mobile Cloud Computing
Security Considerations for Public Mobile Cloud Computing Ronnie D. Caytiles 1 and Sunguk Lee 2* 1 Society of Science and Engineering Research Support, Korea [email protected] 2 Research Institute of
REGULATIONS FOR THE SECURITY OF INTERNET BANKING
REGULATIONS FOR THE SECURITY OF INTERNET BANKING PAYMENT SYSTEMS DEPARTMENT STATE BANK OF PAKISTAN Table of Contents PREFACE... 3 DEFINITIONS... 4 1. SCOPE OF THE REGULATIONS... 6 2. INTERNET BANKING SECURITY
INTRODUCTION TO CLOUD COMPUTING CEN483 PARALLEL AND DISTRIBUTED SYSTEMS
INTRODUCTION TO CLOUD COMPUTING CEN483 PARALLEL AND DISTRIBUTED SYSTEMS CLOUD COMPUTING Cloud computing is a model for enabling convenient, ondemand network access to a shared pool of configurable computing
Keywords Cloud Storage, Error Identification, Partitioning, Cloud Storage Integrity Checking, Digital Signature Extraction, Encryption, Decryption
Partitioning Data and Domain Integrity Checking for Storage - Improving Cloud Storage Security Using Data Partitioning Technique Santosh Jogade *, Ravi Sharma, Prof. Rajani Kadam Department Of Computer
INCIDENT RESPONSE CHECKLIST
INCIDENT RESPONSE CHECKLIST The purpose of this checklist is to provide clients of Kivu Consulting, Inc. with guidance in the initial stages of an actual or possible data breach. Clients are encouraged
CLOUD TECHNOLOGY IMPLEMENTATION/SECURITY
1 CLOUD TECHNOLOGY IMPLEMENTATION/SECURITY Torrell Griffin 2 Cloud Technology Implementation/Risk Mitigation The purpose of this report, in essence, is to define cloud technology as well as describe some
Cloud Computing. Karan Saxena * & Kritika Agarwal**
Page29 Cloud Computing Karan Saxena * & Kritika Agarwal** *Student, Sir M. Visvesvaraya Institute of Technology **Student, Dayananda Sagar College of Engineering ABSTRACT: This document contains basic
Cloud Computing--Efficiency and Security
Cloud Computing--Efficiency and Security Mick Atton, VP & Chief Architect Thomson Reuters--Legal July 22, 2013 Thomson Reuters Thomson Reuters is the leading source of intelligent information for the world's
FINAL DoIT 04.01.2013- v.8 APPLICATION SECURITY PROCEDURE
Purpose: This procedure identifies what is required to ensure the development of a secure application. Procedure: The five basic areas covered by this document include: Standards for Privacy and Security
Strategic Compliance & Securing the Cloud. Annalea Sharack-Ilg, CISSP, AMBCI Technical Director of Information Security
Strategic Compliance & Securing the Cloud Annalea Sharack-Ilg, CISSP, AMBCI Technical Director of Information Security Complexity and Challenges 2 Complexity and Challenges Compliance Regulatory entities
Security Model for VM in Cloud
Security Model for VM in Cloud 1 Venkataramana.Kanaparti, 2 Naveen Kumar R, 3 Rajani.S, 4 Padmavathamma M, 5 Anitha.C 1,2,3,5 Research Scholars, 4Research Supervisor 1,2,3,4,5 Dept. of Computer Science,
Regulations on Information Systems Security. I. General Provisions
Riga, 7 July 2015 Regulations No 112 (Meeting of the Board of the Financial and Capital Market Commission Min. No 25; paragraph 2) Regulations on Information Systems Security Issued in accordance with
Data Protection: From PKI to Virtualization & Cloud
Data Protection: From PKI to Virtualization & Cloud Raymond Yeung CISSP, CISA Senior Regional Director, HK/TW, ASEAN & A/NZ SafeNet Inc. Agenda What is PKI? And Value? Traditional PKI Usage Cloud Security
Permanent Link: http://espace.library.curtin.edu.au/r?func=dbin-jump-full&local_base=gen01-era02&object_id=154091
Citation: Alhamad, Mohammed and Dillon, Tharam S. and Wu, Chen and Chang, Elizabeth. 2010. Response time for cloud computing providers, in Kotsis, G. and Taniar, D. and Pardede, E. and Saleh, I. and Khalil,
Cloud Computing: Opportunities, Challenges, and Solutions. Jungwoo Ryoo, Ph.D., CISSP, CISA The Pennsylvania State University
Cloud Computing: Opportunities, Challenges, and Solutions Jungwoo Ryoo, Ph.D., CISSP, CISA The Pennsylvania State University What is cloud computing? What are some of the keywords? How many of you cannot
NETWORK ACCESS CONTROL AND CLOUD SECURITY. Tran Song Dat Phuc SeoulTech 2015
NETWORK ACCESS CONTROL AND CLOUD SECURITY Tran Song Dat Phuc SeoulTech 2015 Table of Contents Network Access Control (NAC) Network Access Enforcement Methods Extensible Authentication Protocol IEEE 802.1X
Public Auditing & Automatic Protocol Blocking with 3-D Password Authentication for Secure Cloud Storage
Public Auditing & Automatic Protocol Blocking with 3-D Password Authentication for Secure Cloud Storage P. Selvigrija, Assistant Professor, Department of Computer Science & Engineering, Christ College
NIST National Institute of Standards and Technology
NIST National Institute of Standards and Technology Lets look at SP800-30 Risk Management Guide for Information Technology Systems (September 2012) What follows are the NIST SP800-30 slides, which are
CHAPTER 1 INTRODUCTION
1 CHAPTER 1 INTRODUCTION 1.1 Introduction Cloud computing as a new paradigm of information technology that offers tremendous advantages in economic aspects such as reduced time to market, flexible computing
Integrated Threat & Security Management.
Integrated Threat & Security Management. SOLUTION OVERVIEW Vulnerability Assessment for Web Applications Fully Automated Web Crawling and Reporting Minimal Website Training or Learning Required Most Accurate
Improving Web Application Security by Eliminating CWEs Weijie Chen, China INFSY 6891 Software Assurance Professor Dr. Maurice Dawson 15 December 2015
Improving Web Application Security by Eliminating CWEs Weijie Chen, China INFSY 6891 Software Assurance Professor Dr. Maurice Dawson 15 December 2015 1 P a g e ABSTRACT This study examined improving web
CYBERSECURITY TESTING & CERTIFICATION SERVICE TERMS
CYBERSECURITY TESTING & CERTIFICATION SERVICE TERMS These Cybersecurity Testing and Certification Service Terms ( Service Terms ) shall govern the provision of cybersecurity testing and certification services
Cyber security standard
Cyber security standard Brief description This *Standard specifies security standards that protect *ICT systems and data from unintended or unauthorized access, damage or destruction. Related policies
Where every interaction matters.
Where every interaction matters. Peer 1 Vigilant Web Application Firewall Powered by Alert Logic The Open Web Application Security Project (OWASP) Top Ten Web Security Risks and Countermeasures White Paper
A Review of Cloud Environment and Recognition of Highly Secure Public Data Verification Architecture using Secure Public Verifier Auditor
I J C International Journal of lectrical, lectronics ISSN No. (Online): 2277-2626 and Computer ngineering 3(2): 144-148(2014) A Review of Cloud nvironment and Recognition of Highly Secure Public Data Verification
Providing Data Protection as a Service in Cloud Computing
International Journal of Scientific and Research Publications, Volume 3, Issue 6, June 2013 1 Providing Data Protection as a Service in Cloud Computing Sunumol Cherian *, Kavitha Murukezhan ** * Department
Designing and Coding Secure Systems
Designing and Coding Secure Systems Kenneth Ingham and Anil Somayaji September 29, 2009 1 Course overview This class covers secure coding and some design issues from a language neutral approach you can
The cloud - ULTIMATE GAME CHANGER ===========================================
The cloud - ULTIMATE GAME CHANGER =========================================== When it comes to emerging technologies, there is one word that has drawn more controversy than others: The Cloud. With cloud
STORAGE SECURITY TUTORIAL With a focus on Cloud Storage. Gordon Arnold, IBM
STORAGE SECURITY TUTORIAL With a focus on Cloud Storage Gordon Arnold, IBM SNIA Legal Notice The material contained in this tutorial is copyrighted by the SNIA. Member companies and individual members
Security Testing. How security testing is different Types of security attacks Threat modelling
Security Testing How security testing is different Types of security attacks Threat modelling Note: focus is on security of applications (not networks, operating systems) Security testing is about making
ITL BULLETIN FOR JUNE 2012 CLOUD COMPUTING: A REVIEW OF FEATURES, BENEFITS, AND RISKS, AND RECOMMENDATIONS FOR SECURE, EFFICIENT IMPLEMENTATIONS
ITL BULLETIN FOR JUNE 2012 CLOUD COMPUTING: A REVIEW OF FEATURES, BENEFITS, AND RISKS, AND RECOMMENDATIONS FOR SECURE, EFFICIENT IMPLEMENTATIONS Shirley Radack, Editor Computer Security Division Information
Get Confidence in Mission Security with IV&V Information Assurance
Get Confidence in Mission Security with IV&V Information Assurance September 10, 2014 Threat Landscape Regulatory Framework Life-cycles IV&V Rigor and Independence Threat Landscape Continuously evolving
How To Cloud Compute At The Cloud At The Cyclone Center For Cnc
Cloud Computing at CDC Current Status and Future Plans Earl Baum March, 2014 1 Background Current Activities Agenda Use Cases, Shared Services and Other Considerations What s Next 2 Background Cloud Definition
The Analysis of Cloud Computing Major Security Concerns & Their Solutions
Journal of Information & Communication Technology Vol. 6, No. 2, (Fall 2012) 48-53 The Analysis of Cloud Computing Major Security Concerns & Their Solutions Farhat Sharif * Institute of Business and Technology
Cloud Computing: What needs to Be Validated and Qualified. Ivan Soto
Cloud Computing: What needs to Be Validated and Qualified Ivan Soto Learning Objectives At the end of this session we will have covered: Technical Overview of the Cloud Risk Factors Cloud Security & Data
Private Cloud Database Consolidation with Exadata. Nitin Vengurlekar Technical Director/Cloud Evangelist
Private Cloud Database Consolidation with Exadata Nitin Vengurlekar Technical Director/Cloud Evangelist Agenda Private Cloud vs. Public Cloud Business Drivers for Private Cloud Database Architectures for
A Survey on Cloud Security Issues and Techniques
A Survey on Cloud Security Issues and Techniques Garima Gupta 1, P.R.Laxmi 2 and Shubhanjali Sharma 3 1 Department of Computer Engineering, Government Engineering College, Ajmer [email protected]
Mutual Authentication Cloud Computing Platform based on TPM
Mutual Authentication Cloud Computing Platform based on TPM Lei Peng 1, Yanli Xiao 2 1 College of Information Engineering, Taishan Medical University, Taian Shandong, China 2 Department of Graduate, Taishan
PASTA Abstract. Process for Attack S imulation & Threat Assessment Abstract. VerSprite, LLC Copyright 2013
2013 PASTA Abstract Process for Attack S imulation & Threat Assessment Abstract VerSprite, LLC Copyright 2013 - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - -
EXIN Cloud Computing Foundation
Sample Questions EXIN Cloud Computing Foundation Edition April 2013 Copyright 2013 EXIN All rights reserved. No part of this publication may be published, reproduced, copied or stored in a data processing
Certification Report
Certification Report EAL 3+ Evaluation of Rapid7 Nexpose Vulnerability Management and Penetration Testing System V5.1 Issued by: Communications Security Establishment Canada Certification Body Canadian
Cloud Computing and Security Risk Analysis Qing Liu Technology Architect STREAM Technology Lab [email protected]
Cloud Computing and Security Risk Analysis Qing Liu Technology Architect STREAM Technology Lab [email protected] 1 Disclaimers This presentation provides education on Cloud Computing and its security
Big Data, Big Risk, Big Rewards. Hussein Syed
Big Data, Big Risk, Big Rewards Hussein Syed Discussion Topics Information Security in healthcare Cyber Security Big Data Security Security and Privacy concerns Security and Privacy Governance Big Data
N TH THIRD PARTY AUDITING FOR DATA INTEGRITY IN CLOUD. R.K.Ramesh 1, P.Vinoth Kumar 2 and R.Jegadeesan 3 ABSTRACT
N TH THIRD PARTY AUDITING FOR DATA INTEGRITY IN CLOUD R.K.Ramesh 1, P.Vinoth Kumar 2 and R.Jegadeesan 3 1 M.Tech Student, Department of Computer Science and Engineering, S.R.M. University Chennai 2 Asst.Professor,
Tufts University. Department of Computer Science. COMP 116 Introduction to Computer Security Fall 2014 Final Project. Guocui Gao Guocui.gao@tufts.
Tufts University Department of Computer Science COMP 116 Introduction to Computer Security Fall 2014 Final Project Investigating Security Issues in Cloud Computing Guocui Gao [email protected] Mentor:
Review of Cloud Computing and future research
Review of Cloud Computing and future research Computer Science, IIS University, India Abstract: Cloud computing is also referred to as the evolutionary offspring of distributed computing, parallel computing,
Cloud-Security: Show-Stopper or Enabling Technology?
Cloud-Security: Show-Stopper or Enabling Technology? Fraunhofer Institute for Secure Information Technology (SIT) Technische Universität München Open Grid Forum, 16.3,. 2010, Munich Overview 1. Cloud Characteristics
Cloud Service Selection Based on the Aggregation of User Feedback and Quantitative Performance Assessment
Cloud Service Selection Based on the Aggregation of User Feedback and Quantitative Performance Assessment Lie Qu Department of Computing Macquarie University Sydney, NSW 2109, Australia [email protected]
CESG Certification of Cyber Security Training Courses
CESG Certification of Cyber Security Training Courses Supporting Assessment Criteria for the CESG Certified Training (CCT) Scheme Portions of this work are copyright The Institute of Information Security
John Essner, CISO Office of Information Technology State of New Jersey
John Essner, CISO Office of Information Technology State of New Jersey http://csrc.nist.gov/publications/nistpubs/800-144/sp800-144.pdf Governance Compliance Trust Architecture Identity and Access Management
UF IT Risk Assessment Standard
UF IT Risk Assessment Standard Authority This standard was enacted by the UF Senior Vice President for Administration and the UF Interim Chief Information Officer on July 10, 2008 [7]. It was approved
Chapter 1: Introduction
Chapter 1 Introduction 1 Chapter 1: Introduction 1.1 Inspiration Cloud Computing Inspired by the cloud computing characteristics like pay per use, rapid elasticity, scalable, on demand self service, secure
How To Protect Your Cloud Computing Resources From Attack
Security Considerations for Cloud Computing Steve Ouzman Security Engineer AGENDA Introduction Brief Cloud Overview Security Considerations ServiceNow Security Overview Summary Cloud Computing Overview
Change Management. Why Change Management? CHAPTER
Change Management 19 CHAPTER In this chapter, you will Learn why change management is an important enterprise management tool Understand the key concept of segregation of duties Review the essential elements
Security Management of Cloud-Native Applications. Presented By: Rohit Sharma MSc in Dependable Software Systems (DESEM)
Security Management of Cloud-Native Applications Presented By: Rohit Sharma MSc in Dependable Software Systems (DESEM) 1 Outline Context State-of-the-Art Design Patterns Threats to cloud systems Security
Security Threat Risk Assessment: the final key piece of the PIA puzzle
Security Threat Risk Assessment: the final key piece of the PIA puzzle Curtis Kore, Information Security Analyst Angela Swan, Director, Information Security Agenda Introduction Current issues The value
Keywords Distributed Computing, On Demand Resources, Cloud Computing, Virtualization, Server Consolidation, Load Balancing
Volume 5, Issue 1, January 2015 ISSN: 2277 128X International Journal of Advanced Research in Computer Science and Software Engineering Research Paper Available online at: www.ijarcsse.com Survey on Load
How to ensure control and security when moving to SaaS/cloud applications
How to ensure control and security when moving to SaaS/cloud applications Stéphane Hurtaud Partner Information & Technology Risk Deloitte Laurent de la Vaissière Directeur Information & Technology Risk
Secure Cloud Computing through IT Auditing
Secure Cloud Computing through IT Auditing 75 Navita Agarwal Department of CSIT Moradabad Institute of Technology, Moradabad, U.P., INDIA Email: [email protected] ABSTRACT In this paper we discuss the
Topics. Images courtesy of Majd F. Sakr or from Wikipedia unless otherwise noted.
Cloud Computing Topics 1. What is the Cloud? 2. What is Cloud Computing? 3. Cloud Service Architectures 4. History of Cloud Computing 5. Advantages of Cloud Computing 6. Disadvantages of Cloud Computing
SUPPORTSOFT ACCOUNT MANAGER
SUPPORTSOFT ACCOUNT MANAGER DELIGHTING USERS, ONE PASSWORD AT A TIME! WHITEPAPER ABOUT Enterprises continue to rely almost exclusively on passwords as a primary means for authenticating users, with the
Logging In: Auditing Cybersecurity in an Unsecure World
About This Course Logging In: Auditing Cybersecurity in an Unsecure World Course Description $5.4 million that s the average cost of a data breach to a U.S.-based company. It s no surprise, then, that
Analytical Study of Cloud ERP and ERP
www.ijecs.in International Journal Of Engineering And Computer Science ISSN:2319-7242 Volume 3. Issue 10 October, 2014 Page No. 8710-8717 Analytical Study of Cloud ERP and ERP Rahul Pareek (BCA,MCA,MCTS)
Security Language for IT Acquisition Efforts CIO-IT Security-09-48
Security Language for IT Acquisition Efforts CIO-IT Security-09-48 Office of the Senior Agency Information Security Officer VERSION HISTORY/CHANGE RECORD Change Number Person Posting Change Change Reason
Cloud Courses Description
Cloud Courses Description Cloud 101: Fundamental Cloud Computing and Architecture Cloud Computing Concepts and Models. Fundamental Cloud Architecture. Virtualization Basics. Cloud platforms: IaaS, PaaS,
Rational AppScan & Ounce Products
IBM Software Group Rational AppScan & Ounce Products Presenters Tony Sisson and Frank Sassano 2007 IBM Corporation IBM Software Group The Alarming Truth CheckFree warns 5 million customers after hack http://infosecurity.us/?p=5168
Online Recruiting and Selection
Online Recruiting and Selection Innovations in Talent Acquisition Douglas H. Reynolds and John A. Weiner ^WILEY-BLACKWELL A John Wiley &. Sons, Ltd., Publication Contents Series Editor's Preface About
Cloud Security Implications for Financial Institutions By Scott Galyk Director of Software Development FIMAC Solutions, LLC
Cloud Security Implications for Financial Institutions By Scott Galyk Director of Software Development FIMAC Solutions, LLC www.fmsinc.org 1 2015 Financial Managers Society, Inc. Cloud Security Implications
North Dakota 2013 IT Security Audit Vulnerability Assessment & Penetration Test Project Briefing
North Dakota 2013 IT Security Audit Vulnerability Assessment & Penetration Test Project Briefing Introduction ManTech Project Manager Mark Shaw, Senior Executive Director Cyber Security Solutions Division
Looking at the SANS 20 Critical Security Controls
Looking at the SANS 20 Critical Security Controls Mapping the SANS 20 to NIST 800-53 to ISO 27002 by Brad C. Johnson The SANS 20 Overview SANS has created the 20 Critical Security Controls as a way of
External Supplier Control Requirements
External Supplier Control Requirements Cyber Security For Suppliers Categorised as High Cyber Risk Cyber Security Requirement Description Why this is important 1. Asset Protection and System Configuration
Business Process Automation through Application Software
5 Business Process Automation through Application Software 5.1 Introduction The speed of automation of all activities, whether they be connected to business directly or not has surprised the stakeholders
Six Essential Elements of Web Application Security. Cost Effective Strategies for Defending Your Business
6 Six Essential Elements of Web Application Security Cost Effective Strategies for Defending Your Business An Introduction to Defending Your Business Against Today s Most Common Cyber Attacks When web
CLOUD STORAGE SECURITY INTRODUCTION. Gordon Arnold, IBM
CLOUD STORAGE SECURITY INTRODUCTION Gordon Arnold, IBM SNIA Legal Notice The material contained in this tutorial is copyrighted by the SNIA. Member companies and individual members may use this material
