A Survey on Security Threats and Security Technology Analysis for Secured Cloud Services
|
|
|
- Harry Alexander
- 10 years ago
- Views:
Transcription
1 , pp A Survey on Security Threats and Security Technology Analysis for Secured Cloud Services Changsoo Lee 1, Daewon Jung 2 and Keunwang Lee 3 1 Dept. of Computer Science, Soongsil University Sando dong, Dongjak-gu, Seoul, , South Korea 2 R&D Strategy Department, The Attached institute of ETRI P.O.Box 1, Yuseong Daejon, South Korea 3 Dept. of Multimedia Science, Chungwoon University, Sukgol-ro 113, Nam-gu, Incheon, , South Korea 1 [email protected], 2 [email protected], 3 [email protected] Abstract In recent, various types of cloud services such as Web-based cloud and mobile cloud that can store and access documents and multimedia files from a wide variety of client environment are getting rapidly increased. However, the problem is that if a network failure or a security failure occurs due to an intended or unintended accident, we would experience considerable damages. Since cloud services have high portion of virtualization that implies one of the physical hypervisor platforms operating on more than two organizational data, the risks are always present in cloud services at the aspect of security issues. In this paper, we analyze the security threats and security technologies for secured cloud services. We also provide the security requirements for cloud services which help to make a research direction to the new types of security threats. Keywords: Cloud Computing Service, Cloud Security Analysis, Virtualization, Network Security, Information Security 1. Introduction In most recent three years, the biggest issues in the IT environment are virtualization, cloud services, pand big data analysis. Virtualization is usually used for implementing many of cloud infrastructures. Infrastructure clouds are able to provide computing resources that are logically virtualized and the storage resources that save the images, video, and data over the internet. In recent, with the development of the IT environment, resilience on IT in the business has been rapidly raised so that we also increase the cost of investment and maintenance. Cloud services are collections of a variety of technologies and services and have the characteristics such as resource efficiency through virtualization and energy efficiency and reusability. Accordingly, from the investigation of Gartner, it is expected that the cloud service markets seems an annual growth at a rate of 18.9%, and it will achieve 1,768 billion dollars markets. As shown previously, the cloud services are getting popular and receiving a lot of attention in recent years. However, research on cloud service security is not enough to cover this area. Most existing the security for the cloud service only provides a limited service for specific cloud services so that it is difficult to conjunct with the security features of other cloud services. Also, as the cloud services have different security characteristics, it does not support ISSN: IJSIA Copyright c 2013 SERSC
2 all cloud services. Therefore, there is a need for an effort on surveying security and privacy issues in cloud services and establishing secure and reliable cloud services environment [1-4]. In this paper, we analyze the security technologies for establishing secured cloud computing environment. Section 2 analyzes the recent security threats in cloud services. Then, we provide the analysis of security technologies for cloud services in Section 3. The requirements for cloud computing security are followed in Section 4. Finally, we conclude this paper in Section Security Threats to Cloud Services Security threats to cloud services inherit the existing IT environments. Also, depending on the cloud characteristics, the new types of threats to data, virtualization, mobile, and data center have been increasing. In this section, we provide the security threats to cloud services happened in the area of cloud service management. Figure 1. Cloud Service Management Areas 2.1. Security Threats for the Service Provider Hypervisor Attacks: Since the hypervisor has vulnerabilities to the attacks, the attackers can make a successful attack for obtaining administrative rights and disclosing information by using the hypervisor vulnerabilities. If the attackers obtain the administrative rights of the virtual machine, they can get the applications of users and the information of users. Furthermore, they can attack the other virtual machines as the second attack route in the same physical system. The attacks using hypervisor vulnerabilities are known as integer signedness error and communication components vulnerability between the guest and the host OS. First, integer signedness error is an attack using the vulnerabilities for checking the validity of the permission level. Second, the attack using the communication component vulnerabilities between the guest and host OS is acquiring access rights by making a heap overflow in the process of interaction and initialization of the communication components [5]. 22 Copyright c 2013 SERSC
3 Figure 2. Attack using Hypervisor Vulnerabilities OS and Web Vulnerabilities Attack: Attackers may attack the user PC that is vulnerable to the malware infections to acquire the right of users connected to the cloud service. Then, they try to find the web vulnerability for the attack to the virtual machine. Also, they perform activities of infection and spread of the infection by the activity of illegal communication between the virtual machines. We also can use the vulnerabilities when API in OS calls I/O control in the devices, finally leading to getting OS authority. Figure 3 shows one of the attack methods using the vulnerability of the OS and user authorities acquired. Figure 3. OS and Web Vulnerabilities Attack RootKit Attacks: Once attackers acquire the user authority that can connect to the cloud service, they install the RootKit in the virtual machine. RootKit can attack from virtual machine controlled by the internal attacker other virtual machine and hypervisors. In the case that the attackers acquire the memory access authority, they are able to monitor all the virtual machine s memory such that it becomes a very big threat [6]. Copyright c 2013 SERSC 23
4 2.2. Security Threats for the Users Figure 4. RootKit Attack Changing User Information by Sniffing: In order to access SaaS service, which is one of the cloud services, it is necessary to perform authenticating user ID and password. At this time, when this information passes to the server-side while username and password information is not encrypted, user account information can be stolen by the sniffing attacks to user session. Attackers can steal the user data, authentication information, and financial information. Figure 5. Changing User Information by Sniffing Changing User Information using Hijacking: Hijacking is the method to steal the session ID granted to use the SaaS service in HTTP and TCP networks. With this session ID, they can use the normal cloud services. In the case of DLL hijacking, it is also possible to steal SaaS account during the loading process when a program run by the user request the DLL from OS [7]. 24 Copyright c 2013 SERSC
5 Figure 6. Changing User Information by Hijacking 3. Security Technologies for Secured Cloud Services Because cloud computing technology that can provide a new user centric service is an extension version of the IT technology, security technology has not been characterized well. We believe that cloud computing security threats are the similar to those that occur in the existing IT environment such that security technology is also possible to apply to each security component. Figure 7. Access Control and User Authentication 3.1. Access Control and User Authentication Access control and user authentication technologies are the most representative security technologies for platform and cloud computing security. Access control technology is used to protect the resource by classifying the grades or jobs to access their resources. DAC(discretionary access control), MAC(Multi Access Control), and RBAC(role based access control) are typical access control technologies. DAC is a method to give a granted access based on an individual user or group identifiers. It also gives a same level of authoritiy to other users. MAC gives vertical and horizontal access rules for system access. Note that this method is the widely used, mainly in the military or government agencies. In the RBAC method, some of the authorities given to the root user are allowed to give the specific users called role user. In Figure 7, user access control is determined by the rules of cloud system. In terms of user authentication, Id/Pass, PKI, Multi-Factor, ipin, and OPT are widely used. Copyright c 2013 SERSC 25
6 3.2. Network Security Technology With the development of IT technology and the spread of Internet, as the security threat increases, network security technologies also have been improved. Leading technologies are SSL for ensuring the confidentiality of communication, IPsec, VPN, and IDS/IPS, Firewall, and DDoS prevention techniques SSL(Secure Socket Layer): SSL not only applies to the session layer, but also ensures the safety of the protocol for FTP, Telnet, and Http in application layer. Therefore, it ensures server authentication, client authentication, and message confidentiality. This SSL supports HTTP( TELNET(TELNETS:992), POP3(POPS:995), FTP, and NNTP. Figure 8. Flow for SSL Protocol VPN(Virtual Private Network): VPN is a technology that enables public network to use like a dedicated private network by using tunneling and encryption technology. With this VPN technology, we can expect following things: i) reducing the cost for building private network, ii) circuits fee reduction, and iii) increasing data reliability. VPN is divided into two parts: one is tunneling technology, and the other one is encryption technology. The tunneling technology used in VPN means that it forms a tunnel from the starting point to the end point in order to send and receive information through a virtual tunnel, which is not affected by outside of the network. Figure 9. VPN Tunneling 26 Copyright c 2013 SERSC
7 IDS/IPS(Intrusion Detection/Protection System): This system is monitoring and intrusion analysis systems for all the packets transferred between computer systems and networks. The intrusion detection system detects the intrusion of unauthorized users so that system resources are effectively protected Storage Security The main purpose of storage security is to protect sensitive information such as personal and enterprise information. In order to achieve this, it protects changes of the information by unauthorized users, information leakage, and destruction of information by the access control and data encryption. Since the access control for storage services grants the access permission by the users and blocks illegal access, it is possible to control a variety of access and monitor the specific session. Also, data encryption by each column is possible while only the authorized users can perform decryption. The storage security not only prevents illegal leakage due to data files and other physical methods, but also protects the sensitive information from an administrator who can access all data. Figure 10. Data Encryption and Decryption for Stage Security 4. Requirements for Cloud Computing Security With the development of the essential characteristics in cloud service, the security technology for information field of cloud computing has been also developed. However, it is not easy to prepare the security solutions that fully satisfy the security requirements. In order to have safe deployment of cloud services, we need to continuously update the standardization and the defense technologies for new threats. In this regard, CSA(Cloud Security Alliance) updates the elements for security management every year such that they define the cloud computing security requirements, which is able to cope with the new security threats as indicated in Table 1 [8]. Copyright c 2013 SERSC 27
8 V1.0(2009), Domain1~15 V2.1(2010), Domain 1~13 V3.0(2011) Domain 1~14 Table 1. Cloud Security Requirements by CSA [8] Classification Contents Domain Cloud Architecture Governing in the Cloud Operation in then Cloud Governing in the Cloud Operation in then Cloud Governing in the Cloud Operation in then Cloud Cloud Computer Architectural Framework 1 Governance and Enterprise Risk Management 2 Legal 3 Electronic Discovery 4 Compliance and Audit 5 Information Lifecycle Management 6 Portability and Interoperability 7 Business Continuity and Disaster Recovery 8 Data Center Operation 9 Incident Response, Notification and Remediation 10 Application Security 11 Encryption and Key Management 12 Identity and Access Management 13 Storage 14 Virtualization 15 Legal and Electronic Discovery (V1.0 Domain 3 + 4) 3 Traditional Security, Business Continuity and Disaster Recovery (V1.0 Domain 8 + Traditional Security) 7 Delete Storage (V1.0 Domain 14, Delete) - Legal Issues : Contracts and Electronic Discovery (V2.1 Domain 3, Modify) 3 Compliance and Audit Management (V2.1 Domain 4, Modify) 4 Information Management and Data Security (V2.1 Domain 5, Modify) 5 Incident Response (V2.1 Domain 9, Reduce) 9 Identity, Entitlement, and Access Management (V2.1 Domain 12 + Entitlement) 12 Security as a Service (New Content) Conclusion In recent IT environment, the biggest issues are virtualization, cloud services, and big data technology. Cloud services have many advantages such as the resource efficiency by virtualization, reusability, and energy efficiency such that many cloud services, e.g., IaaS, PaaS, and SaaS are rapidly increased to provide the environment for saving and accessing documents and multimedia files. However, because the development of cloud services is based on the existing IT services, the problem has been pointed out that existing vulnerabilities and threats as well as virtualization and hypervisor vulnerabilities of information security problem exist. In this paper, in order to provide the view of security issues, we have been dealing with the issues of security threats and security technologies at the aspect of end users and providers. We also provided the security requirements for secured cloud computing services to cope with the new environment and additional security threats in cloud services. 28 Copyright c 2013 SERSC
9 References [1] I. Gul and M. Hussain, Distributed Cloud Intrusion Detection Model, International Journal of Advanced Science and Technology(IJAST), Vol. 34, pp.71-82(2011) [2] A.q ur Rehman and M.Hussain, Efficient Cloud Data Confidentiality for DaaS, International Journal of Advanced Science and Technology(IJAST), Vol. 34, pp.1-10(2011) [3] Shakeel Ahmad, Bashir Ahmad, Sheikh Muhammad Saqib and Rashid Muhammad Khattak, Trust Model: Cloud's Provider and Cloud's User, International Journal of Advanced Science and Technology(IJAST), Vol. 44, pp.69-80(2012) [4] S. Lee, Security Considerations for Public Mobile Cloud Computing, International Journal of Advanced Science and Technology(IJAST), Vol. 44, pp.81-88(2012) [5] G. S. Lee, D. G. Min and M. S. Jun, A Study on Authentication of Mobile Agency AP Connection Using Trusted Third Party in Smart Phone Environment, Journal of the Korea Academia-Industrial cooperation Society, Vol.13, No.11, (2012) [6] K. W. Lee and H. I. Jun, Mechanism of Multimedia Synchronization using Delay Jitter Time, Journal of the Korea Academia-Industrial cooperation Society, Vol.13, No.11, (2012), [7] S. Y. Min and S. J. Jang, A Study on the Protection of Personal Information using a Virtual IDs in an Anonymous Bulletin Board, Journal of the Korea Academia-Industrial cooperation Society, Vol.13, No.9, (2012) [8] Y. S. Bae, A Study of Effect of In Information Security Management System Certification on Organization Performance, Journal of the Korea Academia-Industrial cooperation Society, Vol.13, No.9, (2012) Authors Changsoo Lee received his B.S. degree in Computer Science from Hanseo University, Korea, in 1999, and M.S. and Ph.D. degrees in Computer Science from Soongsil University, Seoul, Korea, in 2002, and 2005, respectively. He is currently a researcher at network security lab in Soongsil University, Seoul, Korea. His research interests include multimedia applications and multimedia security, RFID/USN Solution. Daewon Jung received his B.S. degree in Electronics and Communications engineering from Kwangwoon University, Seoul, Korea in 2006, and his M.S. and Ph.D. degrees in Information and Communications from Gwangju Institute of Science and Technology, Gwangju, Korea, in 2008 and 2012, respectively. He has been working for the Attached Institute of Electronics and Telecommunications Research Institute since His research interests include performance evaluation and protocol design for wireless communication systems and distributed protocols in wireless networks. Keunwang Lee received his B.S. degree in Computer Science from Hanbat National University, Daejeon, Korea, in 1993, and M.S. and Ph.D. degrees in Computer Science from Soongsil University, Seoul, Korea, in 1996 and 2000, respectively. He is currently an Associate Professor in Chungwoon University, Chungnam, Korea. His research interests include multimedia communications, multimedia applications, mobile communications, and multimedia security. Copyright c 2013 SERSC 29
10 30 Copyright c 2013 SERSC
A Study of Key management Protocol for Secure Communication in Personal Cloud Environment
, pp.51-58 http://dx.doi.org/10.14257/ijsia.2014.8.4.05 A Study of Key management Protocol for Secure Communication in Personal Cloud Environment ByungWook Jin 1 and Keun-Wang Lee 2,* 1 Dept. of Computer
A Study on User Access Control Method using Multi-Factor Authentication for EDMS
, pp.327-334 http://dx.doi.org/10.14257/ijsia.2013.7.6.33 A Study on User Access Control Method using Multi-Factor Authentication for EDMS Keunwang Lee 1* 1 Dept.of Multimedia Science, Chungwoon University
Chapter 11 Cloud Application Development
Chapter 11 Cloud Application Development Contents Motivation. Connecting clients to instances through firewalls. Chapter 10 2 Motivation Some of the questions of interest to application developers: How
Keyword: Cloud computing, service model, deployment model, network layer security.
Volume 4, Issue 2, February 2014 ISSN: 2277 128X International Journal of Advanced Research in Computer Science and Software Engineering Research Paper Available online at: www.ijarcsse.com An Emerging
Security Issues in Cloud Computing
Security Issues in Computing CSCI 454/554 Computing w Definition based on NIST: A model for enabling ubiquitous, convenient, on-demand network access to a shared pool of configurable computing resources
Cloud Computing Security Issues and Access Control Solutions
보안공학연구논문지 (Journal of Security Engineering), 제 9권 제 2호 2012년 4월 Cloud Computing Security Issues and Access Control Solutions Young-Gi Min 1), Hyo-Jin Shin 2), Young-Hwan Bang 3) Abstract Cloud computing
Studying Security Weaknesses of Android System
, pp. 7-12 http://dx.doi.org/10.14257/ijsia.2015.9.3.02 Studying Security Weaknesses of Android System Jae-Kyung Park* and Sang-Yong Choi** *Chief researcher at Cyber Security Research Center, Korea Advanced
Security Threats on National Defense ICT based on IoT
, pp.94-98 http://dx.doi.org/10.14257/astl.205.97.16 Security Threats on National Defense ICT based on IoT Jin-Seok Yang 1, Ho-Jae Lee 1, Min-Woo Park 1 and Jung-ho Eom 2 1 Department of Computer Engineering,
A Study on Detection of Hacking and Malware Codes in Bare Metal Hypervisor for Virtualized Internal Environment of Cloud Service
78 A Study on Detection of Hacking and Malware Codes in Bare Metal Hypervisor for Virtualized Internal Environment of Cloud Service Jung-oh Park Dept. of Information Communications, DONGYANG MIRAE University,
Securing Smart City Platforms IoT, M2M, Cloud and Big Data
SESSION ID: SSC-W10 Securing Smart City Platforms IoT, M2M, Cloud and Big Data Ibrahim Al Mallouhi Vice President - Operations Emirates Integrated Telecommunication Company (du) Roshan Daluwakgoda Senior
Research on Operation Management under the Environment of Cloud Computing Data Center
, pp.185-192 http://dx.doi.org/10.14257/ijdta.2015.8.2.17 Research on Operation Management under the Environment of Cloud Computing Data Center Wei Bai and Wenli Geng Computer and information engineering
DRAFT Standard Statement Encryption
DRAFT Standard Statement Encryption Title: Encryption Standard Document Number: SS-70-006 Effective Date: x/x/2010 Published by: Department of Information Systems 1. Purpose Sensitive information held
Lecture 02b Cloud Computing II
Mobile Cloud Computing Lecture 02b Cloud Computing II 吳 秀 陽 Shiow-yang Wu T. Sridhar. Cloud Computing A Primer, Part 2: Infrastructure and Implementation Topics. The Internet Protocol Journal, Volume 12,
Jort Kollerie SonicWALL
Jort Kollerie Cloud 85% of businesses said their organizations will use cloud tools moderately to extensively in the next 3 years. 68% of spend in private cloud solutions. - Bain and Dell 3 Confidential
Chapter 1 The Principles of Auditing 1
Chapter 1 The Principles of Auditing 1 Security Fundamentals: The Five Pillars Assessment Prevention Detection Reaction Recovery Building a Security Program Policy Procedures Standards Security Controls
INCIDENT RESPONSE CHECKLIST
INCIDENT RESPONSE CHECKLIST The purpose of this checklist is to provide clients of Kivu Consulting, Inc. with guidance in the initial stages of an actual or possible data breach. Clients are encouraged
User Authentication Platform using Provisioning in Cloud Computing Environment
User Authentication Platform using Provisioning in Cloud Computing Environment Hyosik Ahn, Hyokyung Chang, Changbok Jang, Euiin Choi Dept. Of Computer Engineering, Hannam University, Daejeon, Korea {hsahn,
Cloud Computing Governance & Security. Security Risks in the Cloud
Cloud Computing Governance & Security The top ten questions you have to ask Mike Small CEng, FBCS, CITP Fellow Analyst, KuppingerCole This Webinar is supported by Agenda What is the Problem? Ten Cloud
Introduction to Cyber Security / Information Security
Introduction to Cyber Security / Information Security Syllabus for Introduction to Cyber Security / Information Security program * for students of University of Pune is given below. The program will be
Analysis of Cloud Computing Vulnerabilities
International Journal of Innovation and Scientific Research ISSN 2351-8014 Vol. 2 No. 2 Jun. 2014, pp. 308-312 2014 Innovative Space of Scientific Research Journals http://www.ijisr.issr-journals.org/
The following chart provides the breakdown of exam as to the weight of each section of the exam.
Introduction The CWSP-205 exam, covering the 2015 objectives, will certify that the successful candidate understands the security weaknesses inherent in WLANs, the solutions available to address those
Basics of Internet Security
Basics of Internet Security Premraj Jeyaprakash About Technowave, Inc. Technowave is a strategic and technical consulting group focused on bringing processes and technology into line with organizational
Remote Access Security
Glen Doss Towson University Center for Applied Information Technology Remote Access Security I. Introduction Providing remote access to a network over the Internet has added an entirely new dimension to
10/25/2012 BY VORAPOJ LOOKMAIPUN CISSP, CISA, CISM, CRISC, CEH [email protected]. Agenda. Security Cases What is Cloud? Road Map Security Concerns
BY VORAPOJ LOOKMAIPUN CISSP, CISA, CISM, CRISC, CEH [email protected] Agenda Security Cases What is Cloud? Road Map Security Concerns 1 Security Cases on Cloud Data Protection - Two arrested in ipad
John Essner, CISO Office of Information Technology State of New Jersey
John Essner, CISO Office of Information Technology State of New Jersey http://csrc.nist.gov/publications/nistpubs/800-144/sp800-144.pdf Governance Compliance Trust Architecture Identity and Access Management
A Study on IP Exposure Notification System for IoT Devices Using IP Search Engine Shodan
, pp.61-66 http://dx.doi.org/10.14257/ijmue.2015.10.12.07 A Study on IP Exposure Notification System for IoT Devices Using IP Search Engine Shodan Yun-Seong Ko 1, Il-Kyeun Ra 2 and Chang-Soo Kim 1* 1 Department
Developing the Corporate Security Architecture. www.avient.ca Alex Woda July 22, 2009
Developing the Corporate Security Architecture www.avient.ca Alex Woda July 22, 2009 Avient Solutions Group Avient Solutions Group is based in Markham and is a professional services firm specializing in
Security Management of Cloud-Native Applications. Presented By: Rohit Sharma MSc in Dependable Software Systems (DESEM)
Security Management of Cloud-Native Applications Presented By: Rohit Sharma MSc in Dependable Software Systems (DESEM) 1 Outline Context State-of-the-Art Design Patterns Threats to cloud systems Security
Securing The Cloud. Foundational Best Practices For Securing Cloud Computing. Scott Clark. Insert presenter logo here on slide master
Securing The Cloud Foundational Best Practices For Securing Cloud Computing Scott Clark Agenda Introduction to Cloud Computing What is Different in the Cloud? CSA Guidance Additional Resources 2 What is
a) Encryption is enabled on the access point. b) The conference room network is on a separate virtual local area network (VLAN)
MIS5206 Week 12 Your Name Date 1. Which significant risk is introduced by running the file transfer protocol (FTP) service on a server in a demilitarized zone (DMZ)? a) User from within could send a file
70 299 Implementing and Administering Security in a Microsoft Windows Server 2003 Network
70 299 Implementing and Administering Security in a Microsoft Windows Server 2003 Network Course Number: 70 299 Length: 1 Day(s) Course Overview This course is part of the MCSA training.. Prerequisites
Networking: EC Council Network Security Administrator NSA
coursemonster.com/uk Networking: EC Council Network Security Administrator NSA View training dates» Overview The EC-Council's NSA certification looks at network security from a defensive view. The NSA
Implementing Cisco IOS Network Security
Implementing Cisco IOS Network Security IINS v3.0; 5 Days, Instructor-led Course Description Implementing Cisco Network Security (IINS) v3.0 is a 5-day instructor-led course focusing on security principles
A Proxy-Based Data Security Solution in Mobile Cloud
, pp. 77-84 http://dx.doi.org/10.14257/ijsia.2015.9.5.08 A Proxy-Based Data Security Solution in Mobile Cloud Xiaojun Yu 1,2 and Qiaoyan Wen 1 1 State Key Laboratory of Networking and Switching Technology,
Cloud Security Through Threat Modeling. Robert M. Zigweid Director of Services for IOActive
Cloud Security Through Threat Modeling Robert M. Zigweid Director of Services for IOActive 1 Key Points Introduction Threat Model Primer Assessing Threats Mitigating Threats Sample Threat Model Exercise
Data Protection: From PKI to Virtualization & Cloud
Data Protection: From PKI to Virtualization & Cloud Raymond Yeung CISSP, CISA Senior Regional Director, HK/TW, ASEAN & A/NZ SafeNet Inc. Agenda What is PKI? And Value? Traditional PKI Usage Cloud Security
Cloud Computing: Risks and Auditing
IIA Chicago Chapter 53 rd Annual Seminar April 15, 2013, Donald E. Stephens Convention Center @IIAChicago #IIACHI Cloud Computing: Risks Auditing Phil Lageschulte/Partner/KPMG Sailesh Gadia/Director/KPMG
CTS2134 Introduction to Networking. Module 8.4 8.7 Network Security
CTS2134 Introduction to Networking Module 8.4 8.7 Network Security Switch Security: VLANs A virtual LAN (VLAN) is a logical grouping of computers based on a switch port. VLAN membership is configured by
IINS Implementing Cisco Network Security 3.0 (IINS)
IINS Implementing Cisco Network Security 3.0 (IINS) COURSE OVERVIEW: Implementing Cisco Network Security (IINS) v3.0 is a 5-day instructor-led course focusing on security principles and technologies, using
Fortinet Solutions for Compliance Requirements
s for Compliance Requirements Sarbanes Oxley (SOX / SARBOX) Section / Reference Technical Control Requirement SOX references ISO 17799 for Firewall FortiGate implementation specifics IDS / IPS Centralized
Cloud Security and Managing Use Risks
Carl F. Allen, CISM, CRISC, MBA Director, Information Systems Security Intermountain Healthcare Regulatory Compliance External Audit Legal and ediscovery Information Security Architecture Models Access
Software Defined Perimeter: Securing the Cloud to the Internet of Things
Software Defined Perimeter: Securing the Cloud to the Internet of Things SESSION ID: CDS-T08 Jim Reavis Chief Executive Officer Cloud Security Alliance @cloudsa About Cloud Security Alliance Global, not-for-profit
Chapter 1: Introduction
Chapter 1 Introduction 1 Chapter 1: Introduction 1.1 Inspiration Cloud Computing Inspired by the cloud computing characteristics like pay per use, rapid elasticity, scalable, on demand self service, secure
Security Model for VM in Cloud
Security Model for VM in Cloud 1 Venkataramana.Kanaparti, 2 Naveen Kumar R, 3 Rajani.S, 4 Padmavathamma M, 5 Anitha.C 1,2,3,5 Research Scholars, 4Research Supervisor 1,2,3,4,5 Dept. of Computer Science,
Security Issues in Cloud Computing
Security Issues in Cloud Computing Dr. A. Askarunisa Professor and Head Vickram College of Engineering, Madurai, Tamilnadu, India N.Ganesh Sr.Lecturer Vickram College of Engineering, Madurai, Tamilnadu,
IT Networking and Security
elearning Course Outlines IT Networking and Security powered by Calibrate elearning Course Outline CompTIA A+ 801: Fundamentals of Computer Hardware/Software www.medallionlearning.com Fundamentals of Computer
Network Security Administrator
Network Security Administrator Course ID ECC600 Course Description This course looks at the network security in defensive view. The ENSA program is designed to provide fundamental skills needed to analyze
SSL VPN Technology White Paper
SSL VPN Technology White Paper Keywords: SSL VPN, HTTPS, Web access, TCP access, IP access Abstract: SSL VPN is an emerging VPN technology based on HTTPS. This document describes its implementation and
The data which you put into our systems is yours, and we believe it should stay that way. We think that means three key things.
Privacy and Security FAQ Privacy 1. Who owns the data that organizations put into Google Apps? 2. When can Google employees access my account? 3. Who can gain access to my Google Apps administrative account?
Purpose. Service Model SaaS (Applications) PaaS (APIs) IaaS (Virtualization) Use Case 1: Public Use Case 2: Use Case 3: Public.
Federal CIO Council Information Security and Identity Management Committee (ISIMC) Guidelines for the Secure Use of Cloud Computing by Federal Departments and Agencies DRAFT V0.41 Earl Crane, CISSP, CISM
What Cloud computing means in real life
ITU TRCSL Symposium on Cloud Computing Session 2: Cloud Computing Foundation and Requirements What Cloud computing means in real life Saman Perera Senior General Manager Information Systems Mobitel (Pvt)
Is it Time to Trust the Cloud? Unpacking the Notorious Nine
Is it Time to Trust the Cloud? Unpacking the Notorious Nine Jonathan C. Trull, CISO, Qualys Cloud Security Alliance Agenda Cloud Security Model Background on the Notorious Nine Unpacking the Notorious
Did you know your security solution can help with PCI compliance too?
Did you know your security solution can help with PCI compliance too? High-profile data losses have led to increasingly complex and evolving regulations. Any organization or retailer that accepts payment
How To Secure Cloud Computing
Next Generation Cloud Computing Issues and Solutions Jeon SeungHwan 1, Yvette E. Gelogo 1 and Byungjoo Park 1 * 1 Department of Multimedia Engineering, Hannam University 133 Ojeong-dong, Daeduk-gu, Daejeon,
Why SaaS (Software as a Service) and not COTS (Commercial Off The Shelf software)?
SaaS vs. COTS Why SaaS (Software as a Service) and not COTS (Commercial Off The Shelf software)? Unlike COTS solutions, SIMCO s CERDAAC is software that is offered as a service (SaaS). This offers several
EUCIP - IT Administrator. Module 5 IT Security. Version 2.0
EUCIP - IT Administrator Module 5 IT Security Version 2.0 Module 5 Goals Module 5 Module 5, IT Security, requires the candidate to be familiar with the various ways of protecting data both in a single
Strategic Compliance & Securing the Cloud. Annalea Sharack-Ilg, CISSP, AMBCI Technical Director of Information Security
Strategic Compliance & Securing the Cloud Annalea Sharack-Ilg, CISSP, AMBCI Technical Director of Information Security Complexity and Challenges 2 Complexity and Challenges Compliance Regulatory entities
VMware vcloud Air Security TECHNICAL WHITE PAPER
TECHNICAL WHITE PAPER The Shared Security Model for vcloud Air The end-to-end security of VMware vcloud Air (the Service ) is shared between VMware and the customer. VMware provides security for the aspects
Key Management Issues in the Cloud Infrastructure
Key Management Issues in the Cloud Infrastructure Dr. R. Chandramouli (Mouli) [email protected] Dr. Michaela Iorga [email protected] (Information Technology Lab, NIST, USA) ARO Workshop on Cloud Computing
A SURVEY OF CLOUD COMPUTING: NETWORK BASED ISSUES PERFORMANCE AND ANALYSIS
A SURVEY OF CLOUD COMPUTING: NETWORK BASED ISSUES PERFORMANCE AND ANALYSIS *Dr Umesh Sehgal, #Shalini Guleria *Associate Professor,ARNI School of Computer Science,Arni University,[email protected]
KeyLock Solutions Security and Privacy Protection Practices
KeyLock Solutions Overview KeyLock Solutions hosts its infrastructure at Heroku. Heroku is a cloud application platform used by organizations of all sizes to deploy and operate applications throughout
Cloud Security. Peter Jopling [email protected] IBM UK Ltd Software Group Hursley Labs. peterjopling. 2011 IBM Corporation
Cloud Security Peter Jopling [email protected] IBM UK Ltd Software Group Hursley Labs peterjopling 2011 IBM Corporation Cloud computing impacts the implementation of security in fundamentally new ways
SECURITY CONCERNS AND SOLUTIONS FOR CLOUD COMPUTING
SECURITY CONCERNS AND SOLUTIONS FOR CLOUD COMPUTING 1. K.SURIYA Assistant professor Department of Computer Applications Dhanalakshmi Srinivasan College of Arts and Science for Womren Perambalur Mail: [email protected]
Cloud Computing Standards: Overview and ITU-T positioning
ITU Workshop on Cloud Computing (Tunis, Tunisia, 18-19 June 2012) Cloud Computing Standards: Overview and ITU-T positioning Dr France Telecom, Orange Labs Networks & Carriers / R&D Chairman ITU-T Working
Overview of Network Security The need for network security Desirable security properties Common vulnerabilities Security policy designs
Overview of Network Security The need for network security Desirable security properties Common vulnerabilities Security policy designs Why Network Security? Keep the bad guys out. (1) Closed networks
How To Protect Your Cloud Computing Resources From Attack
Security Considerations for Cloud Computing Steve Ouzman Security Engineer AGENDA Introduction Brief Cloud Overview Security Considerations ServiceNow Security Overview Summary Cloud Computing Overview
86 Int. J. Engineering Systems Modelling and Simulation, Vol. 6, Nos. 1/2, 2014
86 Int. J. Engineering Systems Modelling and Simulation, Vol. 6, Nos. 1/2, 2014 Dual server-based secure data-storage system for cloud storage Woong Go ISAA Lab, Department of Information Security Engineering,
Information Security Basic Concepts
Information Security Basic Concepts 1 What is security in general Security is about protecting assets from damage or harm Focuses on all types of assets Example: your body, possessions, the environment,
EC-Council Network Security Administrator (ENSA) Duration: 5 Days Method: Instructor-Led
EC-Council Network Security Administrator (ENSA) Duration: 5 Days Method: Instructor-Led Certification: ENSA Exam 312-38 Course Description This course looks at the network security in defensive view.
A Study on the Live Forensic Techniques for Anomaly Detection in User Terminals
A Study on the Live Forensic Techniques for Anomaly Detection in User Terminals Ae Chan Kim 1, Won Hyung Park 2 and Dong Hoon Lee 3 1 Dept. of Financial Security, Graduate School of Information Security,
Enterprise Cybersecurity Best Practices Part Number MAN-00363 Revision 006
Enterprise Cybersecurity Best Practices Part Number MAN-00363 Revision 006 April 2013 Hologic and the Hologic Logo are trademarks or registered trademarks of Hologic, Inc. Microsoft, Active Directory,
The Design and Implementation of the Integrated Model of the Advertisement and Remote Control System for an Elevator
Vol.8, No.3 (2014), pp.107-118 http://dx.doi.org/10.14257/ijsh.2014.8.3.10 The Design and Implementation of the Integrated Model of the Advertisement and Remote Control System for an Elevator Woon-Yong
SECURITY MODELS FOR CLOUD 2012. Kurtis E. Minder, CISSP
SECURITY MODELS FOR CLOUD 2012 Kurtis E. Minder, CISSP INTRODUCTION Kurtis E. Minder, Technical Sales Professional Companies: Roles: Security Design Engineer Systems Engineer Sales Engineer Salesperson
Cloud-Security: Show-Stopper or Enabling Technology?
Cloud-Security: Show-Stopper or Enabling Technology? Fraunhofer Institute for Secure Information Technology (SIT) Technische Universität München Open Grid Forum, 16.3,. 2010, Munich Overview 1. Cloud Characteristics
Cloud and Security (Cloud hacked via Cloud) Lukas Grunwald
Cloud and Security (Cloud hacked via Cloud) Lukas Grunwald About DN-Systems Global Consulting and Technology Services Planning Evaluation Auditing Operates own Security Lab Project Management Integral
STORAGE SECURITY TUTORIAL With a focus on Cloud Storage. Gordon Arnold, IBM
STORAGE SECURITY TUTORIAL With a focus on Cloud Storage Gordon Arnold, IBM SNIA Legal Notice The material contained in this tutorial is copyrighted by the SNIA. Member companies and individual members
Cloud Database Storage Model by Using Key-as-a-Service (KaaS)
www.ijecs.in International Journal Of Engineering And Computer Science ISSN:2319-7242 Volume 4 Issue 7 July 2015, Page No. 13284-13288 Cloud Database Storage Model by Using Key-as-a-Service (KaaS) J.Sivaiah
CLOUD STORAGE SECURITY INTRODUCTION. Gordon Arnold, IBM
CLOUD STORAGE SECURITY INTRODUCTION Gordon Arnold, IBM SNIA Legal Notice The material contained in this tutorial is copyrighted by the SNIA. Member companies and individual members may use this material
Technical Standards for Information Security Measures for the Central Government Computer Systems
Technical Standards for Information Security Measures for the Central Government Computer Systems April 21, 2011 Established by the Information Security Policy Council Table of Contents Chapter 2.1 General...
Survey on Security Attacks and Solutions in Cloud Infrastructure
Survey on Security Attacks and Solutions in Cloud Infrastructure Shilpa D 1, Nagashree C 2, Divya C 3, Spurthi G S 4 Assistant Professor, Department of Computer Science and Engineering, SVIT, Bangalore,
SVN5800 Secure Access Gateway
The development of networks allows enterprises to provide remote access to branch offices, partners, customers, mobile employees, and home offices so that they can access application and data resources,
Security Threats in Cloud Computing Environments 1
Security Threats in Cloud Computing Environments 1 Kangchan Lee Electronics and Telecommunications Research Institute [email protected] Abstract Cloud computing is a model for enabling service user s ubiquitous,
A Research on Security Awareness and Countermeasures for the Single Server
, pp.31-42 http://dx.doi.org/10.14257/ijsia.2013.7.6.04 A Research on Security Awareness and Countermeasures for the Single Server Hyuk-Jin Son 1 and Seungdo Jeong 2,* 1 IT MBA, Graduate School of Business
Secure Authentication for the Development of Mobile Internet Services Critical Considerations
Secure Authentication for the Development of Mobile Internet Services Critical Considerations December 2011 V1 Mobile Internet Security Working Group, SIMalliance AGENDA SIMalliance presentation What s
CH ENSA EC-Council Network Security Administrator Detailed Course Outline
CH ENSA EC-Council Network Security Administrator Detailed Course Outline Summary Duration Vendor Audience 5 Days hands-on training EC-Council Security Professionals Level Technology Category Advance Ethical
Live Guide System Architecture and Security TECHNICAL ARTICLE
Live Guide System Architecture and Security TECHNICAL ARTICLE Contents 1. Introduction... 2 2. Hosting Environment... 2 2.1. Standards - Compliancy... 3 2.2. Business Continuity Management... 3 2.3. Network
CIS 253. Network Security
CIS 253 Network Security Approved: May 6, 2011 EFFECTIVE DATE: Fall 2011 COURSE PACKAGE FORM Team Leader and Members Andra Goldberg, Matt Butcher, Steve Sorden, Dave White Date of proposal to Curriculum
A Survey on Cloud Security Issues and Techniques
A Survey on Cloud Security Issues and Techniques Garima Gupta 1, P.R.Laxmi 2 and Shubhanjali Sharma 3 1 Department of Computer Engineering, Government Engineering College, Ajmer [email protected]
EXIN Cloud Computing Foundation
Sample Questions EXIN Cloud Computing Foundation Edition April 2013 Copyright 2013 EXIN All rights reserved. No part of this publication may be published, reproduced, copied or stored in a data processing
A Study on Integrated Operation of Monitoring Systems using a Water Management Scenario
, pp. 55-64 http://dx.doi.org/10.14257/ijseia.2015.9.9.06 A Study on Integrated Operation of Monitoring Systems using a Water Management Scenario Yong-Hyeon Gwon 1, Seung-Kwon Jung 2, Su-Won Lee 2 and
A Research Using Private Cloud with IP Camera and Smartphone Video Retrieval
, pp.175-186 http://dx.doi.org/10.14257/ijsh.2014.8.1.19 A Research Using Private Cloud with IP Camera and Smartphone Video Retrieval Kil-sung Park and Sun-Hyung Kim Department of Information & Communication
