Cloud Computing - Unit5
Cloud Computing - Unit5
Cloud Computing - Unit5
Unit 5
Infosys believes the information in this document is accurate as of its publication date;
such information is subject to change without notice. Infosys acknowledges the
proprietary rights of other companies to the trademarks, product names and such other
intellectual property rights mentioned in this document. Except as expressly permitted,
neither this documentation nor any part of it may be reproduced, stored in a retrieval
system, or transmitted in any form or by any means, electronic, mechanical, printing,
photocopying, recording or otherwise, without the prior permission of Infosys Limited
and/ or any named intellectual property rights holders under this document.
To address issues like zero downtime, scalability, 24/7 support, variable load handling,
deploying the application on cloud will prove to be more efficient compared to traditional
client-server architecture
But, what will be the problems faced while moving from client-server to cloud computing?
• Choosing the deployment model (private, public, hybrid)
• Choosing the Service model (IaaS, PaaS, SaaS)
• Choosing appropriate security model based on service and deployment models chosen.
Virtual
Machine
• We have control Virtual
Machine • Who has control?
• It is located at X • Where is it located?
• It is stored in A,B • Where is it Stored?
• We have backup • Who backs it up?
• Our admins • Who has access?
control access
On-Premise On-Cloud
. Multiple API’s
API 2 Multiple Applications in Single
API 1 API 3 Server
Multiple Cloud Providers
App App
B A 1 2
Server
Server
Network
Network
• Cloud security
• Is a collection of processes and techniques which are formulated to protect client’s
infrastructure and data from security attacks.
• Provides protection to the delivery models
• Private cloud
• Public cloud
• Hybrid cloud
• Is the combined responsibility of the CSP and the client organization
Traditional Cloud
IT Infrastructure is the responsibility of The Cloud service providers are responsible
customer for providing IT Infrastructure
Customers have complete access to data Customers have limited access to data and
and application logs application logs
Customer data and applications stays inside Customer data and applications are
company firewall exposed to outside world
• Criminals misuse cloud fundamentals to widen their reach and make their activities
more effective .
• Feeble registrations mechanisms and poor fraud detection processes attract cloud
computing threats.
• They use cloud computing for attacking, hosting illegal data, controls the bots ,issue
them commands and farms to solve CAPTCHA (Completely Automated Public Turing
test to tell Computers and Humans Apart).
Service Models : laaS, PaaS
Remediation :
– Initial registration and validation processes should be stern
– Strong fraud monitoring mechanisms for credit card payments
– Thorough analysis of network traffic at customer’s end
• Malicious Insiders refers to the employee/insiders of the CSP who may have full access
the client’s data.
• Such situations may give opportunities to insiders to misuse the data and may lead to
hacking
• This may impact the CSP’s brand and finances
Business Overview:
Trend Micro Inc. is a major security solutions provider. The company was
incorporated in 1988, is listed on the Tokyo Stock Exchange, and is headquartered
in Tokyo, Japan.
Strengths:
– The company is the leader in both the Cloud Security and Virtualization
Security markets
– Its solutions provide granular fine detailed control, providing a policy-based
approach to key management and data access
Weaknesses:
– It draws the majority of its revenue, at 41 percent from Japan; thus, it has a
geographic diversification risk
Business Overview :
McAfee Inc., founded in 1987, is a leading provider of network security solutions. The
company’s security products are for sectors such as Data Protection, Email and Web
Security, Endpoint Protection, Mobile Security, Network Security, Risk and
Compliance, Security SaaS, and Security Management
Strengths:
• The company’s cloud access control solution allows control over the entire lifecycle
of cloud access security, providing technologies and solutions such as strong
authentication, authorization, and audit
• Its cloud security solution allows fine granular authorization
Weaknesses:
• Some of its competitors, such as Trend Micro, provides better key management
options/features
Business Overview:
CA Technologies is one of the leading independent software corporations in the
world. The company has technology alliances with other players such as VMware,
Salesforce.com, Microsoft Corp., Cisco, and SAP
Strengths:
• The company acquired Arcot which has provided it with a stronger advanced
authentication technology
Weaknesses:
• Despite having a strong identity and an access control product, the solutions from
some of its competitors fare slightly better on the identity management features front
Business Overview:
Symplified Inc., founded in 2006 and based in the US, is a leading cloud identity
management provider. It provides solutions such as Symplified Access Manager,
Symplified Identity Manager, Symplified Sign-On, and Symplified SinglePoint PaaS
Strengths:
• It has a much stronger and better cloud security solutions, purposely built for
specific cloud architectures
Weaknesses:
• It is not as strong in other spaces such as application security, encryption, and
access control
Business Overview :
Symantec Corporation is an American global computer security software corporation
headquartered in Mountain View, California. It is a Fortune 500 company. Products
are Control Compliance Suite, Data Loss Prevention Suite and Encryption ,VeriSign
Identify and Authentication, Symantec Web Security cloud
Strengths:
• Roaming and remote user support options are available for distributed workers.
• Provides access to a dedicated team of SaaS specialists who understand the
importance of service excellence.
Weaknesses:
• Symantec network was hacked and norton source code was stolen