Premium Essay

Cloud Security

In:

Submitted By Obitech72
Words 322
Pages 2
threat landscape is fundamentally different with the proliferation of mobile, web and cloud based applications supported by third parties. The need for third party software security is so essential that a group of security leaders from the highly competitive financial services sector established a working group through the Financial Services Information Sharing and Analysis Center (FS-ISAC) to provide guidance for the rest of the industry on additive controls to address software security. Though the goal of this working group is to help improve security at financial organizations, enterprises of all kinds can and should adopt this new guidance to address the increasing danger posed by third party applications.

Every industry uses third party software to increase employee productivity, deliver the latest technology to their customers and maintain relevancy in evolving markets. In the financial services industry, this has manifested with mobile payments, hip web interfaces, and banks going social, just to name a few. Financial services has long worked to apply effective controls and protect the sensitive data flowing through these slick applications through the Financial Services Roundtable (BITS) or FS-ISAC. Though there are established controls for protecting information from software vulnerabilities of third party service and software providers, what is not established is how to ensure secure software development practices are applied by those third parties that develop software used by banks, mortgage lenders, and insurance companies.

Spearheading the need to address this risk, a group of ten leading financial service firms came together to identify and recommend control types for securing third party software development.

The working group set out to improve information protection for third party software used to process sensitive data, whether the

Similar Documents

Premium Essay

Cloud and Security

...The Reality about Clouds and the Security Challenges They Pose Clouds are an extremely practical and obvious solution to data storage management. However, there is a critical need to securely store, manage, and share (structured and unstructured) amounts of data. “The major security challenge with clouds is that the owner of the data may not have control of where the data is placed. Therefore, we need to safeguard the data in the midst of untrusted processes. There are numerous security issues for cloud computing. For example, the networks that connects the system in a cloud has to be secure. Mapping the virtual machines to the physical machines has to be carried at securely. Since data in the cloud will be placed anywhere, it is important that the data is encrypted. As a result, it is critical that this data be protected and only given to authorized individuals. Access control is a key concern, because insider attacks are a huge risk. A cloud can be private or public. A public cloud sells services to anyone on the Internet. (Currently, Amazon Web Services is the largest public cloud provider.) A private cloud is a proprietary network or a data center that supplies hosted services to a limited number of people. When a service provider uses public cloud resources to create their private cloud, the result is called a virtual private cloud. Private or public, the goal of cloud computing is to provide easy, scalable access to computing resources and IT services (Rouse, M. 2013)...

Words: 638 - Pages: 3

Premium Essay

Security in the Cloud

...Problem Statement Discussion and Justification Cloud users face security threats both from outside and inside the cloud. Many of the security issues involved in protecting clouds from outside threats are similar to those already facing large data centers. In the cloud, however, this responsibility is divided among potentially many parties, including the cloud user, the cloud vendor, and any third-party vendors that users rely on for security-sensitive software or configurations. The cloud user is responsible for application-level security. The cloud provider is responsible for physical security, and likely for enforcing external firewall policies. Security for intermediate layers of the software stack is shared between the user and the operator; the lower the level of abstraction exposed to the user, the more responsibility goes with it. While cloud computing may make external-facing security easier, it does pose the new problem of internal-facing security. Cloud providers must guard against theft or denial-of-service attacks by users. Users need to be protected from one another. The primary security mechanism in today's clouds is virtualization. It is a powerful defense, and protects against most attempts by users to attack one another or the underlying cloud infrastructure. However, not all resources are virtualized and not all virtualization environments are bug-free. Virtualization software has been known to contain bugs that allow virtualized code to "break loose" to some...

Words: 2433 - Pages: 10

Premium Essay

Cloud Computing Security

...Cloud Computing Security Mohamed Y. Shanab, Yasser Ragab, Hamza nadim Computing & Information Technology AAST Cairo, Egypt {myshanab, yasseritc, hamzanadim }@gmail.com Abstract-- In the past two decades, data has been growing in a huge scale making it almost impossible to store, maintain and keep all data on premises , thus emerged the idea of cloud computing and now it’s becoming one of the most used services used by firms, organizations and even governments. But its security risks are always a concern and a major setback. In this paper we talk about those risks and the most feared ones and what are the latest techniques to overcome them, we also discuss a solution on cloud computing based on a fully homomorphic encryption Key Words -- Cloud computing , Cloud computing security, Challenges, Privacy, Reliability, Fully homomorphic encryption. interaction. This cloud model promotes availability and is composed of five essential characteristics, three service models, and four deployment models." [1] II. TOP BENEFITS OF CLOUD COMPUTING  Achieve economies of scale. increase volume output or productivity with fewer people. Your cost per unit, project or product plummets. Reduce spending on technology infrastructure. Maintain easy access to your information with minimal upfront spending. Pay as you go (weekly, quarterly or yearly), based on demand. Globalize your workforce on the cheap.People worldwide can access the cloud, provided they have an Internet connection....

Words: 4691 - Pages: 19

Premium Essay

Cloud Security Issues

...net/publication/259072387 Cloud Computing Security Issues and Challenges ARTICLE · JANUARY 2011 CITATIONS READS 13 20,419 1 AUTHOR: Ibikunle Ayoleke Botswana International University of Science… 29 PUBLICATIONS 30 CITATIONS SEE PROFILE All in-text references underlined in blue are linked to publications on ResearchGate, letting you access and read them immediately. Available from: Ibikunle Ayoleke Retrieved on: 13 February 2016 Kuyoro S. O., Ibikunle F. & Awodele O. Cloud Computing Security Issues and Challenges Kuyoro S. O. afolashadeng@gmail.com Department of Computer Science Babcock University Ilishan-Remo, 240001, Nigeria Ibikunle F. faibikunle2@yahoo.co.uk Department of Computer Science Covenant University Otta, 240001, Nigeria Awodele O. delealways@yahoo.com Department of Computer Science Babcock University Ilishan-Remo, 240001, Nigeria Abstract Cloud computing is a set of IT services that are provided to a customer over a network on a leased basis and with the ability to scale up or down their service requirements. Usually cloud computing services are delivered by a third party provider who owns the infrastructure. It advantages to mention but a few include scalability, resilience, flexibility, efficiency and outsourcing non-core activities. Cloud computing offers an innovative business model for organizations to adopt IT services without upfront investment. Despite the potential gains achieved from the cloud computing...

Words: 4240 - Pages: 17

Premium Essay

Cloud Security Planning

...Cloud Security Planning Abstract Cloud systems as new online storage and computing systems provide great potentials to all businesses and organizations of creating new approach of storage and computing; cloud system guarantee that all your files and valuable data can be accessed and recovered from anywhere in the world, providing a new meaning of technology. Unfortunately and as to what happen with all emerging technologies there are new threats, risks, breaches, and problems arise with such technologies. They are considered challenges that vary from configuration problems to security breaches to harmful attacks; which may cost the company large losses and in some time financial disasters. In this case study we will try to identify the major threats that may affect the cloud security negatively which can be divided into three major categories: 1. Attackers and threats: where the attacks are no longer limited by breaching the data on someone’s personal computer. It became larger wider and involves more organized crimes. 2. Developed Structure technologies: the amount of data and information used today provides great challenges to system engineers and security designers to visualize and utilize their system to isolate and protect the data on them. 3. Regularity environment challenges: Most companies and IT departments are facing great challenges to meet the laws, legal requirements and consistency acquiescence especially with growth of demand on cloud systems. ...

Words: 2955 - Pages: 12

Premium Essay

Cloud Computing and Information Security

...Cloud Computing and Information Security Krystal Hagi Daytona State College Student Khagi1@yahoo.com Abstract In order to discuss the security of information in cloud computing, we must first cover what is Cloud Computing. There are many types of cloud computing services, such as, SaaS, PaaS, IaaS, public clouds, private clouds, and hybrid clouds Examples. They all work similarly but have not only different tools, but varying levels of security for various needs. These differing types of clouds and networks as a service offer off site data storage in a secured location, which in essence frees up space and virtual infrastructure for personal and/or business networks, and devices. There are advantages and disadvantages to cloud computing, just like any other product or service. The advantages being, storage for data, accessibility from virtually anywhere there is a network connection, automated management, security, apps, tools, etc. The disadvantages include monthly costs for space on the offsite network, security, involvement of a third party, no access to the physical structure - which means if the cloud server goes down, your data may not be accessible, etc. There is one instance with cloud computing that is both an advantage and a disadvantage, and that is the security. While a cloud may be more secure than your own network How?, personal or business, using cloud services puts the security out of your hands in both the physical and logical sense. Using a cloud, means the...

Words: 4955 - Pages: 20

Free Essay

Cloud Computing and Erp Security

...|RESEARCH PROPOSAL | |On | |CLOUD COMPUTING AND SECUTITY | |Submitted | |for Ph.D. Approval | | | | | |By Mr. MBANZABUGABO Jean Baptiste(BE,MSSE,MCA) | TABLE OF CONTENTS ABSTRACT..................................................................................................3 1. INTRODUCTION........................................................................................4 1. GENERAL OBJECTIVE OF THE STUDY.................................................................................................. 5 2. SPECIFIC OBJECTIVES .......................................................................5 2. LITERATURE REVIEW ...........................................................................6 3. METHODOLOGY...

Words: 6240 - Pages: 25

Premium Essay

Security Considerations for Cloud Computing

...Security Considerations for Cloud Computing Carlos Chandler Abstract Cloud computing is an emerging Information Technology (IT) model whereby a company utilizes a pay-per-use service for it computing needs rather than maintain a local data center run by its in-house IT department. By treating computing resources as a commodity or operating expense, it allows firms to focus less on IT and more on the core elements of the operations strategy. Because of advantages like this, its popularity has grown exponentially in recent years. However, cloud computing also has certain inherent risks in its present form. This paper seeks to understand the key advantages driving businesses to adopt this computing model in ever increasing numbers, while at the same time understanding what risks they are taking in doing so. To gain insight into these risks, this paper incorporates statistical research into what experts in the field believe to be the greatest down-sides to converting to this increasingly common IT model. Security Considerations for Cloud Computing What is Cloud Computing, Anyway? To begin, let us illustrate what cloud computing is. Imagine you run a cookie baking business that takes orders from around the country via an online store. To handle the orders, would your business buy a fleet of trucks and deliver its own shipments, or would you simply contract with UPS or FedEx to ship the orders on your behalf? Clearly the cost efficiencies in contracting the shipping...

Words: 1965 - Pages: 8

Premium Essay

Cloud Hooks: Security and Privacy Issues in Cloud Computing

...Proceedings of the 44th Hawaii International Conference on System Sciences - 2011 Cloud Hooks: Security and Privacy Issues in Cloud Computing Wayne A. Jansen, NIST Abstract In meteorology, the most destructive extratropical cyclones evolve with the formation of a bent-back front and cloud head separated from the main polar-front, creating a hook that completely encircles a pocket of warm air with colder air. The most damaging winds occur near the tip of the hook. The cloud hook formation provides a useful analogy for cloud computing, in which the most acute obstacles with outsourced services (i.e., the cloud hook) are security and privacy issues. This paper identifies key issues, which are believed to have long-term significance in cloud computing security and privacy, based on documented problems and exhibited weaknesses. • applications can be developed upon and deployed. It can reduce the cost and complexity of buying, housing, and managing hardware and software components of the platform. Infrastructure-as-a-Service (IaaS) enables a software deployment model in which the basic computing infrastructure of servers, software, and network equipment is provided as an on-demand service upon which a platform to develop and execute applications can be founded. It can be used to avoid buying, housing, and managing the basic hardware and software infrastructure components. 1. Introduction Cloud computing has been defined by NIST as a model for enabling convenient, on-demand...

Words: 7808 - Pages: 32

Premium Essay

The Effects of Cloud Computing on Enterprises N Terms of Cost and Security

...Concept of cloud computing was started in 2000s. Once this was introduced it has created a new business model and platform for many online business and technologies. To store any kind of data local servers will be used. But in today’s world with internet, the practice of using servers and networks on internet for storing, processing and managing any kind of data online is the concept of cloud computing (Margaret Rouse, 2015). Through this, both its platform and type of applications can be described, cloud computing provides its services in several layers to its users. By using this technology and internet applications can be run based on large data centers and servers. Cloud computing has gone through number of several phases including grid and utility computing (Margaret Rouse, 2015). Many enterprises have already started to implement cloud computing by knowing the potential of this technology. In 2012 according to IDG reports, (IDG ENTERPRISE MARKETING, 2016) the usage of cloud computing was 12% and by 2014 the number increased to 69% with the humongous change. The main reasons for many of enterprises to adopt to this technology was its cost and the flexibility to run any application faster than by the traditional method. Few features in could computing and its business functions like data analytics, data and storage management content management, conferencing solutions and collaborations. By 2015, 24% of enterprises used cloud computing for standardizing their IT budgets...

Words: 1234 - Pages: 5

Free Essay

Powerpoint

...1.With Google Glasses, the technology disappears from in front of you and you get data and applications in the context of what you’re doing or what you’re looking at. Want to know the weather right now? You won’t have to find the weather app and click on it to get a report. Weather apps for Google Glass will know when you’re looking up at the clouds and provide you with an instant weather report. If you’re unsure of what’s at a particular street address, look at the premises and Google Glass will tell you who’s inside, and possibly even show you the indoor plans along with a 360° panorama view if it’s a business. 2. Google Glass introduces absolutely new way of computing, with a simple, voice-driven user interface that makes a number of tasks much more intuitive. There are some examples of these: 3. To start using Google Glass, you tap the frame of the glasses and you’re taken to the home screen. You don’t see a bunch of icons like on smartphone home screen, just a simple real-life scene you’re looking at. To issue a command, you tap the frame and say “OK Glass”. 4. After you issue the order “OK Glass”, you can instruct the glasses to do something specific by saying something like “take a picture”. That’s it. There’s no fumbling around looking for the camera icon. 5. Same goes with video. With Google Glass, you can record what you see without moving a finger. 6. Now this is what calls serious sharing — actually sharing what you see with your friends . 7. Lost...

Words: 380 - Pages: 2

Free Essay

Weather

...More than 80 people and their pets had to be rescued by boat from their flooded homes after more than seven inches of rain fell Saturday and Sunday in Louisville, Kentucky. The National Weather Service declared a flash flood emergency for Louisville early Sunday due to back-to-back thunderstorms that began Saturday.. First floor apartments were flooded and vehicles were swallowed by high waters after 5.91 inches fell in Louisville on Saturday alone, according to the Weather Channel. Flooding closed at least 45 roads. Authorities say more than 80 people were rescued or evacuated thanks to seven-inches of rainfall that fell in 36 hours. NBC's Kerry Sanders reports. "I was lying there sleeping, kids woke me up, looked out, I couldn't believe it," evacuee Vickie Dedrick told NBC affiliate WAVE in Louisville. "Just a little bit of water on the road, next thing you know it looks like a tidal wave come through; looks like all cars washed off," added evacuee Mark Elliott. No injuries were reported, but at least 45 roads were closed and many homes and cars were damaged, according to the Courier-Journal. According to the National Weather Service, a record 5.91 inches of rain fell on Saturday, breaking the day's old record of 3.07 inches of rain set on October 5, 1910, WAVE reported. The deluge also already breaks the local all-time record for rainfall the month of October: The previous record was 5.07 inches set in 2004. The National Weather Service reports...

Words: 274 - Pages: 2

Premium Essay

One Night

...would go away. As I am in my window I start to feel my house lift from the ground swirling round and round. I ran to my parent’s bedroom to make sure they were alright; attempting to open up the door they seemed to be a strong force preventing me from getting in so I yelled mom/dad as loud as I could but there was no response. Next I sprinted down the stairs to my brother’s room and tried to open the door but his was locked. Feeling hopeless and afraid I ran back to my bedroom and got underneath my covers. I started to pray that this was all a bad dream that I would soon wake up from, the rain came to a halt and the winds began to settle. As I pulled the covers from off of my head, then got out of the bed to go the window I notice clouds of fog surrounding the house. What I thought was a bad dream was not so bad after all; there were stuffed animals and candy everywhere. I notice that when I walked it was as if I was floating on thin air like there was nothing beneath me. Everything was in slow motion, I thought to myself wow is this what every kid experiences the night before they turn 6 years old. As I am starting to feel a sigh of relief I was awaken by my entire family and friends singing happy birthday. They were carrying my birthday cake into my bedroom with big stuffed animals, toys and candy. I must say I’ve had a lot of crazy dreams, but this is one I will never...

Words: 366 - Pages: 2

Free Essay

Disaster

...condenses it releases heat * Warm air is less dens than cold air, the added heat will make the rising air continue in an updraft * If updrafts push air high enough into the atmosphere, the water droplets freeze in the tops of cumulonimbus clouds( tall clouds that rise to high altitudes and spread to form wide, flat, anvil-shaped tops. * Cold air pushing under warm air is a common mechanism triggering system for these storms * Thunderstorms average 24 kil across but can travel as much as 1000 killometers * Lightning is a result of a charge separation from the top and bottom of the cumulonimbus clouds * Charge separation increases as particles are carried in updrafts toward the top of the clouds and collide with the downwards moving ice particles or hail * Enormous electrical separation or potential between different parts of the cloud and between the clouds and the ground. * Electrical resistance cannot keep the opposite charges apart and the positive and negative charges rejoin and with an electrical lightning stroke * Cloud to ground lightning is generated when charged ions in a thundercloud discharge to the best conducting location on the ground * Lightning strikes from cloud to cloud to equalize its charges * Lightning is visible because of the difference between the speed of light and the...

Words: 410 - Pages: 2

Premium Essay

Kean University Essay

...“Rain, rain go away, come again some other day.” On September 9, 2012 as I sat on the beach with my family for their annual so long to summer picnic, dark clouds rolled in and it started to rain lightly. We were at first amused at the situation, but then had to decide whether to pack up and leave or stay and make the most of the day. Some sheltered under the beach umbrellas, while others shredded their clothes and went out into the rain in their bathing suits. The situation was amusing but frustrating. We laughed and wondered how it was that they could be so wrong sometimes and then hit it on the head at other times. In a matter of one hour the dark clouds and rain moved northward and the sun was shining brilliantly. . While I watched the skies and ocean, and felt the windswept sand hit my body, it came to mind that the weather and how it affects us would be a great career choice. Since I was young, I had an interest in the weather. Every morning I would look at the weather predictions to determine how to dress, and what outdoor activities I would be able to do. I am a skateboarder, and in the summer I go to the beach frequently, so the weather does affect the planning of my day. The weather is interesting, dangerous, and can be life altering for some people. Used as an event planner for many day to day activities, for agriculture, flight planning, fishing excursions and even planning military maneuvers, the weather is an important factor in our lives. In addition...

Words: 758 - Pages: 4