Professional Documents
Culture Documents
LRP BASED ON
Speeches & Workshops attended White Papers & Friends
Institute of Electronics & Telecommunications Engineers
Institution of Engineers
Conclude
20 25 Min drive
SECURITY
Basic Introduction
CLOUD COMPUTING
Offers Computing as a Service Provisions service in a timely on demand manner
VIRTUALISATION
Provisions running multiple OS on a single Physical System and share underlying hardware resources
speed
performa nce
Traditional Server
slow
efficiency
Purana zamana?
APPLN OS STORAGE
APPLN OS STORAGE
APPLN OS STORAGE
APPLN OS STORAGE
APPLN OS STORAGE
APPLN OS STORAGE
APPLN OS STORAGE
APPLN OS STORAGE
SYSTEM ADMINISTRATORS
Servers taken as a whole unit that incl Hardware, the OS,the Storage and the Applications
SERVERS
Often referred to by their functions ie the Exchange server, the SQL Server or the File Server etc.
OVERTAXED?
If any of the servers is overtaxed,then the System Administrator must add in a new server.
MULTIPLE SERVERS
Unless there are multiple servers,if a service experiences a HW failure, then the service is down.
CLUSTERING ?
Clustering can be implemented to make them more fault tolerant. However, even clusters have limits on their scalability and not all applications work in a clustered environment.
-Under utilized HW
-Vulnerable to HW outrages
-Not Very scalable -Difficult to replicate -Redundancy issues -Expensive
-Virtually any appln / service can be run from this type of setup
Virtual servers seek to encapsulate the server software away from hardware
Servers end up as mere files stored on a physical box
Can be serviced by one/more hosts & one host may house one/more virtual servers
If built correctly,not affected by the loss of host
-Harder to conceptualise
-Slightly costly
Hardware Support
Platform Virtualization
Desktop Virtualization
Network Virtualization
Storage Virtualization
Resource Virtualization
Rent as needed
Public
Hybrid
Service provider makes resources, such as applications and storage, available over the Internet
Limited service providers like Microsoft, Google etc own all Infrastructure at their Data Center and the access allowed through Internet mode only
Removes a number of objections to the cloud computing model including control over enterprise and customer data, worries about security
Cost Control
Many systems have variable demands Web sites at peak Hours Reduce Risk No need to buy HW
Scalability@Business Agility
Stick to Business
IaaS
SaaS
Deployment Models
PaaS
CaaS
MaaS
Communication as a Service
Infrastructure as a Service Monitoring as a Service
Platform as a Service
Software as a Service Crime Ware as a Service
IT as a Service
are
build
on
Virtualization is not a requirement of cloud computing, its ability to efficiently share resources makes it an excellent foundation.
hardware allowing
Used to describe the interface provided by the specific cloud computing functionality infrastructure as a service (IaaS)
100% SECURITY IS A MYTH COL S K KAPOOR ..Off course our answer sheets also came out to be myth
but instead of offering legal and helpful services though the Internet, criminal syndicates are offering illegal and detrimental services
such as infecting large quantities of computers, sending spam and even launching direct denial of service (DDoS) attacks
Infrastructure As (Crime) Service or Iaa(C)S, in which the criminals offer malicious services (or infrastructures) to attack specified targets, services may include complex traditional infrastructures such as botnets
.but also innovative large scale fashioned services such as DDoS or also sharper services such as password cracking. Try to surf the web and you will discover how easy it is to purchase such a criminal kind of services.
Software As a (Crime) Service or Saa(C)S, in which the criminals offer malicious software (and the needed support) as a service.
An example? The latest Zeus Variant dubbed Citadel provides the purchaser with help desk and even a dedicated Social Network
Constant up gradation!!!
Regulatory Compliance
Is vendor willing to undergo external audits Security classification?
Data Location
Does the provider allow any control over loc of data
Data Segregation
Encryption policy, schemes and design
Recovery
What happens in case of disaster Restoration Policies and Business Continuity Plans
Investigative Support
Vendors ability to investigate any inappropriate or illegal activity ?
Data in Transit
Data at Rest
Data in Processing
Data Lineage@mapping
Data Remanence
Google Docs
Cevin
Weak Firewalls
Deploying Trojans
Langots@Microsoft, Windriver
CSI
IETE
Institution of Engineers,Kolkatta