Lecture 3 Spring 2024
Lecture 3 Spring 2024
Lecture 3 Spring 2024
Presented by
Dr. Rubaiyat Islam
Crypto-economist Consultant
Sifchain Finance, USA.
Adjunct Faculty, IUB.
Cloud Security Fundamentals
2
Security Terms and concepts
1. Confidentiality :
3
Security Terms and concepts
2. Integrity:
- Data can not be manipulated
or altered by unauthorized party.
- A healthcare provider may use
cloud storage to store patient
medical records and other critical
data. To ensure the integrity of
this data, the provider can use
cryptographic hashes to verify
the integrity of the data at
different stages of the data
lifecycle, such as when the data
is uploaded to the cloud and
when it is retrieved from the
cloud.
4
Security Terms and concepts
3. Authenticity :
- The concept relates to nonrepudiation, meaning the
person committed something can not deny or challenge
the authenticity of interaction .
- A law firm can use a cloud-based document
management system and authentication can be done by
digital signature.
4. Availability :
- accessible and usable during a specified time period.
5
Lack of Security Representing Terms
1. Threat :
- Potential security violation.
- Can challenge the defenses of a system.
- Data breaches, insider threats, DDoS(Distributed Denial of
Service), misconfiguration, malware, viruses, social engineering
such as phishing and spear phishing, .
2. Vulnerability:
- Insufficient security.
- In 2017, a misconfigured Amazon S3 bucket led to a data breach
affecting millions of customer records from a financial services
company called Dow Jones. The Amazon S3 bucket was set to
allow public access, and it contained sensitive information such as
names, addresses, and account details.
3. Risk:
- possibility of loss or harm arising from performing an activity
, for example data protection law, performance risk, data loss risk
etc.
6
Counter measures :
7
Threat Agents:
8
Types of Threat Agents:
- Trusted
Attacker(with - Malicious
legitimate Insider(someone
credentials ) attempts to access
previlage)
9
Cloud Security Threats:
10
Cloud Security Threats:
11
Cloud Security Threats:
12
Cloud Security Threats:
13
Cloud Security Threats:
14
Cloud Security Threats:
15
Additional Considerations
• Flawed Implementations
- The figure depicts a poorly
implemented cloud service
that results in a server
shutdown. Although in this
scenario the flaw is exposed
accidentally by a legitimate
cloud service consumer, it
could have easily been
discovered and exploited by
an attacker.
16
Additional Considerations
• SLA or Contracts
- Cloud consumers need to examine carefully the Service Level
Agreemet(SLA) or contracts of Cloud providers before starting to use it.
- A cloud consumer that deploys its own solution upon infrastructure
supplied by the cloud provider will produce a technology architecture
comprised of artifacts owned by both the cloud consumer and cloud
provider.
- Good collaboration and communication are needed for reaching a
common ground on solving the conflicts on issues like security policies
to ensure the data and infrastructure are secured.
- it is important for the cloud consumer and cloud provider to work
together to find a solution that meets the needs of both parties while
maintaining the necessary security controls.
17
Additional Considerations
• Risk Management:
cloud consumers are encouraged to perform
a formal risk assessment as part of a risk
management strategy.
- Risk Assessment: To identify potential
vulnerabilities and shortcomings that
threats can exploit.
- Risk Treatment: Some can be eliminated
others can be mitigated. And rest can be
carried out by the cloud provider as a
contractual responsibilities.
- Risk control : This is basically monitoring of
the three stage like surveying related
events, reviewing the previous risks,
treatments and policy adjustment needs.
18
Summary
19