Question

Identify the main secuirty threats for the SaaS cloud delivery model on the public cloud. Discuss...

Identify the main secuirty threats for the SaaS cloud delivery model on the public cloud. Discuss the different aspects of these threat on a public cloud vs the threats posed to similar services provided by a traditional service-oriented architecture running on a private infrastructure.

0 0
Add a comment Improve this question Transcribed image text
Answer #1
  • The main factor od Saas cloud delivery model for IT Executives when it moves to cloud computing is security and privacy. It environments are the multi-domain environment in which various resources are shared.
  • While sharing Hardware and placing data it seems to be a highly risk factor. Any unauthorized person can easily hacked either accidentally or due to malevolent attack. Hence data storage would be a major security violation. By considering this security issues, two surveys were carried out by IDC in 2008 and 2009. Their observations are analyzed and presented here.
  • Check out what will happen to data in the case of disaster. Do they offer complete restoration and if so, how long that would take. Ask whether a vendor has the ability to investigate any inappropriate or illegal activity. Examine what will happen to data if the company goes out of business. How will data be returned and in what format?

Here we See Some Important threats ans there Aspects :-

Secure data transfer. All of the traffic travelling between your network and whatever service you’re accessing in the cloud must traverse the Internet. Make sure your data is always travelling on a secure channel; only connect your browser to the provider via a URL that begins with ”https.” Also, your data should always be encrypted and authenticated using industry standard protocols, such as IPsec (Internet Protocol Security), that have been developed specifically for protecting Internet traffic.

2. Secure software interfaces. The Cloud Security Alliance (CSA) recommends that you be aware of the software interfaces, or APIs, that are used to interact with cloud services. ”Reliance on a weak set of interfaces and APIs exposes organizations to a variety of security issues related to confidentiality, integrity, availability, and accountability,” says the group in its Top Threats to Cloud Computing document. CSA recommends learning how any cloud provider you’re considering integrates security throughout its service, from authentication and access control techniques to activity monitoring policies.

3. Secure stored data. Your data should be securely encrypted when it’s on the provider’s servers and while it’s in use by the cloud service. In Q&A: Demystifying Cloud Security, Forrester warns that few cloud providers assure protection for data being used within the application or for disposing of your data. Ask potential cloud providers how they secure your data not only when it’s in transit but also when it’s on their servers and accessed by the cloud-based applications. Find out, too, if the providers securely dispose of your data, for example, by deleting the encryption key.

4. User access control. Data stored on a cloud provider’s server can potentially be accessed by an employee of that company, and you have none of the usual personnel controls over those people. First, consider carefully the sensitivity of the data you’re allowing out into the cloud. Second, follow research firm Gartner’s suggestion to ask providers for specifics about the people who manage your data and the level of access they have to it.

5. Data separation. Every cloud-based service shares resources, namely space on the provider’s servers and other parts of the provider’s infrastructure. Hypervisor software is used to create virtual containers on the provider’s hardware for each of its customers. But CSA notes that ”attacks have surfaced in recent years that target the shared technology inside Cloud Computing environments.” So, investigate the compartmentalization techniques, such as data encryption, the provider uses to prevent access into your virtual container by other customers

6. Insufficient identity, credential, and access management:-Bad actors masquerading as legitimate users, operators, or developers can read, modify, and delete data; issue control plane and management functions; snoop on data in transit or release malicious software that appears to originate from a legitimate source, CSA says. As a result, insufficient identity, credential, or key management can enable unauthorized access to data and potentially catastrophic damage to organizations or end users.

7.Malicious insiders:-While the level of threat is open to debate, the fact that insider threat is a real adversary is not, CSA says. A malicious insider such as a system administrator can access potentially sensitive information, and can have increasing levels of access to more critical systems and eventually to data. Systems that depend solely on cloud service providers for security are at greater risk.

  • Usually there is an ongoing debate between IT professionals of whether or not private Clouds are really more secure. Besides from the common view that private Clouds should be more secure, there are some interesting attributes/properties of public Clouds to consider.
  • Public Clouds are hardened through continual hacking attempts. Public Cloud providers are much larger targets for hackers than private Clouds.
  • Public Clouds also attract the best security people available; the biggest and best Cloud service providers have millions of customers relying on them.

They definitely would be meticulous about who they hire. Also public Cloud providers, especially larger companies like Google, Amazon, and Facebook would get the latest security gear much easier than a small to midsize private company. Here are some other security issues related to Public Cloud Computing:

Services provided by a traditional service-oriented architecture for such threats:-

Firewall:-

is a system designed to prevent unauthorized access to or from a private network. Firewall can help by decreasing the attack surface of virtualized servers in cloud computing environments. Deploying firewall on VM with policies that map to security policy of organization, one may achieve the Virtual Machine isolation, data filtering at fine-grained level of ports, data segregation for analysis covering all IP-based protocols, frame types, etc.. Attacks like Denial of Services (DoS) can be prevented. Firewalls also allow setting different policies over different network interfaces.

Intrusion Detection and Prevention (IDS/IPS):

IDS/IPS can shield vulnerabilities in operating systems and enterprise applications until they can be patched, to achieve timely protection against known and zero-day attacks. An IDS/IPS can detect newly discovered vulnerabilities in both applications and operating system running in VM. This provides protection against exploits attempting to compromise virtual machines. There are IDS/IPS which are based on artificial intelligence techniques [8] which may learn about new vulnerabilities dynamically.

Integrity Monitoring:-

It involves monitoring files, systems and registry for changes. Application files and critical system files (files, directories, registry keys and values, etc.) can be monitored for detecting malicious and unexpected changes which could signal compromise of cloud computing resources. Integrity monitoring software must be applied at the virtual machine level. An integrity monitoring solution should enable . On-demand or scheduled detection. Extensive file property checking, including attributes (enables compliance with PCI Directory-level monitoring. iv. Flexible, practical monitoring through includes/excludes. Auditable reports.

Log Inspection:

Log inspection collects and analyzes operating system and application logs for security events. Rules are defined in log inspection which allows efficient extraction of security related events from multiple log-files. These logs can be sent to a stand-alone security system, or to a Security Information and Event Management (SIEM) system or centralized logging server for analysis. Log inspection software on cloud resources enables suspicious behavior detection. Like integrity monitoring, log inspection capabilities must be applied at the virtual machine level.

Secure introspection:-

In cloud computing users may move images from one cloud to another, thus an effective solution requires learning what guest operating system (OS) runs in each virtual machine (VM) and secure the guest OS without relying on the guest OS functionality or an initially secure guest VM state. One such solution is secure introspection .

Add a comment
Know the answer?
Add Answer to:
Identify the main secuirty threats for the SaaS cloud delivery model on the public cloud. Discuss...
Your Answer:

Post as a guest

Your Name:

What's your source?

Earn Coins

Coins can be redeemed for fabulous gifts.

Not the answer you're looking for? Ask your own homework help question. Our experts will answer your question WITHIN MINUTES for Free.
Similar Homework Help Questions
  • cloud computing

    Regional Gardens Ltd is a company that runs a number of related gardening enterprises. It has a large display garden that it opens for public inspection a number of times a year. These enterprises include the Regional Gardens Nursery which sells plants and garden supplies to the public, and Regional Garden Planners which provides garden advice, design and consultancy services.Regional Gardens has engaged you as a consultant to advise them on the use of Cloud Computing in their daily operations...

  • Regional Gardens Ltd is a company that runs a number of related gardening enterprises. It has...

    Regional Gardens Ltd is a company that runs a number of related gardening enterprises. It has a large display garden that it opens for public inspection a number of times a year. These enterprises include the Regional Gardens Nursery which sells plants and garden supplies to the public, and Regional Garden Planners which provides garden advice, design and consultancy services. Regional Gardens Ltd has a small data center at its main site in Bathurst where the company’s servers and data...

  • Using appropriate concepts and theories from Block 2, Session 2, identify and discuss three main threats...

    Using appropriate concepts and theories from Block 2, Session 2, identify and discuss three main threats and three main opportunities that should be considered by Yum! in expanding its global reach within emerging markets such as China. (25 marks) um! The Fast Food Giant Eating up the World Yum! Brands is an American fast food company, headquartered in Louisville, Kentucky. It is one of the world’s largest fast food restaurant companies, and owns some big name restaurant chains such as...

  • Title: Partners Health Care Systems (PHS): Transforming Health Care Services Delivery through Information Management According to...

    Title: Partners Health Care Systems (PHS): Transforming Health Care Services Delivery through Information Management According to government sources, U.S. expenditures on health care in 2009 reached nearly $2.4 trillion dollars ($2.7 trillion by the end of 2010).[1] Despite this vaunting national level of expenditure on medical treatment, death rates due to preventable errors in the delivery of health services rose to approximately 98,000 deaths in 2009.[2] To address the dual challenges of cost control and quality improvement, some have argued...

  • e-Business Strategy and Models in Banks : Case of Citibank E-business strategy in Citibank: Banks today...

    e-Business Strategy and Models in Banks : Case of Citibank E-business strategy in Citibank: Banks today are up-to-date with both the pros and cons of the internet. They are aware of the opportunities and threats that are associated with the Web. Not a single traditional bank is brave enough to face investment analysts without an Internet strategy. But even a very thoughtful approach to the Web may do no good to the company/ organization. The main purpose behind launching online...

  • Q.3\ How could IT/e-banking assist an organization/ a bank to achieve a competitive advantage in the...

    Q.3\ How could IT/e-banking assist an organization/ a bank to achieve a competitive advantage in the marketplace? Explain through the case of Citibank. please make sure you give a unique answer (not copied one) ,Please no hand writing, and need references. This question is from ECOM 421 e-Business Strategies and Business Models course e-Business Strategy and Models in Banks : Case of Citibank E-business strategy in Citibank: Banks today are up-to-date with both the pros and cons of the internet....

  • Starbucks Becomes a Public Company Starbucks' initial public offering (IPO) of common stock in June 1992...

    Starbucks Becomes a Public Company Starbucks' initial public offering (IPO) of common stock in June 1992 turned into one of the most successful IPOs of the year. With the capital afforded it by being a public company, Starbucks accelerated the expansion of its store network. Starbucks' success helped specialty coffee products begin to catch on across the United States. Competitors, some imitating the Starbucks model, began to spring up in many locations. The Specialty Coffee Association of America predicted that...

  • AVIVA Information Technology Strategy Aviva is the fifth-largest insurance group worldwide. It provides savings, investments, and...

    AVIVA Information Technology Strategy Aviva is the fifth-largest insurance group worldwide. It provides savings, investments, and insurance, and has been operating since 1696. The company’s 54,000 employees serve more than 50 million people in 28 countries. In order to integrate the organization at a global level, Aviva needed a platform to be able to communicate with all employees and to allow its employees to be able to share best practices. Aviva wanted to encourage its employees to be innovative and...

  • Read the article below and then answer the questions above. Discuss the fit test, competitive advantage...

    Read the article below and then answer the questions above. Discuss the fit test, competitive advantage test, and performance test to determine whether this strategy is a “winning strategy.” What are specific examples of the company’s strategy-making hierarchy? Be sure to discuss corporate level, business level, functional area, and operating strategy example Betting Like SoftBank Drives Toyota’s Value Up by $19 Billion Everywhere you turn in the transportation industry these days, Toyota Motor Corp. seems to already be there. From...

  • Read the case: Netflix Inc.: The Second Act - Moving into Streaming and complete your case...

    Read the case: Netflix Inc.: The Second Act - Moving into Streaming and complete your case analysis. Discuss the following: 1) briefly summarize the key marketing strategy issues in the case that are still relevant TODAY in addition to contemporary issues you find via research; 2) make thorough recommendations on how the issues should be handled; 3) provide a justification for the recommendations. Case write-ups should be 3-5 pages, double spaced, 12 font size in Times New Roman. The case...

ADVERTISEMENT
Free Homework Help App
Download From Google Play
Scan Your Homework
to Get Instant Free Answers
Need Online Homework Help?
Ask a Question
Get Answers For Free
Most questions answered within 3 hours.
ADVERTISEMENT
ADVERTISEMENT
ADVERTISEMENT