Vulnerabilities in Cloud Computing

Size: px
Start display at page:

Download "Vulnerabilities in Cloud Computing"

Transcription

1 Vulnerabilities in Cloud Computing Zeshan Hussain Akshay Gummadi George Mason University INFS 612 Spring 2013

2 Table of Contents 0. Abstract Introduction Background on Cloud Computing History of Cloud Computing Cloud Computing Service Models Infrastructure as a Service (IaaS) Platform as a Service (PaaS) Software as a Service (SaaS) Importance of Virtual Machines in Cloud Computing Security Risks that Exist in Cloud Computing Vulnerabilities that exist in Cloud Computing Caused by Virtual Machine Vulnerabilities Hypervisor Vulnerabilities Denial of Service Attacks Data Leakage VM Hopping VM-Based Root Kits Vulnerabilities that Exist in Virtual Machines Path Traversal Vulnerability Overview Technical Details Implication of Attack on a Cloud Computing Environment Personal Related Works Experiment Lab Enviornement Attacker Host Victim Host Solution 9 8. Conclusion Works Cited... Table of Figures Figure 1 Cloud Computing Example [Wikipedia]... 5 Figure 2 Cloud Computing Service Models [Wikipedia]... 6 Figure 3 Vulnerability Statistics... 9 Page 2 of 13

3 0. Abstract Security vulnerabilities exists in most, if not all system and infrastructure in an organization and the monetary repercussion of just one security incident can lead an organization to turmoil. What we intend to do in this research is to educate our readers to understand Information System known vulnerabilities on cloud environment and how it can easily be exploited by hackers using software bugs found within the software that make up the cloud. Our focus is mostly on virtual platform that are used for the backbones of cloud computing and the software used to support virtual system. The research includes education on Information System infrastructure being built based on various cloud models. As companies are moving its data from in-house system to cloud infrastructure, the security risk are gradually moving toward that direction as well and protection mechanism are being slow to build. In our research we will analyze the software flaw that builds virtual environment and demo how an exploited vulnerability using simple technique can overtake a host, which can be used as a pivot point to compromise the entire farm of servers on the physical host. The specific technique we will illustrate is referred to as Buffer Overflow vulnerability in VMware. The demo will illustrate a buffer overflow compromise in one of the host machine and penetrates to completely non-networked virtual machine on the same host and steal information. The lab environment will demonstrate the ability to technically expose virtual machine that are completely secured but just one flaw on a segregated host can lead to data leak. The concept we will demonstrate that one virtual machine successfully exploited on cloud in a particular farm can lead to most if not all host on the same farm to be compromised. The concept behind cloud is to reduce cost; however, companies don t realize that by putting their data in a cloud they trust all others on the same cloud to have same security posture if not better as them.. Page 3 of 13

4 1. Introduction Since the evolution of cloud computing and the various service models it provides, more and more companies are turning to this solution as a way to increase efficiencies at a reduced cost. However, an important factor that must not be forgotten when considering cloud computing as a solution is the security risks that may come with it. This paper will discuss the history of cloud computing as well as provide an overview of the various service models provided by cloud computing. In addition, this paper will provide an overview of the various vulnerabilities that exist in cloud computing; however, will focus, on one specific vulnerability brought on by the use of virtual machines to support the cloud computing architecture. The vulnerability will be reviewed from technical point of view and steps taken to exploit the vulnerability in underline technology used to build cloud, Virtual Machine, will demonstrate a successful exploit and breach of data. This paper will also summarize an experiment performed, in which one of the specific virtual machine vulnerabilities is exploited and the implication this would have on a cloud computing environment. 2. Background on Cloud Computing This section will provide an overview of cloud computing how it began, the service models being provided today, as well as the importance of virtual machines within the cloud computing architecture History of Cloud Computing Authors, Foster et.al., define cloud computing as a large-scale distributed computing paradigm that is driven by economies of scale, in which a pool of abstracted, virtualized, dynamicallyscalable, managed computing power, storage, platforms, and services are delivered on demand to external customers over the Internet [Foster et. al, 2008]. However, this is just one of several definitions that can be found in various articles, books, the internet, etc. Although there are many variations of a definition for cloud computing, one common theme remains across all definitions, that cloud computing is services (e.g. applications, hardware), delivered as a service, over the internet. The services themselves have long been referred to as Software as a Service (SaaS) The datacenter hardware and software is what we will call the cloud [Armbrust et. al., 2009]. Figure 1 below depicts an example of the types of services offered in the cloud. Page 4 of 13

5 Figure 1 Cloud Computing Example [Wikipedia] There is no one true inventor of cloud computing. The fundamental ideology behind cloud computing dates back to the 1960 s. In fact, back in 1961, computing pioneer John McCarthy predicted that computation may someday be organized as a public utility and went on to speculate how this might occur [Foster et.al, 2008]. Some scholars even say that the ideology dates back to the 1950s, when scientist Herb Grosch (the author of Grosch's law) postulated that the entire world would operate on dumb terminals powered by about 15 large data centers [Wikipedia]. In terms of vendors who played in integral role, in the commercializing of cloud computing, one that stands out above all the rest is Amazon. Amazon played a key role in the development of cloud computing by modernizing their data centers Having found that the new cloud architecture resulted in significant internal efficiency improvements Amazon initiated a new product development effort to provide cloud computing to external customers, and launched Amazon Web Service (AWS) on a utility computing basis in 2006 [Wikipedia]. Today there are hundreds of vendors providing various cloud computing service models to meet their clients needs Cloud Computing Service Models Cloud computing providers now offer various services, and variations of the three fundamental cloud computing service models, however, in this paper; we will focus on providing an overview of the three fundamental models: Infrastructure as a Service (IaaS), Platform as a Service (PaaS), and Software as a Service (Saas). These model are served as the fundamental building block for cloud computing. There are various model out in public but the standard one is globally accepted by cloud provided is broken down from providing thin-client cloud computing to infrastructure service cloud computing. Figure 2 below provides a visual depiction of the Cloud Computing Service Models. Page 5 of 13

6 Figure 2 Cloud Computing Service Models [Wikipedia] Infrastructure as a Service (IaaS) In the Infrastructure as a Service ( IaaS ) model, the service provider is offering physical equipment, or virtual machines to support operations, including storage, hardware, servers and networking components. The service provider owns the equipment and is responsible for housing, running and maintaining it. The client typically pays on a per-use basis [Rouse, 2010]. It is important to note that although the cloud service provider is offering the infrastructure to support an organization, the client organization is still responsible for patching and maintaining the operating systems and application software installed on the infrastructure Platform as a Service (PaaS) In the Platform as a Service ( PaaS ) model, the service provider is offering a computing platform, and or solution stack. This typically includes an operating system, programming language execution environment, database, and web server [Wikipedia]. One of the benefits of PaaS is that most cloud providers will offer the automatic scaling of the underlying computing and storage resources to match application demand [Wikipedia]. It is also important to note PaaS can be seen as stacking on top of IaaS, and similar to IaaS, virtual machines can also be used to support PaaS services as well. One well known PaaS service provider that does this is Windows Azure; Windows Azure offers highly-available compute capacity that enables its clients to run application code in the cloud and quickly scale their applications up or down to meet their own individual needs. With Windows Azure, each compute instance is a virtual machine [Windows Azure 2013] Software as a Service (SaaS) In the Software as a Service ( SaaS ) model, the service provider is offering a software distribution model in which applications are hosted by the service provider and made available to customers over a network, typically the Internet [Rouse 2010]. One of the benefits of SaaS is allowing its clients greater elasticity with the cloud application. This Page 6 of 13

7 [elasticity] can be achieved by having load balancers distribute the work over a set of virtual machines. In other words, tasks are cloned onto multiple virtual machines at run-time to meet the changing work demand [Wikipedia] Importance of Virtual Machines in Cloud Computing As was discussed in section 2.2 above, virtual machines are a critical aspect of the IaaS cloud service model, and can also be seen in the PaaS service model as well (as discussed with the Windows Azure example), and even with SaaS service models, in which the SaaS provider may be hosting the application through multiple virtual machines, to improve load balance. As such, it can be seen that virtual machines play an integral role in all cloud computing service models, the most well-known use of virtual machines being through the IaaS model. 3. Security Risks that Exist in Cloud Computing While there are a number of benefits that come with cloud computing, such as scalability and cost, organizations need to also consider the risks and vulnerabilities associated with this type of service model. While overall governance of data and regulatory compliance become major risks when moving to a cloud service provider the purpose of this paper is to focus more on operational vulnerabilities that exist within cloud computing environments and specifically, how weaknesses in virtual machines can be used to exploit these vulnerabilities Vulnerabilities that exist in Cloud Computing Caused by Virtual Machine Vulnerabilities There are a number of vulnerabilities that virtual machines introduce to a cloud computing environment. Though the cloud is hosted in data center but all servers are set up similar to physical ones. The only difference is that more software is used to support Virtual machine that make up the cloud. There have been number of vulnerability discovered on such software and partially the one that if exploited can lead to total compromise of the farm hosting the virtual machines. These vulnerabilities include hypervisor vulnerabilities, vulnerable hypervisors, virtual machine-based root kits, denial of service attacks, VM hopping, and data leakage Hypervisor Vulnerabilities In most implementations of virtual environments there are multiple guest operating systems running within a single environment. Because of this, a hypervisor or virtual machine monitor is used to isolate and control access between the guests and the physical computing resources as depicted in Figure 4. However, should the hypervisor be compromised, an attacker would be able to execute arbitrary code on the host with the privileges of the hypervisor which would allow them to control all virtual machines which are running on the host itself. Page 7 of 13

8 Figure 4: VM Implementations [Price 2010] Denial of Service Attacks Because multiple virtual machines run on a single host, the threat of denial of service attacks is a major concern in VM implementations. This is due to the fact that these guests are all sharing resources from the host they reside on so that a successful denial of service attack on one of the guest virtual machines ultimately affects all other machines running on the same host. This is why it is critical to configure the hypervisor properly so that it can detect this extreme resource consumption and protect against these types of attacks Data Leakage Another concern with virtual machines is introduced when the VMs are suspended. When VMs are suspended, the memory footprint is placed in a file and can be searchable. Any information that is placed into the file is most likely not protected and can be retrieved by an attacker that may have access to the host where this file resides VM Hopping This type of attack occurs when a hacker has access to one VM and is able to gain access to another victim VM. Typically this type of attack can only occur when the two VMs are running on the same host and the attacker must know the victims IP address. Multitenancy makes the impact of VM hopping very large due to the possibility of many VMs possibly running on the same host VM-Based Root Kits VM-based root kits or VMBRs install a virtual machine monitor beneath an existing operating system and hoist it onto a virtual machine. Similar to legitimate VMMs, the VMBRs can gain complete control of an operating system without being detected and can also control all hardware interfaces. At this layer, the VMBR would be able to view all keystrokes, network packets, disk states, and memory states while going completely undetected by the operating system. Page 8 of 13

9 3.2. Vulnerabilities that Exist in Virtual Machines Figure 3 below depicts the number of vulnerabilities that have been identified in all VMware products from 1999 to present. During this timeframe, 160 vulnerabilities have been identified within the VMware suite of products and these vulnerabilities range from denial of service attacks to memory corruption. As you can see from the figure, the top four areas where vulnerabilities were discovered involve attacks which include denial of service, gaining privileges, buffer overflows, and executing malicious code. Figure 3 Vulnerability Statistics [cvedetails.com] 4. Path Traversal Vulnerability 4.1. Overview The Path traversal vulnerability subsists in the shared folder functionality in VMware software. When exploited it give attacker control not only to the guest VM image but also break out to access the host system. The shared folder within VM and host is enabled by default therefore if not disabled we can use this method to disrupt the flow and launch a successful attack Technical Details The vulnerability is how pathname is processed to by VMware to use the API to provide shared folder functionality. The PathName parameter is converted from a multi byte string to a wide character string. The security hole in this process is that it doesn t properly check for dot-dot (..) sub-string resulting in path traversal attack. Since the validation of dot-dot substring is performed before calling the Windows function MultiByteWideChar (maps a character string to wchar string UTF-16) it can therefore be bypassed by passing a string that gets mapped to a Unicode UTF-16 Page 9 of 13

10 of the dot-dot substring. So to trigger this vulnerability a valid UTF- 8 byte sequence can be used that translate to dot-dot substring such as 0xc20x2e0xc20x2e which is translated to Implication of Attack on a Cloud Computing Environment As we are moving our critical infrastructure to the cloud environment we tend to overlook the security aspect of such move. Attack such as the path traversal is one of the very few examples on how one piece of software flaw in an important functionally can lead to devastating result if taken advantage. One of the key selling points of cloud computing environment based on virtualization is the promise of improved information security posture due to the isolation between virtualization system and non-virtualized system. As we demonstrated in our demo, one security flaw in a guest image on your virtualized system can potentially make all of your other fully patched system vulnerable to security attacks. When the isolation of a guest and host is compromised the entire virtualized system is at risk; therefore, consolidation is great for cost and efficiency but lack of security can have tremendous consequences if attacks can break out of the guest and take control of your underlying host. 5. Personal Research Works I currently for an organization we write exploit in python for vulnerable system. As I was working on this project I realized that we performed testing on virtual host that are treated under our cloud infrastructure. Each year we have security audit that we performed from scanning network to testing their security posture. We have always found those hosts that are virtualized are far less secure than the physical server. The main component of this finding is due to lack of sufficient software guideline used to build software that support virtual host. Our research in the organization that I work is mostly identifying software weakness on cloud and attempting to exploit them. We have identified many buffer overflows mostly due to weak coding within the software and not adding appropriate buffer control on memory that lead to memory leak by the attacker. We are currently working on developing a new vulnerability scanning program that would only concentrate on hypervisor and other virtual environment and specifically target those to identify buffer overflow leaks within the application. The purpose of this approach will be isolate vulnerability scanner to cloud based environment in order to target only the virtual host. 6. Experiment 6.1. Lab environment configuration For this setup we utilized two physical laptops, a victim and a attacker. The attacker was used to discover the vulnerability host that is running on Virtual machine. The victim was running an older version of virtual workstation that is vulnerable to path traversal vulnerability. The two host were not connected to internet but were physical wired to each other as point to point network. This was completely isolated from the rest of the network and was done in a secure lab environment. A virtual workstation which one shared folder. Page 10 of 13

11 6.1.1 Attacker Host The attacker host was a new build window 7 machine in which we downloaded and install open source tool such as nmap, zenmap, metasploit, and 30 days free copy of core impact. We gave the host static IP on our newly created subnet /24 for this experiment. This laptop is configured similar to what an attacker would have on their machine. We will run all of our attacks from this host and monitor the behavior of our victim s machine while recording session thru proxy that we configured. The firewall on this host has been disabled to ensure no filtering is done due to the sensitive of our lab environment Victim Host The victim host is configured as virtual environment. It s baseline operating system is configure to be a vmware workstation which is hosting two virtual operating system, imitating, a real cloud computing environment. The victim machine has vmware workstation 6.0 to ensure that the exploit will successfully be launched. 6.2 Exploit in Action The order of the exploit starts with the scanning phase where we scan our victim machine and identity the vulnerabilities. In this case, we explored that the virtual software was running vmware workstation 6 which is susceptible to path traversal exploit. We then attempt to successfully execute the malicious binary onto the computer and get a revers shell. The reverse shell allowed us to penetrate thru the victim host and any other virtual host on the same farm. This is demonstrated in the demo we will present. 7. Solutions While there are many solutions available but hardly you will read organization applying a combination of them within their software. As we move toward less hardware and are pushing our data to cloud the increase of software need that can support such task is high; therefore, a security must be built in the starting phase. We have outlined the following four solutions that we highly recommend all cloud computing technologies should utilize in order to identify, mitigated and improve their vulnerable system. 7.1 Secure system Approach As many virtual providers are hosting customer data on their cloud network they tend to undermine the most valuable component to protecting the data. The secure system approach is built from the beginning of your design phase; a cloud computing company should invest in building their system in a secure manner by following security benchmarks provided by the National Institute of Standards (NIST) which validate the security baseline of system and their integration. Page 11 of 13

12 7.2 Security Vulnerability Testing New vulnerabilities are discovered each and every day, attackers are getting smarter and we need to be ahead of them. By deploying vulnerability scanning on your environment you can ensure that the known risk are not source of threat for your organization. Vulnerability scanner can be configured to look for specific vulnerabilities within your system. The vulnerability we are exposing was discovered by a vulnerability scanning vendor, Core Security, however most organization did not known until attackers scanned their system and compromised it. 7.3 Security built with System Developing Lifecycle SDLC Must implement security within the System Development Lifecycle otherwise the after fact security will only cost more dollar, either after a compromise of data or going back and fixing the entire code. Security should be part of testing phase within the 5 step of SDLC: 1) Requirement analysis 2) Design 3) Implementation 4) Testing 5) Evolution This approach can ensure that code is validated thru proper channel to ensure that security risk are very limited, if any. Many vendors lack application security skills needed to accomplish this as security does not have direct profit associated with it but in the long run will save money for the company. 8. Conclusion In this paper we discussed the history of cloud computing and the importance of virtual machines in support the various cloud service models. With the importance of virtual machines in cloud computing service models, we explored the various vulnerabilities that exist in cloud computing, with a focus on the vulnerabilities that exist, as a result of leveraging virtual machines. In this paper, we discussed in detail one specific known vulnerability that exists within an older version of VMware software (Path Traversal Vulnerability), and discussed the disastrous impact exploiting this type of vulnerability would have on a cloud computing service model. Security is thought of as after the fact approach in the current market, but building it within their business process and early in the stage of the development can lead to significant amount of saving in dollar amount. As we move toward virtualizing our data center we need to ensure that Operating system that are being built on software such as vmware is properly vetted thru security and withhold aggressive application attacks. Page 12 of 13

13 Works Cited Wikipedia. (n.d.). Cloud Computing Wiki. Retrieved March 10, 2013, from Wikipedia: Windows Azure, Windows Azure Compute, March 10, 2013, from Windows Azure: Foster, Ian, et. al. Cloud Computing and Grid Computing 360-Degree Compared. 2008: Armbrust, Micheal, et. al. Above the Clouds: A Berkeley View of Cloud Computing. February 10, 2009: _Impact_2009_Nachlese/$file/abovetheclouds.pdf Rouse, Margaret. Infrastructure as a Service. August 2010: Price, Michael. The Paradox of Security in Virtual Environments. 2008: IEEE Computer Society Tsai, Hsin-Yi, et. al. Threat as a Service? Virtualization s Impact on Cloud Security February 2012: Published by IEEE Computer Society cvedetails.com. (n.d.). VMWare: Vulnerability Statistics Retrieved April 5, 2013, from cvedetails.com: Page 13 of 13

Why the cloud matters?

Why the cloud matters? Why the cloud matters? Speed and Business Impact Expertise and Performance Cost Reduction Trend Micro Datacenter & Cloud Security Vision Enable enterprises to use private and public cloud computing with

More information

Virtualization Security & Audit. John Tannahill, CA, CISM, CGEIT, CRISC

Virtualization Security & Audit. John Tannahill, CA, CISM, CGEIT, CRISC Virtualization Security & Audit John Tannahill, CA, CISM, CGEIT, CRISC jtannahi@rogers.com Session Overview Virtualization Concepts Virtualization Technologies Key Risk & Control Areas Audit Programs /

More information

Specialized Security Services, Inc. REDUCE RISK WITH CONFIDENCE. s3security.com

Specialized Security Services, Inc. REDUCE RISK WITH CONFIDENCE. s3security.com Specialized Security Services, Inc. REDUCE RISK WITH CONFIDENCE s3security.com Security Professional Services S3 offers security services through its Security Professional Services (SPS) group, the security-consulting

More information

Best Practices in Securing a Multicloud World

Best Practices in Securing a Multicloud World Best Practices in Securing a Multicloud World Actions to take now to protect data, applications, and workloads We live in a multicloud world. A world where a multitude of offerings from Cloud Service Providers

More information

Managing and Auditing Organizational Migration to the Cloud TELASA SECURITY

Managing and Auditing Organizational Migration to the Cloud TELASA SECURITY Managing and Auditing Organizational Migration to the Cloud 1 TELASA SECURITY About Me Brian Greidanus bgreidan@telasasecurity.com 18+ years of security and compliance experience delivering consulting

More information

Cloud Essentials for Architects using OpenStack

Cloud Essentials for Architects using OpenStack Cloud Essentials for Architects using OpenStack Course Overview Start Date 5th March 2015 Duration 2 Days Location Dublin Course Code SS15-13 Programme Overview Cloud Computing is gaining increasing attention

More information

Chapter. Securing the Cloud THE FOLLOWING COMPTIA SECURITY+ EXAM OBJECTIVES ARE COVERED IN THIS CHAPTER:

Chapter. Securing the Cloud THE FOLLOWING COMPTIA SECURITY+ EXAM OBJECTIVES ARE COVERED IN THIS CHAPTER: Chapter 6 Securing the Cloud THE FOLLOWING COMPTIA SECURITY+ EXAM OBJECTIVES ARE COVERED IN THIS CHAPTER: 1.3 Explain network design elements and components. Virtualization Cloud computing: Platform as

More information

Completing your AWS Cloud SECURING YOUR AMAZON WEB SERVICES ENVIRONMENT

Completing your AWS Cloud SECURING YOUR AMAZON WEB SERVICES ENVIRONMENT Completing your AWS Cloud SECURING YOUR AMAZON WEB SERVICES ENVIRONMENT Introduction Amazon Web Services (AWS) provides Infrastructure as a Service (IaaS) cloud offerings for organizations. Using AWS,

More information

Security Solutions. Overview. Business Needs

Security Solutions. Overview. Business Needs Security Solutions Overview Information security is not a one time event. The dynamic nature of computer networks mandates that examining and ensuring information security be a constant and vigilant effort.

More information

Securing Your Cloud Introduction Presentation

Securing Your Cloud Introduction Presentation Securing Your Cloud Introduction Presentation Slides originally created by IBM Partial deck derived by Continental Resources, Inc. (ConRes) Security Division Revision March 17, 2017 1 IBM Security Today

More information

Five Essential Capabilities for Airtight Cloud Security

Five Essential Capabilities for Airtight Cloud Security Five Essential Capabilities for Airtight Cloud Security SECURITY IN THE CLOUD REQUIRES NEW CAPABILITIES It is no secret; security and compliance are at the top of the list of concerns tied to cloud adoption.

More information

CS 356 Operating System Security. Fall 2013

CS 356 Operating System Security. Fall 2013 CS 356 Operating System Security Fall 2013 Review Chapter 1: Basic Concepts and Terminology Chapter 2: Basic Cryptographic Tools Chapter 3 User Authentication Chapter 4 Access Control Lists Chapter 5 Database

More information

The New Normal. Unique Challenges When Monitoring Hybrid Cloud Environments

The New Normal. Unique Challenges When Monitoring Hybrid Cloud Environments The New Normal Unique Challenges When Monitoring Hybrid Cloud Environments The Evolving Cybersecurity Landscape Every day, the cybersecurity landscape is expanding around us. Each new device connected

More information

Cloud-Security: Show-Stopper or Enabling Technology?

Cloud-Security: Show-Stopper or Enabling Technology? Cloud-Security: Show-Stopper or Enabling Technology? Fraunhofer Institute for Secure Information Technology (SIT) Technische Universität München Open Grid Forum, 16.3,. 2010, Munich Overview 1. Cloud Characteristics

More information

Cloud Computing An IT Paradigm Changer

Cloud Computing An IT Paradigm Changer Cloud Computing An IT Paradigm Changer Mazin Yousif, PhD CTO, Cloud Computing IBM Canada Ltd. Mazin Yousif, PhD T-Systems International 2009 IBM Corporation IT infrastructure reached breaking point App

More information

Enterprise D/DoS Mitigation Solution offering

Enterprise D/DoS Mitigation Solution offering Enterprise D/DoS Mitigation Solution offering About the Domain TCS Enterprise Security and Risk Management (ESRM) offers full services play in security with integrated security solutions. ESRM s solution

More information

Cloud Computing: Is it safe for you and your customers? Alex Hernandez DefenseStorm

Cloud Computing: Is it safe for you and your customers? Alex Hernandez DefenseStorm Presentation Title Cloud Computing: Is it safe for you and your customers? Alex Hernandez DefenseStorm Background A career of helping companies integrate new technologies into their existing infrastructure

More information

DEFINING SECURITY FOR TODAY S CLOUD ENVIRONMENTS. Security Without Compromise

DEFINING SECURITY FOR TODAY S CLOUD ENVIRONMENTS. Security Without Compromise DEFINING SECURITY FOR TODAY S CLOUD ENVIRONMENTS Security Without Compromise CONTENTS INTRODUCTION 1 SECTION 1: STRETCHING BEYOND STATIC SECURITY 2 SECTION 2: NEW DEFENSES FOR CLOUD ENVIRONMENTS 5 SECTION

More information

CLOUD COMPUTING. Lecture 4: Introductory lecture for cloud computing. By: Latifa ALrashed. Networks and Communication Department

CLOUD COMPUTING. Lecture 4: Introductory lecture for cloud computing. By: Latifa ALrashed. Networks and Communication Department 1 CLOUD COMPUTING Networks and Communication Department Lecture 4: Introductory lecture for cloud computing By: Latifa ALrashed Outline 2 Introduction to the cloud comupting Define the concept of cloud

More information

Overview of Web Application Security and Setup

Overview of Web Application Security and Setup Overview of Web Application Security and Setup Section Overview Where to get assistance Assignment #1 Infrastructure Setup Web Security Overview Web Application Evaluation & Testing Application Security

More information

SIEMLESS THREAT DETECTION FOR AWS

SIEMLESS THREAT DETECTION FOR AWS SOLUTION OVERVIEW: ALERT LOGIC FOR AMAZON WEB SERVICES (AWS) SIEMLESS THREAT DETECTION FOR AWS Few things are as important to your business as maintaining the security of your sensitive data. Protecting

More information

Module Day Topic. 1 Definition of Cloud Computing and its Basics

Module Day Topic. 1 Definition of Cloud Computing and its Basics Module Day Topic 1 Definition of Cloud Computing and its Basics 1 2 3 1. How does cloud computing provides on-demand functionality? 2. What is the difference between scalability and elasticity? 3. What

More information

Device Discovery for Vulnerability Assessment: Automating the Handoff

Device Discovery for Vulnerability Assessment: Automating the Handoff Device Discovery for Vulnerability Assessment: Automating the Handoff O V E R V I E W While vulnerability assessment tools are widely believed to be very mature and approaching commodity status, they are

More information

Managing SaaS risks for cloud customers

Managing SaaS risks for cloud customers Managing SaaS risks for cloud customers Information Security Summit 2016 September 13, 2016 Ronald Tse Founder & CEO, Ribose For every IaaS/PaaS, there are 100s of SaaS PROBLEM SaaS spending is almost

More information

Securing Cloud Computing

Securing Cloud Computing Securing Cloud Computing NLIT Summit, May 2018 PRESENTED BY Jeffrey E. Forster jeforst@sandia.gov Lucille Forster lforste@sandia.gov Sandia National Laboratories is a multimission laboratory managed and

More information

Aspirin as a Service: Using the Cloud to Cure Security Headaches

Aspirin as a Service: Using the Cloud to Cure Security Headaches SESSION ID: CSV-T10 Aspirin as a Service: Using the Cloud to Cure Security Headaches Bill Shinn Principle Security Solutions Architect Amazon Web Services Rich Mogull CEO Securosis @rmogull Little. Cloudy.

More information

Question No: 1 After running a packet analyzer on the network, a security analyst has noticed the following output:

Question No: 1 After running a packet analyzer on the network, a security analyst has noticed the following output: Volume: 75 Questions Question No: 1 After running a packet analyzer on the network, a security analyst has noticed the following output: Which of the following is occurring? A. A ping sweep B. A port scan

More information

Agenda. Why we need a new approach to endpoint security. Introducing Sophos Intercept X. Demonstration / Feature Walk Through. Deployment Options

Agenda. Why we need a new approach to endpoint security. Introducing Sophos Intercept X. Demonstration / Feature Walk Through. Deployment Options Agenda Why we need a new approach to endpoint security Introducing Sophos Intercept X Demonstration / Feature Walk Through Deployment Options Q & A 2 Endpoint Security has reached a Tipping Point Attacks

More information

Use Case Brief BUILDING A PRIVATE CLOUD PROVIDING PUBLIC CLOUD FUNCTIONALITY WITHIN THE SAFETY OF YOUR ORGANIZATION

Use Case Brief BUILDING A PRIVATE CLOUD PROVIDING PUBLIC CLOUD FUNCTIONALITY WITHIN THE SAFETY OF YOUR ORGANIZATION Use Case Brief BUILDING A PRIVATE CLOUD PROVIDING PUBLIC CLOUD FUNCTIONALITY WITHIN THE SAFETY OF YOUR ORGANIZATION At many enterprises today, end users are demanding a powerful yet easy-to-use Private

More information

Securing Privileged Access and the SWIFT Customer Security Controls Framework (CSCF)

Securing Privileged Access and the SWIFT Customer Security Controls Framework (CSCF) Securing Privileged Access and the SWIFT Customer Security Controls Framework (CSCF) A Guide to Leveraging Privileged Account Security to Assist with SWIFT CSCF Compliance Table of Contents Executive Summary...

More information

Endpoint Security Can Be Much More Effective and Less Costly. Here s How

Endpoint Security Can Be Much More Effective and Less Costly. Here s How Endpoint Security Can Be Much More Effective and Less Costly Here s How Contents Introduction More is not always better Escalating IT Security Budgets Ineffective management Need of the hour System management

More information

CLOUD WORKLOAD SECURITY

CLOUD WORKLOAD SECURITY SOLUTION OVERVIEW CLOUD WORKLOAD SECURITY Bottom line: If you re in IT today, you re already in the cloud. As technology becomes an increasingly important element of business success, the adoption of highly

More information

TRAPS ADVANCED ENDPOINT PROTECTION

TRAPS ADVANCED ENDPOINT PROTECTION TRAPS ADVANCED ENDPOINT PROTECTION Technology Overview Palo Alto Networks White Paper Most organizations deploy a number of security products to protect their endpoints, including one or more traditional

More information

CLOUD COMPUTING. Rajesh Kumar. DevOps Architect.

CLOUD COMPUTING. Rajesh Kumar. DevOps Architect. CLOUD COMPUTING Rajesh Kumar DevOps Architect @RajeshKumarIN www.rajeshkumar.xyz www.scmgalaxy.com 1 Session Objectives This session will help you to: Introduction to Cloud Computing Cloud Computing Architecture

More information

Article Summary of: Understanding Cloud Computing Vulnerabilities. Michael R. Eldridge

Article Summary of: Understanding Cloud Computing Vulnerabilities. Michael R. Eldridge Article Summary of: Understanding Cloud Computing Vulnerabilities Michael R. Eldridge April 14, 2016 2 Introduction News stories abound about the almost daily occurrence of break-ins and the stealing of

More information

STRATEGIC WHITE PAPER. Securing cloud environments with Nuage Networks VSP: Policy-based security automation and microsegmentation overview

STRATEGIC WHITE PAPER. Securing cloud environments with Nuage Networks VSP: Policy-based security automation and microsegmentation overview STRATEGIC WHITE PAPER Securing cloud environments with Nuage Networks VSP: Policy-based security automation and microsegmentation overview Abstract Cloud architectures rely on Software-Defined Networking

More information

Technical Review Managing Risk, Complexity, and Cost with SanerNow Endpoint Security and Management Platform

Technical Review Managing Risk, Complexity, and Cost with SanerNow Endpoint Security and Management Platform Technical Review Managing Risk, Complexity, and Cost with SanerNow Endpoint Security and Management Platform Date: October, 2018 Author: Jack Poller, Sr. Analyst The Challenges Enterprise Strategy Group

More information

Adopting Modern Practices for Improved Cloud Security. Cox Automotive - Enterprise Risk & Security

Adopting Modern Practices for Improved Cloud Security. Cox Automotive - Enterprise Risk & Security Adopting Modern Practices for Improved Cloud Security Cox Automotive - Enterprise Risk & Security 1 About Cox Automotive Cox Automotive is a leading provider of products and services that span the automotive

More information

Development. Architecture QA. Operations

Development. Architecture QA. Operations Development Architecture QA Operations Lack of business agility Slow to onboard new customers Hard to practice true DevOps Outpaced by disruptors Rogue dev projects Lack of SecOps agility Slow threat assessments

More information

WHITE PAPER. Best Practices for Web Application Firewall Management

WHITE PAPER. Best Practices for Web Application Firewall Management WHITE PAPER Best Practices for Web Application Firewall Management WHITE PAPER Best Practices for Web Application Firewall Management.. INTRODUCTION 1 DEPLOYMENT BEST PRACTICES 2 Document your security

More information

Pass4suresVCE. Pass4sures exam vce dumps for guaranteed success with high scores

Pass4suresVCE.   Pass4sures exam vce dumps for guaranteed success with high scores Pass4suresVCE http://www.pass4suresvce.com Pass4sures exam vce dumps for guaranteed success with high scores Exam : CS0-001 Title : CompTIA Cybersecurity Analyst (CySA+) Exam Vendor : CompTIA Version :

More information

Virtual Machines. Jinkyu Jeong Computer Systems Laboratory Sungkyunkwan University

Virtual Machines. Jinkyu Jeong Computer Systems Laboratory Sungkyunkwan University Virtual Machines Jinkyu Jeong (jinkyu@skku.edu) Computer Systems Laboratory Sungkyunkwan University http://csl.skku.edu Today's Topics History and benefits of virtual machines Virtual machine technologies

More information

A (sample) computerized system for publishing the daily currency exchange rates

A (sample) computerized system for publishing the daily currency exchange rates A (sample) computerized system for publishing the daily currency exchange rates The Treasury Department has constructed a computerized system that publishes the daily exchange rates of the local currency

More information

Embracing a Secure Cloud. Cloud & Network Virtualisation India 2017

Embracing a Secure Cloud. Cloud & Network Virtualisation India 2017 Embracing a Secure Cloud Cloud & Network Virtualisation India 2017 Cloud Computing Group of computing resources providing services such as servers, storage, databases, software, applications, networks

More information

THE ACCENTURE CYBER DEFENSE SOLUTION

THE ACCENTURE CYBER DEFENSE SOLUTION THE ACCENTURE CYBER DEFENSE SOLUTION A MANAGED SERVICE FOR CYBER DEFENSE FROM ACCENTURE AND SPLUNK. YOUR CURRENT APPROACHES TO CYBER DEFENSE COULD BE PUTTING YOU AT RISK Cyber-attacks are increasingly

More information

How unified backup and cloud enable your digital transformation success

How unified backup and cloud enable your digital transformation success Key Considerations for Data Protection and Cloud on Your Digital Journey How unified backup and cloud enable your digital transformation success An IDC InfoBrief, Sponsored by February 2018 1 Digital Transformation

More information

Course Outline Topic 1: Current State Assessment, Security Operations Centers, and Security Architecture

Course Outline Topic 1: Current State Assessment, Security Operations Centers, and Security Architecture About this Course This course will best position your organization to analyse threats and detect anomalies that could indicate cybercriminal behaviour. The payoff for this new proactive approach would

More information

Privilege Security & Next-Generation Technology. Morey J. Haber Chief Technology Officer

Privilege Security & Next-Generation Technology. Morey J. Haber Chief Technology Officer Privilege Security & Next-Generation Technology Morey J. Haber Chief Technology Officer mhaber@beyondtrust.com Agenda The Next-Gen Threat Landscape o Infomatics, Breaches & the Attack Chain o Securing

More information

Protecting Against Modern Attacks. Protection Against Modern Attack Vectors

Protecting Against Modern Attacks. Protection Against Modern Attack Vectors Protecting Against Modern Attacks Protection Against Modern Attack Vectors CYBER SECURITY IS A CEO ISSUE. - M C K I N S E Y $4.0M 81% >300K 87% is the average cost of a data breach per incident. of breaches

More information

Protect Your Organization from Cyber Attacks

Protect Your Organization from Cyber Attacks Protect Your Organization from Cyber Attacks Leverage the advanced skills of our consultants to uncover vulnerabilities our competitors overlook. READY FOR MORE THAN A VA SCAN? Cyber Attacks by the Numbers

More information

In this unit we are going to look at cloud computing. Cloud computing, also known as 'on-demand computing', is a kind of Internet-based computing,

In this unit we are going to look at cloud computing. Cloud computing, also known as 'on-demand computing', is a kind of Internet-based computing, In this unit we are going to look at cloud computing. Cloud computing, also known as 'on-demand computing', is a kind of Internet-based computing, where shared resources, data and information are provided

More information

The Top 6 WAF Essentials to Achieve Application Security Efficacy

The Top 6 WAF Essentials to Achieve Application Security Efficacy The Top 6 WAF Essentials to Achieve Application Security Efficacy Introduction One of the biggest challenges IT and security leaders face today is reducing business risk while ensuring ease of use and

More information

The Business Case for Network Segmentation

The Business Case for Network Segmentation Modern network segmentation to reduce risk and cost Abstract Modern network segmentation, also known as microsegmentation, offers a new way of managing and securing your network, offering tremendous benefits

More information

Cloud Computing: Making the Right Choice for Your Organization

Cloud Computing: Making the Right Choice for Your Organization Cloud Computing: Making the Right Choice for Your Organization A decade ago, cloud computing was on the leading edge. Now, 95 percent of businesses use cloud technology, and Gartner says that by 2020,

More information

The SANS Institute Top 20 Critical Security Controls. Compliance Guide

The SANS Institute Top 20 Critical Security Controls. Compliance Guide The SANS Institute Top 20 Critical Security Controls Compliance Guide February 2014 The Need for a Risk-Based Approach A common factor across many recent security breaches is that the targeted enterprise

More information

Overcoming the Challenges of Automating Security in a DevOps Environment

Overcoming the Challenges of Automating Security in a DevOps Environment SESSION ID: LAB-W02 Overcoming the Challenges of Automating Security in a DevOps Environment Murray Goldschmidt Chief Operating Officer Sense of Security @ITsecurityAU Michael McKinnon Director, Commercial

More information

Smart Attacks require Smart Defence Moving Target Defence

Smart Attacks require Smart Defence Moving Target Defence Smart Attacks require Smart Defence Moving Target Defence Prof. Dr. Gabi Dreo Rodosek Executive Director of the Research Institute CODE 1 Virtual, Connected, Smart World Real World Billions of connected

More information

Essential Cloud Security Features in Windows Azure

Essential Cloud Security Features in Windows Azure Essential Cloud Security Features in Windows Azure Ramya Dharam 1, and Sajjan G. Shiva 2 1 Department of Computer Science, University of Memphis, Memphis, TN, USA 2 Department of Computer Science, University

More information

Cloud Computing Concepts, Models, and Terminology

Cloud Computing Concepts, Models, and Terminology Cloud Computing Concepts, Models, and Terminology Chapter 1 Cloud Computing Advantages and Disadvantages https://www.youtube.com/watch?v=ojdnoyiqeju Topics Cloud Service Models Cloud Delivery Models and

More information

Threat Modeling. Bart De Win Secure Application Development Course, Credits to

Threat Modeling. Bart De Win Secure Application Development Course, Credits to Threat Modeling Bart De Win bart.dewin@ascure.com Secure Application Development Course, 2009 Credits to Frank Piessens (KUL) for the slides 2 1 Overview Introduction Key Concepts Threats, Vulnerabilities,

More information

Attackers Process. Compromise the Root of the Domain Network: Active Directory

Attackers Process. Compromise the Root of the Domain Network: Active Directory Attackers Process Compromise the Root of the Domain Network: Active Directory BACKDOORS STEAL CREDENTIALS MOVE LATERALLY MAINTAIN PRESENCE PREVENTION SOLUTIONS INITIAL RECON INITIAL COMPROMISE ESTABLISH

More information

Survey of Cyber Moving Targets. Presented By Sharani Sankaran

Survey of Cyber Moving Targets. Presented By Sharani Sankaran Survey of Cyber Moving Targets Presented By Sharani Sankaran Moving Target Defense A cyber moving target technique refers to any technique that attempts to defend a system and increase the complexity of

More information

BEST PRACTICES FOR SELECTING A WEB APPLICATION SCANNING (WAS) SOLUTION

BEST PRACTICES FOR SELECTING A WEB APPLICATION SCANNING (WAS) SOLUTION GUIDE BEST PRACTICES FOR SELECTING A WEB APPLICATION SCANNING (WAS) SOLUTION CONTINUOUS SECURITY With attackers getting more sophisticated every day, manual methods of locating and testing web-based apps

More information

Crises Control Cloud Security Principles. Transputec provides ICT Services and Solutions to leading organisations around the globe.

Crises Control Cloud Security Principles. Transputec provides ICT Services and Solutions to leading organisations around the globe. Crises Control Cloud Security Principles Transputec provides ICT Services and Solutions to leading organisations around the globe. As a provider of these services for over 30 years, we have the credibility

More information

How Security Policy Orchestration Extends to Hybrid Cloud Platforms

How Security Policy Orchestration Extends to Hybrid Cloud Platforms How Security Policy Orchestration Extends to Hybrid Cloud Platforms Reducing complexity also improves visibility when managing multi vendor, multi technology heterogeneous IT environments www.tufin.com

More information

Introduction to Cloud Computing. [thoughtsoncloud.com] 1

Introduction to Cloud Computing. [thoughtsoncloud.com] 1 Introduction to Cloud Computing [thoughtsoncloud.com] 1 Outline What is Cloud Computing? Characteristics of the Cloud Computing model Evolution of Cloud Computing Cloud Computing Architecture Cloud Services:

More information

Securing Applications in the Cloud

Securing Applications in the Cloud Securing Applications in the Cloud Introduction to Cloud Application Security... 2 About the authors...3 About the Cloud Security Alliance... 3 Problem Statement... 4 Issues and Guidance... 4 Infrastructure

More information

10 FOCUS AREAS FOR BREACH PREVENTION

10 FOCUS AREAS FOR BREACH PREVENTION 10 FOCUS AREAS FOR BREACH PREVENTION Keith Turpin Chief Information Security Officer Universal Weather and Aviation Why It Matters Loss of Personally Identifiable Information (PII) Loss of Intellectual

More information

Mitigating Risks with Cloud Computing Dan Reis

Mitigating Risks with Cloud Computing Dan Reis Mitigating Risks with Cloud Computing Dan Reis Director of U.S. Product Marketing Trend Micro Agenda Cloud Adoption Key Characteristics The Cloud Landscape and its Security Challenges The SecureCloud Solution

More information

Security Models for Cloud

Security Models for Cloud Security Models for Cloud Kurtis E. Minder, CISSP December 03, 2011 Introduction Kurtis E. Minder, Technical Sales Professional Companies: Roles: Security Design Engineer Systems Engineer Sales Engineer

More information

Healthcare IT Modernization and the Adoption of Hybrid Cloud

Healthcare IT Modernization and the Adoption of Hybrid Cloud Healthcare IT Modernization and the Adoption of Hybrid Cloud An IDC InfoBrief, Sponsored by VMware June 2018 Executive Summary The healthcare industry is facing unprecedented changes brought about by a

More information

Survey Results: Virtual Insecurity

Survey Results: Virtual Insecurity Best Practices SURVEY Survey Results: Virtual Insecurity May 2013 Executive Summary: Virtual Assets Could Bring Real Risk Virtualization technologies have reshaped how IT offers and delivers their services

More information

Use Case Brief BORDERLESS DATACENTERS

Use Case Brief BORDERLESS DATACENTERS Use Case Brief BORDERLESS DATACENTERS Today s cloud service providers must maintain consistent levels of service for each end user or customer, independent of physical location and hardware. This brief

More information

Murray Goldschmidt. Chief Operating Officer Sense of Security Pty Ltd. Micro Services, Containers and Serverless PaaS Web Apps? How safe are you?

Murray Goldschmidt. Chief Operating Officer Sense of Security Pty Ltd. Micro Services, Containers and Serverless PaaS Web Apps? How safe are you? Murray Goldschmidt Chief Operating Officer Sense of Security Pty Ltd Micro Services, Containers and Serverless PaaS Web Apps? How safe are you? A G E N D A 1 2 3 Serverless, Microservices and Container

More information

Qualys Cloud Platform

Qualys Cloud Platform Qualys Cloud Platform Our Journey into the Cloud: The Qualys Cloud Platform & Architecture Thomas Wendt Regional Manager Post-Sales, DACH, Qualys Inc. Digital Transformation More than just adopting new

More information

An Introduction to the Waratek Application Security Platform

An Introduction to the Waratek Application Security Platform Product Analysis January 2017 An Introduction to the Waratek Application Security Platform The Transformational Application Security Technology that Improves Protection and Operations Highly accurate.

More information

Lecture 09: VMs and VCS head in the clouds

Lecture 09: VMs and VCS head in the clouds Lecture 09: VMs and VCS head in the Hands-on Unix system administration DeCal 2012-10-29 1 / 20 Projects groups of four people submit one form per group with OCF usernames, proposed project ideas, and

More information

Cloud Customer Architecture for Securing Workloads on Cloud Services

Cloud Customer Architecture for Securing Workloads on Cloud Services Cloud Customer Architecture for Securing Workloads on Cloud Services http://www.cloud-council.org/deliverables/cloud-customer-architecture-for-securing-workloads-on-cloud-services.htm Webinar April 19,

More information

Achieving Digital Transformation: FOUR MUST-HAVES FOR A MODERN VIRTUALIZATION PLATFORM WHITE PAPER

Achieving Digital Transformation: FOUR MUST-HAVES FOR A MODERN VIRTUALIZATION PLATFORM WHITE PAPER Achieving Digital Transformation: FOUR MUST-HAVES FOR A MODERN VIRTUALIZATION PLATFORM WHITE PAPER Table of Contents The Digital Transformation 3 Four Must-Haves for a Modern Virtualization Platform 3

More information

Data Communication. Chapter # 5: Networking Threats. By: William Stalling

Data Communication. Chapter # 5: Networking Threats. By: William Stalling Data Communication Chapter # 5: By: Networking Threats William Stalling Risk of Network Intrusion Whether wired or wireless, computer networks are quickly becoming essential to everyday activities. Individuals

More information

1/10/2011. Topics. What is the Cloud? Cloud Computing

1/10/2011. Topics. What is the Cloud? Cloud Computing Cloud Computing Topics 1. What is the Cloud? 2. What is Cloud Computing? 3. Cloud Service Architectures 4. History of Cloud Computing 5. Advantages of Cloud Computing 6. Disadvantages of Cloud Computing

More information

Real-time Communications Security and SDN

Real-time Communications Security and SDN Real-time Communications Security and SDN 2016 [Type here] Securing the new generation of communications applications, those delivering real-time services including voice, video and Instant Messaging,

More information

The Emerging Role of a CDN in Facilitating Secure Cloud Deployments

The Emerging Role of a CDN in Facilitating Secure Cloud Deployments White Paper The Emerging Role of a CDN in Facilitating Secure Cloud Deployments Sponsored by: Fastly Robert Ayoub August 2017 IDC OPINION The ongoing adoption of cloud services and the desire for anytime,

More information

Enhancing the Cybersecurity of Federal Information and Assets through CSIP

Enhancing the Cybersecurity of Federal Information and Assets through CSIP TECH BRIEF How BeyondTrust Helps Government Agencies Address Privileged Access Management to Improve Security Contents Introduction... 2 Achieving CSIP Objectives... 2 Steps to improve protection... 3

More information

Internet Scanner 7.0 Service Pack 2 Frequently Asked Questions

Internet Scanner 7.0 Service Pack 2 Frequently Asked Questions Frequently Asked Questions Internet Scanner 7.0 Service Pack 2 Frequently Asked Questions April 2005 6303 Barfield Road Atlanta, GA 30328 Tel: 404.236.2600 Fax: 404.236.2626 Internet Security Systems (ISS)

More information

Transforming Security from Defense in Depth to Comprehensive Security Assurance

Transforming Security from Defense in Depth to Comprehensive Security Assurance Transforming Security from Defense in Depth to Comprehensive Security Assurance February 28, 2016 Revision #3 Table of Contents Introduction... 3 The problem: defense in depth is not working... 3 The new

More information

Cloud Computing. Vania Marangozova-Martin. ibd.forge.imag.fr

Cloud Computing. Vania Marangozova-Martin. ibd.forge.imag.fr Cloud Computing Vania Marangozova-Martin ibd.forge.imag.fr Some remarks on cloud definitions u Anonymous: [...] unfortunately the marketing guys got hold of the term before the technicians had known what

More information

Hypervisor security. Evgeny Yakovlev, DEFCON NN, 2017

Hypervisor security. Evgeny Yakovlev, DEFCON NN, 2017 Hypervisor security Evgeny Yakovlev, DEFCON NN, 2017 whoami Low-level development in C and C++ on x86 UEFI, virtualization, security Jetico, Kaspersky Lab QEMU/KVM developer at Virtuozzo 2 Agenda Why hypervisor

More information

Cloud Under Control. HyTrust Two-Man Rule Solution Brief

Cloud Under Control. HyTrust Two-Man Rule Solution Brief HyTrust Two-Man Rule Solution Brief Summary Summary The exposure of extremely confidential national security information by an N.S.A. systems administrator highlighted the catastrophic consequences of

More information

IBM Future of Work Forum

IBM Future of Work Forum IBM Cognitive IBM Future of Work Forum The Engaged Enterprise Comes Alive Improving Organizational Collaboration and Efficiency While Enhancing Security on Mobile and Cloud Apps Chris Hockings IBM Master

More information

What is Cloud Computing? Cloud computing is the dynamic delivery of IT resources and capabilities as a Service over the Internet.

What is Cloud Computing? Cloud computing is the dynamic delivery of IT resources and capabilities as a Service over the Internet. 1 INTRODUCTION What is Cloud Computing? Cloud computing is the dynamic delivery of IT resources and capabilities as a Service over the Internet. Cloud computing encompasses any Subscriptionbased or pay-per-use

More information

OWASP TOP Release. Andy Willingham June 12, 2018 OWASP Cincinnati

OWASP TOP Release. Andy Willingham June 12, 2018 OWASP Cincinnati OWASP TOP 10 2017 Release Andy Willingham June 12, 2018 OWASP Cincinnati Agenda A quick history lesson The Top 10(s) Web Mobile Privacy Protective Controls Why have a Top 10? Software runs the world (infrastructure,

More information

IT infrastructure layers requiring Privileged Identity Management

IT infrastructure layers requiring Privileged Identity Management White Paper IT infrastructure layers requiring Privileged Identity Management Abstract Much of today s IT infrastructure is structured as different layers of devices (virtual and physical) and applications.

More information

Choosing the Right Security Assessment

Choosing the Right Security Assessment A Red Team Whitepaper Choosing the Right Security Navigating the various types of Security s and selecting an IT security service provider can be a daunting task; however, it does not have to be. Understanding

More information

Teradata and Protegrity High-Value Protection for High-Value Data

Teradata and Protegrity High-Value Protection for High-Value Data Teradata and Protegrity High-Value Protection for High-Value Data 12.16 EB7178 DATA SECURITY Table of Contents 2 Data Centric Security: Providing High-Value Protection for High-Value Data 3 Visibility:

More information

Jim Reavis CEO and Founder Cloud Security Alliance December 2017

Jim Reavis CEO and Founder Cloud Security Alliance December 2017 CLOUD THREAT HUNTING Jim Reavis CEO and Founder Cloud Security Alliance December 2017 A B O U T T H E BUILDING SECURITY BEST PRACTICES FOR NEXT GENERATION IT C L O U D S E C U R I T Y A L L I A N C E GLOBAL,

More information

Using Threat Analytics to Protect Privileged Access and Prevent Breaches

Using Threat Analytics to Protect Privileged Access and Prevent Breaches Using Threat Analytics to Protect Privileged Access and Prevent Breaches Under Attack Protecting privileged access and preventing breaches remains an urgent concern for companies of all sizes. Attackers

More information

VULNERABILITY ASSESSMENT: SYSTEM AND NETWORK PENETRATION TESTING. Presented by: John O. Adeika Student ID:

VULNERABILITY ASSESSMENT: SYSTEM AND NETWORK PENETRATION TESTING. Presented by: John O. Adeika Student ID: VULNERABILITY ASSESSMENT: SYSTEM AND NETWORK PENETRATION TESTING. Presented by: John O. Adeika Student ID: 000205600 What is Penetration A penetration test, is a method of evaluating the security of a

More information

IBM Cloud Security for the Cloud. Amr Ismail Security Solutions Sales Leader Middle East & Pakistan

IBM Cloud Security for the Cloud. Amr Ismail Security Solutions Sales Leader Middle East & Pakistan IBM Cloud Security for the Cloud Amr Ismail Security Solutions Sales Leader Middle East & Pakistan Today s Drivers for Cloud Adoption ELASTIC LOWER COST SOLVES SKILLS SHORTAGE RAPID INNOVATION GREATER

More information

Meeting PCI DSS 3.2 Compliance with RiskSense Solutions

Meeting PCI DSS 3.2 Compliance with RiskSense Solutions Meeting PCI DSS 3.2 Compliance with Solutions Platform the industry s most comprehensive, intelligent platform for managing cyber risk. 2018, Inc. What s Changing with PCI DSS? Summary of PCI Business

More information