Previous
Previous Product Image

Easy Notes of Cloud Computing unit- 3 @Computer Diploma

Original price was: ₹99.99.Current price is: ₹19.99.
Next

Easy Notes of Cloud Computing unit- 5 @Computer Diploma

Original price was: ₹99.99.Current price is: ₹19.99.
Next Product Image

Easy Notes of Cloud Computing unit- 4@Computer Diploma

Original price was: ₹99.99.Current price is: ₹19.99.

Unit – IV Security in Cloud Computing
4.1. Cloud Security Concepts: Multi-tenancy, Virtualization, Data Outsourcing and Trust
Management, Metadata security
4.2. Cloud Risk: Concept, Types of Cloud Risks
4.3. Policy and Organizational Risks
4.4. Technical Risks
4.5. Legal Risks
4.6. Data security technologies, Data Security risks
4.7. Digital Identity and Access Management
4.8. Content level security: Pros and Cons, Features of Security-As-A-Cloud Service

Hurry Up!
Add to Wishlist
Add to Wishlist

Description

4.1 Cloud Security Concepts

  • Multi-tenancy: Multiple customers (tenants) share the same physical hardware; security relies on logical isolation to prevent cross-tenant data leakage.

  • Virtualization Security: The hypervisor is the primary target. VM Escape (an attacker breaking out of a VM to the host) is the biggest risk.

  • Data Outsourcing: Moving data to a third party. Security relies on Encryption and Trust Management (relying on the provider’s reputation and audits).

  • Metadata Security: Protecting “data about data” (e.g., file names, sizes, permissions) which can reveal sensitive patterns if intercepted.

4.2 – 4.5 Cloud Risks

Cloud risks are typically categorized into four main domains:

Risk Type Description & Key Examples
Policy/Organizational Vendor Lock-in (hard to switch), loss of governance, and inadequate due diligence.
Technical Hypervisor vulnerabilities, insecure APIs, account hijacking, and “Noisy Neighbor” (resource exhaustion).
Legal Data Sovereignty (data stored in countries with different laws), e-discovery issues, and regulatory non-compliance (GDPR, HIPAA).
Operational Service outages, provider bankruptcy, and poor backup/disaster recovery.

4.6 Data Security Technologies & Risks

  • Encryption: * At Rest: Protecting data on disks (using AES-256).

    • In Transit: Protecting data moving over the network (using TLS/SSL).

  • Masking & Tokenization: Replacing sensitive data (like credit card numbers) with non-sensitive placeholders (tokens).

  • Data Loss Prevention (DLP): Tools that monitor and block sensitive data from being exfiltrated.

  • Risks: Key management failure (losing encryption keys), improper deletion (data remnants), and unauthorized access.

4.7 Digital Identity and Access Management (IAM)

IAM is the “bouncer” of the cloud. It ensures the right person has the right access at the right time.

  • Authentication (AuthN): Verifying who you are (Passwords, MFA, Biometrics).

  • Authorization (AuthZ): Verifying what you can do (Role-Based Access Control – RBAC).

  • Single Sign-On (SSO): One set of credentials for multiple cloud apps.

  • Privileged Access Management (PAM): Extra security for “Super-user” or Admin accounts.

4.8 Content Level Security & SECaaS

  • Content-Level Security: Security applied directly to the file/data itself rather than the network or server.

    • Pros: Security travels with the data; protection persists even if the cloud is breached.

    • Cons: High processing overhead; complex to manage keys for thousands of files.

  • Security-as-a-Service (SECaaS): Outsourcing security to a cloud provider (e.g., Cloudflare, Okta).

    • Features: Scalable, cost-effective (OpEx), access to expert tools, and continuous updates against new threats.

Quick Recall Keywords for Exams:

  • Shared Responsibility: Provider secures the “Cloud”; Customer secures “in the Cloud.”

  • Least Privilege: Giving users only the minimum access they need to do their job.

  • Data Residencies: Physical location of data affects legal jurisdiction.

  • Zero Trust: “Never trust, always verify” every request regardless of origin.

Reviews

There are no reviews yet.

Be the first to review “Easy Notes of Cloud Computing unit- 4@Computer Diploma”

Your email address will not be published. Required fields are marked *

Shopping cart

0
image/svg+xml

No products in the cart.

Continue Shopping