Lecture 6
Lecture 6
• The main security concern for users of SaaS is denial of service attacks that may
be made towards them directly, or that might affect them when their provider it
attacked.
• In denial of service attacks malware may be injected into the servers that
generate useless traffic to the server that slows down access of service by
genuine users.
• Another way that is done is by hackers giving multiple commands to servers that
slow it down and make it hard for other users to be able to enjoy the service
sufficiently.
SECURITY IN PAAS(PLATFORM AS A SERVICE)
• PaaS has some underlying security concerns associated with it, which emerge
mostly from the activities of the provider such as third-party relationships they
may have with other providers.
• Combinations of these elements from numerous sources create mash-ups,
whose security is suspect, and which also brings the security concerns into the
entire platform.
• Another security issue with PaaS is the requisite frequent upgrading of features
contained in the platform.
SECURITY IN PAAS(PLATFORM AS A SERVICE)
• IaaS providers make storage facilities, servers, networks and other computing resources
available to their users by creating virtualized systems.
• The security concerns experienced by IaaS therefore come from the virtualization feature of
their services such as the hypervisor, which oversees the performance of all virtual machines.
• The hypervisor therefore becomes a very crucial component of the IaaS that must be
secured, as its breach is passed on to the whole system.
• Other weak points of the IaaS include Virtual Machine image repositories which are made
public for all users.
• These repositories, when infected images are uploaded onto them, could potentially spread
the infection to the whole cloud.
THREATS TO CLOUD APPLICATIONS
• loss or leakage of data during transit into the cloud, during transfer from one
point of the cloud to the other, such as from the provider to the cloud or from
the cloud to the user’s computers.
• Hijacking of service provisions is another detrimental threat, which is mostly
perpetrated by hackers in order to illegally access other people’s data for
personal gain;
• the last threat to cloud computing is the unknown risk factor, the ever present
factor to every business decision in a business on the unpredictability of events
out of the entrepreneur’s control.
MANAGING RISKS
• https://www.box.com/en-in/resources/what-is-cloud-security
• https://www.javatpoint.com/what-is-cloud-security
• https://www.beyondtrust.com/resources/glossary/cloud-security-cloud-
computing-security
THANK YOU
For queries
Email: [email protected]
14