Главная
Study mode:
on
1
Intro
2
Topics
3
What is Cloud Computing?
4
Cloud Service Architectures as Layers
5
Cloud Service Models Abstraction Layers
6
Multi-Tenancy
7
Cloud Deployment Architectures
8
Data Loss
9
Downtimes
10
Phishing
11
Password Cracking
12
Botnets and Malware
13
Virtualization Security Features: Isolation
14
Virtualization Security Features: Snapshot
15
State Restore
16
Complexity
17
Hypervisor Security
18
Inter-VM Attacks
19
Scaling
20
Transience
21
Data Lifetime
22
Accountability
23
No Security Perimeter
24
Larger Attack Surface
25
New Side Channels
26
Lack of Auditability
27
Regulatory Compliance
28
Certifications
29
Data Security
30
Public Key Cryptography
31
An Analogy: Alice's Jewelry Store
32
Homomorphic Public-key Encryption
33
References
Description:
Explore cloud computing security in this 53-minute lecture by Dr. James Walden. Delve into the emerging paradigm of cloud computing for large-scale web application deployment, examining its potential to reduce complexity and costs while introducing new risks. Understand why traditional security approaches like firewalls and network intrusion detection may be ineffective in cloud environments. Investigate key risks such as loss of governance, regulatory compliance challenges, expanded attack surfaces, and hypervisor vulnerabilities. Learn about mitigation strategies for these cloud-specific security concerns. Cover topics including cloud service architectures, deployment models, data loss prevention, virtualization security features, inter-VM attacks, and the complexities of maintaining security in scalable, transient cloud environments. Gain insights into public key cryptography, homomorphic encryption, and their applications in securing cloud data.

Cloud Computing Security - Risks and Mitigation Strategies

Add to list
0:00 / 0:00