Beruflich Dokumente
Kultur Dokumente
Where is Data
Who has Access
What are rigid needs
Right to inspect
Data Categorization
Service Level Agreement (SLA)
Training
Long – term feasibility
Effects of Safety Break
Catastrophe Recovery / Corporation Permanence Strategy
Denial of Service
Man in the Middle Attack
Network Sniffing
Port Scanning
SQL Injection
Cross Site Scripting
Reliability
Secrecy, Veracity and Accessibility
Intellectual Property Rights
Encryption
Accessibility
Confidentiality
Cloud Computing Environment and Accessibility
Organizational Security and Privacy Requirements
Client – side Computing Environment Requirement
Cloud Security Services
Integrity
Cloud Security Design Principles and Tools
Qualys
White Hat Security
Okta
Proofpoint
Zscaler
DocTrackr
Vaultive
Major Security Design Principles
Least Privilege
Separation of Duties
Defence in Depth
Defence in Multiple Places
Layered Defences
Security Robustness
Deploy KMI / PKI
Deploy Intrusion Detection Systems
Fail – Safe
Economy of Mechanism
Complete Mediation
Leveraging Existing Components
Authentication
Authorization
Auditing
o An IT evaluator audits following functions –
System and Transaction Controls
System’s Development Standards
Backup Controls
Data Library Procedures
Data Centre Security
Contingency Plans
Accounting
Stress Testing
Load and Performance Testing
Functional Testing
Latency Testing
Browser Performance Testing
Compatibility Testing
Security Constraints
The Software’s non – functional properties
The Software’s positive functional requirements
Specific
Attainable
Realizable
Traceable
Appropriate
Reasonable
Public Data
Sensitive Data
Private Data
Confidential Data
Handling Data
Code Practices
Language Options
Micro Architecture
Pipelining
Superscalar Processor
Very – Long Instruction Word (VLIW) Processor
Multiprogramming
Multitasking
Multiprocessing
Multithreading
Simultaneous Multithreading (SMT)
VM Security Recommendations
VM Security Techniques
Retaining backup
Challenges to Cloud Security
Insecure Applications
Cloud customers have no control over their personal data. Cloud customers
essentially lose control over physical security when they move to the cloud,
since genuine servers can be placed wherever the providers choose to
place them. As physical cloud infrastructure supports various cloud
customers collectively, its safety is essential to both its customers and
CSPs. CSP seeks to provide better services to clients but procedures,
policies and processes are significant elements for successful physical
security which can protect the device and information assembled in hosting
centre. Server security issues consist of identifying details of server
applications such as following:-
Analysing users and groups of users to whom access rights are given
on server
Risk Issues
Regularity Issues
Transmission of Data
Network Safety
Data Safety
Data Confidentiality
Data Reliability
Data Setting
Data Accessibility
Data Segregation
Patch Management
Eavesdropping
o Passive Eavesdropping
o Active Eavesdropping
Fraud
Theft
Sabotage
External Attack
LOGON ABUSE
Fragmentation Attack