河南中医药大学:《信息安全网络与网络安全》课程教学资源(英文讲稿)第11章 云计算 Cloud Computing

SECURITY IN COMPUTING FIETH EDITION Chapter 11: Cloud Computing 授课教师:高海波 可南中医药大学 信息管理与信息系统教研室 From Security in Computing, Fifth Edition, by Charles P Pfleeger, et al. (ISBN: 9780134085043) Copyright 2015 by Pearson Education, Inc. All rights reserved
SECURITY IN COMPUTING, FIFTH EDITION Chapter 11: Cloud Computing From Security in Computing, Fifth Edition, by Charles P. Pfleeger, et al. (ISBN: 9780134085043). Copyright 2015 by Pearson Education, Inc. All rights reserved. 1 授课教师:高海波 河南中医药大学 信息管理与信息系统教研室

2 Objectives for Chapter 11 Define cloud services, including types and service models How to define cloud service requirements and identify appropriate services Survey cloud-based security capabilities and offerings Discuss cloud storage encryption considerations Protection of cloud-based applications and infrastructures Explain the major federated identity management standards and how they differ From Security in Computing, Fifth Edition, by Charles P Pfleeger, et al. (ISBN: 9780134085043) Copyright 2015 by Pearson Education, Inc. All rights reserved
From Security in Computing, Fifth Edition, by Charles P. Pfleeger, et al. (ISBN: 9780134085043). Copyright 2015 by Pearson Education, Inc. All rights reserved. Objectives for Chapter 11 • Define cloud services, including types and service models • How to define cloud service requirements and identify appropriate services • Survey cloud-based security capabilities and offerings • Discuss cloud storage encryption considerations • Protection of cloud-based applications and infrastructures • Explain the major federated identity management standards and how they differ 2

3 What Is cloud Computing? On-demand self-service Add or subtract resources as necessary Broad network access Mobile, desktop, mainframe Resource pooling Multiple tenants share resources that can be reassigned dynamically according to need and invisibly to the tenants Rapid elasticity Services can quickly and automatically scale up or down to meet customer need Measure service Like water, gas, or telephone service, usage can be monitored for billing From Security in Computing, Fifth Edition, by Charles P Pfleeger, et al. (ISBN: 9780134085043) Copyright 2015 by Pearson Education, Inc. All rights reserved
From Security in Computing, Fifth Edition, by Charles P. Pfleeger, et al. (ISBN: 9780134085043). Copyright 2015 by Pearson Education, Inc. All rights reserved. What Is Cloud Computing? • On-demand self-service • Add or subtract resources as necessary • Broad network access • Mobile, desktop, mainframe • Resource pooling • Multiple tenants share resources that can be reassigned dynamically according to need and invisibly to the tenants • Rapid elasticity • Services can quickly and automatically scale up or down to meet customer need • Measure service • Like water, gas, or telephone service, usage can be monitored for billing 3

Service Models Software as a service(SaaS) The cloud provider gives the customer access to applications running in the cloud Platform as a service(PaaS The customer has his or her own applications but the cloud provides the languages and tools for creating and running them Infrastructure as a service (laaS) The cloud provider offers processing, storage, networks, and other computing resources that enable customers to run any kind of software From Security in Computing, Fifth Edition, by Charles P Pfleeger, et al. (ISBN: 9780134085043) Copyright 2015 by Pearson Education, Inc. All rights reserved
From Security in Computing, Fifth Edition, by Charles P. Pfleeger, et al. (ISBN: 9780134085043). Copyright 2015 by Pearson Education, Inc. All rights reserved. Service Models • Software as a service (SaaS) • The cloud provider gives the customer access to applications running in the cloud • Platform as a service (PaaS) • The customer has his or her own applications, but the cloud provides the languages and tools for creating and running them • Infrastructure as a service (IaaS) • The cloud provider offers processing, storage, networks, and other computing resources that enable customers to run any kind of software 4

5 Service Models Administered Applications by the saas Provider Application Platform: Tools and APIs for Building and Deploying Applications Administered by the paaS Virtual machines. Virtual volume Provider Storage, Virtual Networking Equipment Hypervisor Administered by the laas Provider Hardware: Servers, Storage Devices and Networking Equipment From Security in Computing, Fifth Edition, by Charles P Pfleeger, et al. (ISBN: 9780134085043) Copyright 2015 by Pearson Education, Inc. All rights reserved
From Security in Computing, Fifth Edition, by Charles P. Pfleeger, et al. (ISBN: 9780134085043). Copyright 2015 by Pearson Education, Inc. All rights reserved. Service Models 5

6 Deployment Models Private cloud Infrastructure that is operated exclusively by and for the organization that owns it Community cloud Shared by several organizations with common needs, interests, or goals Public cloud Owned by a cloud service provider and offered to the general public Hybrid cloud Composed of two or more types of clouds, connected by technology that enables data and applications to balance loads among those clouds From Security in Computing, Fifth Edition, by Charles P Pfleeger, et al. (ISBN: 9780134085043) Copyright 2015 by Pearson Education, Inc. All rights reserved
From Security in Computing, Fifth Edition, by Charles P. Pfleeger, et al. (ISBN: 9780134085043). Copyright 2015 by Pearson Education, Inc. All rights reserved. Deployment Models • Private cloud • Infrastructure that is operated exclusively by and for the organization that owns it • Community cloud • Shared by several organizations with common needs, interests, or goals • Public cloud • Owned by a cloud service provider and offered to the general public • Hybrid cloud • Composed of two or more types of clouds, connected by technology that enables data and applications to balance loads among those clouds 6

7 Cloud Migration Risk Analysis Identify assets Determine vulnerabilities Estimate likelihood of exploitation Compute expected loss Survey and select new controls Project savings From Security in Computing, Fifth Edition, by Charles P Pfleeger, et al. (ISBN: 9780134085043) Copyright 2015 by Pearson Education, Inc. All rights reserved
From Security in Computing, Fifth Edition, by Charles P. Pfleeger, et al. (ISBN: 9780134085043). Copyright 2015 by Pearson Education, Inc. All rights reserved. Cloud Migration Risk Analysis • Identify assets • Determine vulnerabilities • Estimate likelihood of exploitation • Compute expected loss • Survey and select new controls • Project savings 7

8 Cloud Provider Assessment Security issues to consider Authentication authorization and access control options Encryption options Audit logging capabilities Incident response capabilities Reliability and uptime Resources to help with assessment FedRAMP PCI DSS CSA STAR From Security in Computing, Fifth Edition, by Charles P Pfleeger, et al. (ISBN: 9780134085043) Copyright 2015 by Pearson Education, Inc. All rights reserved
From Security in Computing, Fifth Edition, by Charles P. Pfleeger, et al. (ISBN: 9780134085043). Copyright 2015 by Pearson Education, Inc. All rights reserved. Cloud Provider Assessment • Security issues to consider: • Authentication, authorization, and access control options • Encryption options • Audit logging capabilities • Incident response capabilities • Reliability and uptime • Resources to help with assessment: • FedRAMP • PCI DSS • CSA STAR 8

9 Switching Cloud Providers Switching cloud providers is expensive and difficult but sometimes becomes necessary and urgent It is best to have backup options in place in case a migration away from a cloud provider is necessary, but many cloud providers make that practically impossible SaaS providers are generally hardest to migrate away from followed by Paas, then laas From Security in Computing, Fifth Edition, by Charles P Pfleeger, et al. (ISBN: 9780134085043) Copyright 2015 by Pearson Education, Inc. All rights reserved
From Security in Computing, Fifth Edition, by Charles P. Pfleeger, et al. (ISBN: 9780134085043). Copyright 2015 by Pearson Education, Inc. All rights reserved. Switching Cloud Providers • Switching cloud providers is expensive and difficult but sometimes becomes necessary and urgent • It is best to have backup options in place in case a migration away from a cloud provider is necessary, but many cloud providers make that practically impossible • SaaS providers are generally hardest to migrate away from, followed by PaaS, then IaaS 9

Security Benefits of Cloud Services Geographic diversity Many cloud providers run data centers in disparate geographic locations and mirror data across locations, providing protection from natural and other local disasters Platform and infrastructure diversity Different platforms and infrastructures mean different bugs and vulnerabilities, which makes a single attack or error less likely to bring a system down. Using cloud services as part of a larger system can be a good way to diversify your technology stack From Security in Computing, Fifth Edition, by Charles P Pfleeger, et al. (ISBN: 9780134085043) Copyright 2015 by Pearson Education, Inc. All rights reserved
From Security in Computing, Fifth Edition, by Charles P. Pfleeger, et al. (ISBN: 9780134085043). Copyright 2015 by Pearson Education, Inc. All rights reserved. Security Benefits of Cloud Services • Geographic diversity • Many cloud providers run data centers in disparate geographic locations and mirror data across locations, providing protection from natural and other local disasters. • Platform and infrastructure diversity • Different platforms and infrastructures mean different bugs and vulnerabilities, which makes a single attack or error less likely to bring a system down. Using cloud services as part of a larger system can be a good way to diversify your technology stack. 10
按次数下载不扣除下载券;
注册用户24小时内重复下载只扣除一次;
顺序:VIP每日次数-->可用次数-->下载券;
- 河南中医药大学:《信息安全网络与网络安全》课程教学资源(英文讲稿)第12章 新兴问题 Emerging Topics.pdf
- 河南中医药大学:《信息安全网络与网络安全》课程教学资源(英文讲稿)第10章 浏览器 The Web—User Side.pdf
- 河南中医药大学:《信息安全网络与网络安全》课程教学资源(英文讲稿)第09章 隐私 Privacy.pdf
- 河南中医药大学:《信息安全网络与网络安全》课程教学资源(英文讲稿)第08章 密码学精讲 Details of Cryptography.pdf
- 河南中医药大学:《信息安全网络与网络安全》课程教学资源(英文讲稿)第07章 安全管理与事件 Management and Incidents.pdf
- 河南中医药大学:《信息安全网络与网络安全》课程教学资源(英文讲稿)第06章 网络 Networks.pdf
- 河南中医药大学:《信息安全网络与网络安全》课程教学资源(英文讲稿)第03章 程序与编程 Programs and Programming.pdf
- 河南中医药大学:《信息安全网络与网络安全》课程教学资源(英文讲稿)第05章 数据库 Databases.pdf
- 河南中医药大学:《信息安全网络与网络安全》课程教学资源(英文讲稿)第04章 操作系统 Operating Systems.pdf
- 河南中医药大学:《信息安全网络与网络安全》课程教学资源(英文讲稿)第02章 工具箱:鉴别、访问控制与加密 Toolbox:Authentication, Access Control, and Cryptography.pdf
- 河南中医药大学:《信息安全网络与网络安全》课程教学资源(英文讲稿)第01章 概论 Introduction.pdf
- 河南中医药大学:《信息安全网络与网络安全》课程教学资源(实验指导)第三章 网络分析实验——端口扫描与嗅探实验.pptx
- 河南中医药大学:《信息安全网络与网络安全》课程教学资源(实验指导)第三章 网络分析实验——网络监视实验.pptx
- 河南中医药大学:《信息安全网络与网络安全》课程教学资源(实验指导)第三章 网络分析实验——数据包捕获实验.pptx
- 河南中医药大学:《信息安全网络与网络安全》课程教学资源(实验指导)第八讲 主机探测及端口扫描实验.pptx
- 河南中医药大学:《信息安全网络与网络安全》课程教学资源(实验指导)第七讲 WEB漏洞渗透实验.pptx
- 河南中医药大学:《信息安全网络与网络安全》课程教学资源(实验指导)第六讲 入侵检测实验——基于虚拟蜜网的网络攻防实验.pptx
- 河南中医药大学:《信息安全网络与网络安全》课程教学资源(实验指导)第六讲 入侵检测实验.pptx
- 河南中医药大学:《信息安全网络与网络安全》课程教学资源(实验指导)第五讲 防火墙实验.pptx
- 河南中医药大学:《信息安全网络与网络安全》课程教学资源(实验指导)第四讲 协议与内容安全实验.pptx
- 河南中医药大学:《云计算与虚拟化技术 Cloud and virtualization technology》课程教学资源(实验课程教学大纲).pdf
- 河南中医药大学:《云计算与虚拟化技术 Cloud and virtualization technology》课程教学资源(理论课程教学大纲).pdf
- 《云计算与虚拟化技术 Cloud and virtualization technology》参考资料:The Complete VMware vSphere Guide:Design a Virtualized Data Center with VMware vSphere 6.7.pdf
- 《云计算与虚拟化技术 Cloud and virtualization technology》参考资料:4 Reasons to Embrace Multi-Cloud with Network Virtualization.pdf
- 《云计算与虚拟化技术 Cloud and virtualization technology》参考资料:IDC:The Business Value of VMware NSX Advanced Load Balancer.pdf
- 《云计算与虚拟化技术 Cloud and virtualization technology》参考资料:Mastering VMware vSphere 6.7, 2nd Edition.pdf
- 《云计算与虚拟化技术 Cloud and virtualization technology》参考资料:Mastering VMware vSphere 6.7.pdf
- 《云计算与虚拟化技术 Cloud and virtualization technology》教学资源(参考资料)Mastering VMware vSphere 6.pdf
- 《云计算与虚拟化技术 Cloud and virtualization technology》参考资料:Network Virtualization for Dummies.pdf
- 《云计算与虚拟化技术 Cloud and virtualization technology》参考资料:Optimizing Remote Worker Connectivity to Cloud Applications Using SD-WAN Gateways.pdf
- 《云计算与虚拟化技术 Cloud and virtualization technology》参考资料:VMware NSX Data Center.pdf
- 《云计算与虚拟化技术 Cloud and virtualization technology》参考资料:VMware vSphere 功能特性比较.pdf
- 《云计算与虚拟化技术 Cloud and virtualization technology》参考资料:WHAT'S NEW IN VMWARE vSPHERE 6.7.pdf
- 《云计算与虚拟化技术 Cloud and virtualization technology》参考资料:Worldwide Cloud System and Service Management Software Market Shares, 2019:SaaS and ITOM Drive Growth.pdf
- 《云计算与虚拟化技术 Cloud and virtualization technology》参考资料:VMware vRealize Log Insight 4.7 CHS 1.入门-vRealize-Log-Insight-4.7-getting-started-guide.pdf
- 《云计算与虚拟化技术 Cloud and virtualization technology》参考资料:VMware vRealize Log Insight 4.7 CHS 2.管理 vRealize Log Insight-vRealize-Log-Insight-4.7-administration-guide.pdf
- 《云计算与虚拟化技术 Cloud and virtualization technology》参考资料:VMware vRealize Log Insight 4.7 CHS 3.使用 vRealize Log Insight-vRealize-Log-Insight-4.7-users-guide.pdf
- 《云计算与虚拟化技术 Cloud and virtualization technology》参考资料:VMware vRealize Log Insight 4.7 CHS 4.使用 vRealize Log Insight 代理-vRealize-Log-Insight-4.7-agent-administration-guide.pdf
- 《云计算与虚拟化技术 Cloud and virtualization technology》参考资料:VMware vRealize Log Insight 4.7 CHS 5.使用 vRealize Log Insight 导入程序-vRealize-Log-Insight-4.7-importer-guide.pdf
- 《云计算与虚拟化技术 Cloud and virtualization technology》参考资料:VMware vRealize Log Insight 4.7 CHS 6.vRealize Log Insight 开发人员资源-vRealize-Log-Insight-4.7-developers-guide.pdf