introduction to cloud security
DESCRIPTION
From LSNTAP's webinar of 7 August 2013, "Introduction to Cloud Security." Stay tuned for "Advanced Cloud Security" on August 28th!TRANSCRIPT
![Page 1: Introduction to Cloud Security](https://reader034.vdocuments.site/reader034/viewer/2022052315/5556fdfbd8b42a4a418b4a5b/html5/thumbnails/1.jpg)
The Cloud Beckons, But is it Safe?
![Page 2: Introduction to Cloud Security](https://reader034.vdocuments.site/reader034/viewer/2022052315/5556fdfbd8b42a4a418b4a5b/html5/thumbnails/2.jpg)
What We’ll Cover Today
![Page 3: Introduction to Cloud Security](https://reader034.vdocuments.site/reader034/viewer/2022052315/5556fdfbd8b42a4a418b4a5b/html5/thumbnails/3.jpg)
Introductions
![Page 4: Introduction to Cloud Security](https://reader034.vdocuments.site/reader034/viewer/2022052315/5556fdfbd8b42a4a418b4a5b/html5/thumbnails/4.jpg)
Introductions
![Page 5: Introduction to Cloud Security](https://reader034.vdocuments.site/reader034/viewer/2022052315/5556fdfbd8b42a4a418b4a5b/html5/thumbnails/5.jpg)
What is The Cloud?
![Page 6: Introduction to Cloud Security](https://reader034.vdocuments.site/reader034/viewer/2022052315/5556fdfbd8b42a4a418b4a5b/html5/thumbnails/6.jpg)
LSC Grantees are Using It
![Page 7: Introduction to Cloud Security](https://reader034.vdocuments.site/reader034/viewer/2022052315/5556fdfbd8b42a4a418b4a5b/html5/thumbnails/7.jpg)
The Lure of the Cloud
![Page 8: Introduction to Cloud Security](https://reader034.vdocuments.site/reader034/viewer/2022052315/5556fdfbd8b42a4a418b4a5b/html5/thumbnails/8.jpg)
Why the Concern?
![Page 9: Introduction to Cloud Security](https://reader034.vdocuments.site/reader034/viewer/2022052315/5556fdfbd8b42a4a418b4a5b/html5/thumbnails/9.jpg)
Cloud Security in the News
![Page 10: Introduction to Cloud Security](https://reader034.vdocuments.site/reader034/viewer/2022052315/5556fdfbd8b42a4a418b4a5b/html5/thumbnails/10.jpg)
Technology and Legal Ethics
![Page 11: Introduction to Cloud Security](https://reader034.vdocuments.site/reader034/viewer/2022052315/5556fdfbd8b42a4a418b4a5b/html5/thumbnails/11.jpg)
Under Siege
![Page 12: Introduction to Cloud Security](https://reader034.vdocuments.site/reader034/viewer/2022052315/5556fdfbd8b42a4a418b4a5b/html5/thumbnails/12.jpg)
But We Do Lots of Things on the Internet
![Page 13: Introduction to Cloud Security](https://reader034.vdocuments.site/reader034/viewer/2022052315/5556fdfbd8b42a4a418b4a5b/html5/thumbnails/13.jpg)
How Secure is Your On-Site Data?
![Page 14: Introduction to Cloud Security](https://reader034.vdocuments.site/reader034/viewer/2022052315/5556fdfbd8b42a4a418b4a5b/html5/thumbnails/14.jpg)
Myth
![Page 15: Introduction to Cloud Security](https://reader034.vdocuments.site/reader034/viewer/2022052315/5556fdfbd8b42a4a418b4a5b/html5/thumbnails/15.jpg)
Fact
![Page 16: Introduction to Cloud Security](https://reader034.vdocuments.site/reader034/viewer/2022052315/5556fdfbd8b42a4a418b4a5b/html5/thumbnails/16.jpg)
Myth
![Page 17: Introduction to Cloud Security](https://reader034.vdocuments.site/reader034/viewer/2022052315/5556fdfbd8b42a4a418b4a5b/html5/thumbnails/17.jpg)
A Cloud Data Center
![Page 18: Introduction to Cloud Security](https://reader034.vdocuments.site/reader034/viewer/2022052315/5556fdfbd8b42a4a418b4a5b/html5/thumbnails/18.jpg)
Is This Your Server Closet?
![Page 19: Introduction to Cloud Security](https://reader034.vdocuments.site/reader034/viewer/2022052315/5556fdfbd8b42a4a418b4a5b/html5/thumbnails/19.jpg)
What Does Security Mean?
![Page 20: Introduction to Cloud Security](https://reader034.vdocuments.site/reader034/viewer/2022052315/5556fdfbd8b42a4a418b4a5b/html5/thumbnails/20.jpg)
The Three Pillars of Information Security
![Page 21: Introduction to Cloud Security](https://reader034.vdocuments.site/reader034/viewer/2022052315/5556fdfbd8b42a4a418b4a5b/html5/thumbnails/21.jpg)
Confidentiality
![Page 22: Introduction to Cloud Security](https://reader034.vdocuments.site/reader034/viewer/2022052315/5556fdfbd8b42a4a418b4a5b/html5/thumbnails/22.jpg)
Integrity
![Page 23: Introduction to Cloud Security](https://reader034.vdocuments.site/reader034/viewer/2022052315/5556fdfbd8b42a4a418b4a5b/html5/thumbnails/23.jpg)
Availability
![Page 24: Introduction to Cloud Security](https://reader034.vdocuments.site/reader034/viewer/2022052315/5556fdfbd8b42a4a418b4a5b/html5/thumbnails/24.jpg)
Also: Physical Possession
![Page 25: Introduction to Cloud Security](https://reader034.vdocuments.site/reader034/viewer/2022052315/5556fdfbd8b42a4a418b4a5b/html5/thumbnails/25.jpg)
What Does Security Mean for You?
![Page 26: Introduction to Cloud Security](https://reader034.vdocuments.site/reader034/viewer/2022052315/5556fdfbd8b42a4a418b4a5b/html5/thumbnails/26.jpg)
Rules for Absolute Safety
![Page 27: Introduction to Cloud Security](https://reader034.vdocuments.site/reader034/viewer/2022052315/5556fdfbd8b42a4a418b4a5b/html5/thumbnails/27.jpg)
Know What You’re Protecting
![Page 28: Introduction to Cloud Security](https://reader034.vdocuments.site/reader034/viewer/2022052315/5556fdfbd8b42a4a418b4a5b/html5/thumbnails/28.jpg)
Red Flags
![Page 29: Introduction to Cloud Security](https://reader034.vdocuments.site/reader034/viewer/2022052315/5556fdfbd8b42a4a418b4a5b/html5/thumbnails/29.jpg)
Privilege and Waiver
![Page 30: Introduction to Cloud Security](https://reader034.vdocuments.site/reader034/viewer/2022052315/5556fdfbd8b42a4a418b4a5b/html5/thumbnails/30.jpg)
What’s Your Exposure?
![Page 31: Introduction to Cloud Security](https://reader034.vdocuments.site/reader034/viewer/2022052315/5556fdfbd8b42a4a418b4a5b/html5/thumbnails/31.jpg)
What’s The Impact of an Outage?
![Page 32: Introduction to Cloud Security](https://reader034.vdocuments.site/reader034/viewer/2022052315/5556fdfbd8b42a4a418b4a5b/html5/thumbnails/32.jpg)
Testing Your On-Site Security
![Page 33: Introduction to Cloud Security](https://reader034.vdocuments.site/reader034/viewer/2022052315/5556fdfbd8b42a4a418b4a5b/html5/thumbnails/33.jpg)
A Multi-Level Security Model
![Page 34: Introduction to Cloud Security](https://reader034.vdocuments.site/reader034/viewer/2022052315/5556fdfbd8b42a4a418b4a5b/html5/thumbnails/34.jpg)
Multi-Level Security is the Ideal
![Page 35: Introduction to Cloud Security](https://reader034.vdocuments.site/reader034/viewer/2022052315/5556fdfbd8b42a4a418b4a5b/html5/thumbnails/35.jpg)
Physical Security
![Page 36: Introduction to Cloud Security](https://reader034.vdocuments.site/reader034/viewer/2022052315/5556fdfbd8b42a4a418b4a5b/html5/thumbnails/36.jpg)
Network Security
![Page 37: Introduction to Cloud Security](https://reader034.vdocuments.site/reader034/viewer/2022052315/5556fdfbd8b42a4a418b4a5b/html5/thumbnails/37.jpg)
Transmission Security
![Page 38: Introduction to Cloud Security](https://reader034.vdocuments.site/reader034/viewer/2022052315/5556fdfbd8b42a4a418b4a5b/html5/thumbnails/38.jpg)
Access Controls
![Page 39: Introduction to Cloud Security](https://reader034.vdocuments.site/reader034/viewer/2022052315/5556fdfbd8b42a4a418b4a5b/html5/thumbnails/39.jpg)
Data Protection
![Page 40: Introduction to Cloud Security](https://reader034.vdocuments.site/reader034/viewer/2022052315/5556fdfbd8b42a4a418b4a5b/html5/thumbnails/40.jpg)
What to Look For in a Vendor
![Page 41: Introduction to Cloud Security](https://reader034.vdocuments.site/reader034/viewer/2022052315/5556fdfbd8b42a4a418b4a5b/html5/thumbnails/41.jpg)
Description of Security Mechanisms
![Page 42: Introduction to Cloud Security](https://reader034.vdocuments.site/reader034/viewer/2022052315/5556fdfbd8b42a4a418b4a5b/html5/thumbnails/42.jpg)
Uptime
![Page 43: Introduction to Cloud Security](https://reader034.vdocuments.site/reader034/viewer/2022052315/5556fdfbd8b42a4a418b4a5b/html5/thumbnails/43.jpg)
Terms of Service
![Page 44: Introduction to Cloud Security](https://reader034.vdocuments.site/reader034/viewer/2022052315/5556fdfbd8b42a4a418b4a5b/html5/thumbnails/44.jpg)
Regulatory Compliance: HIPAA
![Page 45: Introduction to Cloud Security](https://reader034.vdocuments.site/reader034/viewer/2022052315/5556fdfbd8b42a4a418b4a5b/html5/thumbnails/45.jpg)
Regulatory Compliance: SAS70 and SSAE16
![Page 46: Introduction to Cloud Security](https://reader034.vdocuments.site/reader034/viewer/2022052315/5556fdfbd8b42a4a418b4a5b/html5/thumbnails/46.jpg)
Regulatory Compliance: PCI DSS Compliance
![Page 47: Introduction to Cloud Security](https://reader034.vdocuments.site/reader034/viewer/2022052315/5556fdfbd8b42a4a418b4a5b/html5/thumbnails/47.jpg)
In Summary
![Page 48: Introduction to Cloud Security](https://reader034.vdocuments.site/reader034/viewer/2022052315/5556fdfbd8b42a4a418b4a5b/html5/thumbnails/48.jpg)
Understand the Value of Your Data
![Page 49: Introduction to Cloud Security](https://reader034.vdocuments.site/reader034/viewer/2022052315/5556fdfbd8b42a4a418b4a5b/html5/thumbnails/49.jpg)
Your Data Is No Safer Than You Make It
![Page 50: Introduction to Cloud Security](https://reader034.vdocuments.site/reader034/viewer/2022052315/5556fdfbd8b42a4a418b4a5b/html5/thumbnails/50.jpg)
But Many Vendors Make Your Data Really Safe
![Page 51: Introduction to Cloud Security](https://reader034.vdocuments.site/reader034/viewer/2022052315/5556fdfbd8b42a4a418b4a5b/html5/thumbnails/51.jpg)
Questions?