• Log In
  • Skip to primary navigation
  • Skip to main content
  • Skip to primary sidebar
  • Skip to footer
  • Home
  • Learn about MIS
    • Why MIS?
    • What is MIS?
    • Select a program
    • Scholarships
  • Programs
    • Overview
    • Bachelors in MIS
      • STEM Scholarships
    • Minor in MIS
      • Major or Minor?
      • MIS Minor
        • MIS Minor Declaration form
      • Digital Marketing Minor
      • Information Technology Innovation and Entrepreneurship Minor
      • Business Analytics Minor
    • Certificate in MIS
    • MS in IT Auditing & Cyber-Security
    • PhD in MIS
  • Current Students
    • IT Career Fair
    • Awards and scholarships
      • Annual MIS awards
      • Scholarships
      • Information Technology Awards
    • Professional achievement
      • Professional Achievement Program
      • Leaders
      • Earn points
      • Store
    • IBIT mentoring program
    • Independent study
    • Gradebook
    • Temple AIS
  • Alumni
    • Get involved with MIS
    • Register as an alum
    • Donate
  • Technology
    • Overview
    • About this site
      • Course Sites
        • Course Template
      • Doctoral and Master’s Student Sites
      • Faculty and Staff Sites
      • Account and site policy
    • MIS Project Server
  • Research
    • MIS Research
    • Seminars
  • About
    • About MIS
    • Faculty
    • Staff
    • Doctoral students
    • Student e-portfolios
    • Information Technology Advisory Board
    • Contact us and directions

Temple MIS

Connect and innovate with an elite information systems program

Fox School of Business
  • PRO!
  • Leaders
  • Members
  • Groups
  • Store
  • Earn Points
  • Newsletter

Cyber Security Tools & Techniques

December 3, 2020

Projects

Cloud Computing Security 

Overview

In order to understand cloud security, first we have to understand the services under cloud computing such as: hosted services, softwares, hardwares and storage all over the Internet. 

As we also learned in the class, rapid deployment, low-cost, flexibility, stability are the reasons why organizations have shifted to cloud computing. 

The \’Check Point’ describes cloud computing requirements including “policies, controls, services and that protect cloud data, applications and infrastructure from threats.”

Who’s responsible of cloud security?

Personally, when I think about cloud security two parties seem responsible to me which is cloud provider and customer/user of cloud services. Again, we discussed about different type of cloud services that can be performed by provider and every single of them might have different policies or controls against cyber threats. 

However, most of the time security responsibilities that provider has includes protecting the infrastructure provided to the customer when user has to manage user access and privileges within organizations. The personal access is crucial to cloud services and they should be assigned well by cloud specialist. During the class, we talked about how cloud services has the advantage over physical datacenter because you don’t need to take the risk of anyone within company to walk into your data center but risk is still out there even everything performs online. Therefore, the access and users should be designed securely to cloud services. 

The ‘Check Point’ website talks about ‘7 advanced cloud security challenges’ such as :

-Increased Attacked Surface

-Lack of visibility and tracking

-ever-changing workloads

-devops, devsecops, and automation

-granular privilege and key management

-complex environments

-cloud compliance and governance

The ‘Check Point’ website also talks about ‘6 Pillars of robot cloud security:

-Granular, policy-based IAM and authentication controls across complex infrastructures

-Zero-trust cloud network security controls across logically isolated networks and micro-segments

-Enforcement of virtual server protection policies and processes such as change management and software updates:

-Safeguarding all applications (and especially cloud-native distributed apps) with a next-generation web application firewall

-Enhanced data protection

-Threat intelligence that detects and remediates known and unknown threats in real-time

What is exactly security of cloud?

Accordingly ‘Force Point’, “cloud security consists of a set of policies, controls, producers and technologies that work together to protect cloud-based systems, data and infrastructure”. In addition to protecting cloud data, decisions applied should meet compliance regulations and protect user’s privacy. Main goal is to prevent unauthorized access and to keep data and applications in the cloud securely. Force Point recommends authenticating access and filtering traffic to fight against security threats. Again, security is crucial for cloud systems because they became so popular and include important data. Therefore, cloud system should be protected against both external and internal cybersecurity threats. 

Segmentation of cloud security

McAfee’s online platform addresses different aspects of cloud security such as:

-SaaS-Software as a Service: customers are responsible for securing their data and user access

-PaaS – Platform as a service: Customers are responsible for securing their data, user access, and applications. 

-IaaS – Infrastructure as service: Customers are responsible for securing their data, user access, applications, operating systems and virtual network traffic. 

Cloud Security Challenges

McAffe lists some challenges for security:

Most of the time, cloud services receive access from outside of the corporate network or from devices not managed by IT. Which causes the need of monitoring cloud access by IT team. 

When organizations work with third-party cloud provider, they became less active on their data and controlling their premises. 

Cloud Security Solutions 

McAfee talks about some solutions such as:

1-API connection that lets IT team to view what stored in the cloud, who used it, when it used..

2- After you gain visibility with API,  you should define data classification, loss prevention, collaboration control, and encryption on cloud data. 

3. User access control can be authorized by CASB-Cloud Access Security Broker- to enforce access controls. 

4. File-scanning, application whitelisting, machine learning detection and network traffic analysis can be solution against malware that attack your cloud. 

5. Compliance requirement and practices should be argument with risk assessment and compliance assessments. HIPAA, PCI and Sarbanes-Oxley becomes more important when you engage your data within cloud services. 

AWS Cloud Security 

I also wanted to look into AWS’s approach to this poular topic cloud security since we just worked with AWS cloud systems during this semester. They have solid understanding against cyber threats and reliable reputation for security. AWS provides control and confidence to the user to run their business cloud with flexible and secure environment. Some specific functions that AWS Cloud offers to customers:

-Secure scaling with superior visibility and control where you can control the data stored and who can access it. You can manage any records that information consumes any moment. Continuous monitoring and real-time security information also helps you to secure your cloud. 

  • Automation and reduction risk with deeply integration. As an owner of the cloud system, you gain automation feature for your tasks on AWS by reducing human configuration errors. 

AWS also has 4 pillars on their security policy such as: prevent, detect, respond and remediate. 

What’s different about cloud security?

Red Hat platform believes that many people understand the benefit and advantages of cloud but they are equally deterred by the security threats. First gap between physical data center and cloud service security is the traditional environment. Cloud environments are highly connected and making easier for traffic to bypass traditional perimeter. Therefore, APIs should be fully secured and identity management should be strong. 

 

References

https://www.checkpoint.com/cyber-hub/cloud-security/what-is-cloud-security/

https://www.forcepoint.com/cyber-edu/cloud-security

https://aws.amazon.com/security/

https://www.mcafee.com/enterprise/en-us/security-awareness/cloud.html

 

Primary Sidebar

COMMUNITY ACTIVITY

Profile Photo
Shane Ferrell
received 25 points for Master Your Schedule
Profile Photo
Ying Zhang
profile was updated
Profile Photo
Marissa Redline
received 50 points for MIS related work experience working for Temple University
Profile Photo
Ying Zhang
received 400 points for full-time MIS internship
Profile Photo
Ying Zhang
just received the Candidate badge
Profile Photo
Sean Simms
received 400 points for full-time MIS internship
Profile Photo
Sean Simms
just received the Apprentice badge
Profile Photo
Marissa Redline
received 100 points for part-time MIS internship
Profile Photo
Jingwen Lin
received 50 points for student worker
Profile Photo Profile Photo Profile Photo
Marissa, Ian, Baggio
received 25 points for Interesting Facts Page
Profile Photo
Baggio Bose
wrote a new post, Interesting Facts, on the site Baggio Bose
Profile Photo
Sean Simms
profile was updated
Profile Photo
Ian Marron
wrote a new post, Interesting Facts about Me, on the site Ian Marron
Profile Photo
Nik Fuchs
profile was updated
1 2 3 … 17 »

COURSES – FALL 2022

Footer

MANAGEMENT INFORMATION SYSTEMS

Fox School of Business
Temple University
210 Speakman Hall
1810 N. 13th Street
Philadelphia, PA 19122

ABOUT MIS

  • About
  • Why MIS?
  • Programs
  • Faculty
  • Staff
  • Give to MIS

MIS COMMUNITY

  • Members
  • Recent Activity
  • Sites
  • Groups

CURRENT STUDENTS

  • PRO
  • PRO Points
  • Leaders
  • Gradebook

CONNECT

RSSTwitterFacebookLinkedinFlickr

Copyright © 2022 Department of Management Information Systems · Fox School of Business · Temple University