Unit-5
Unit-5
Cloud Security
• “Security in the Cloud is much like security
in your on-premises data centers - only
without the costs of maintaining facilities
and hardware. In the Cloud, you don’t
have to manage physical servers or
storage devices. Instead, you use
software-based security tools to monitor
and protect the flow of information into
and of out of your Cloud resources.”
Encryption
Using an algorithm to transform normal text characters
into an unreadable format, encryption keys scramble data
so that only authorized users can read it. File and
database encryption solutions serve as a final line of
defense for sensitive volumes by obscuring their contents
through encryption or tokenization. Most solutions also
include security key management capabilities.
Data Erasure
More secure than standard data wiping, data erasure uses
software to completely overwrite data on any storage
device. It verifies that the data is unrecoverable.
Data Resiliency
Resiliency is determined by how well a data center
is able to endure or recover any type of failure –
from hardware problems to power shortages and
other disruptive events.
BCA TU Complied By: Er. Nabin Adhikari 48
Data security strategies
Backups
Maintaining usable, thoroughly tested backup copies of
all critical data is a core component of any robust data
security strategy. In addition, all backups should be
subject to the same physical and logical security controls
that govern access to the primary databases and core
systems.
Network and endpoint security monitoring and
controls
Implementing a comprehensive suite of threat
management, detection, and response tools and
platforms across your on-premises environment and
cloud platforms can mitigate risks and reduce the
probability of a breach.