Professional Documents
Culture Documents
Contents
1. Introduction to Cloud
Computing
2. Deployment models of
Cloud: Public versus Private
Clouds
3. Services offered by Cloud
4. Risk Related to Cloud
Computing
5. Virtualization in Cloud
Computing
3
Cloud Computing & Distributed Systems
UNIT 1
INTRODUCTION TO CLOUD COMPUTING AND DISTRIBUTED SYSTEMS
CHAPTER 2
CLOUD COMPUTING
4
Risk Related to Cloud Computing (CO-2)
1. Data Breaches: The risk of unauthorized access and data breaches is a significant concern. Organizations must ensure robust security measures, including encryption, access
controls, and regular security audits.
2. Identity and Access Management (IAM): Poorly configured IAM settings can lead to unauthorized access. Strong authentication and access controls are crucial.
3. Data Deletion: Accidental or malicious data deletion can occur. Regular data backups and implementing proper data recovery mechanisms are essential to mitigate this risk.
4. Data Jurisdiction: Different countries have varying data protection and privacy laws. Organizations must be aware of the legal implications and ensure compliance with
relevant regulations.
5. Data Ownership: Clarifying data ownership and contractual terms is crucial to avoid legal disputes.
6. Dependency on Service Providers: Organizations relying heavily on cloud services may face disruptions in case of service provider outages. Implementing a multi-cloud or
hybrid cloud strategy can provide redundancy.
7. Internet Connectivity: Reliance on internet connectivity for accessing cloud services introduces the risk of downtime due to network issues.
8. Dependency on a Single Provider: Overreliance on a single cloud service provider may result in challenges when transitioning to another provider or bringing services back
in-house. Implementing a multi-cloud strategy can mitigate this risk.
9. Limited Control Over Infrastructure: With cloud services, organizations may have limited control over the underlying infrastructure. This lack of control can be a concern for
some organizations, especially those with specific compliance requirements.
10. Data Encryption: While data in transit and at rest is often encrypted, organizations must ensure that encryption practices align with security standards and best practices.
Data Residency: Knowing where data is physically stored is crucial for compliance and data protection. Some cloud providers offer options for selecting data residency
locations.
11. Malicious Insider Actions: Insiders with access to cloud resources may pose a threat. Implementing strict access controls, monitoring user activities, and conducting
regular audits can help detect and prevent insider threats.
12. Customization Constraints: Some cloud services may have limitations on customization, making it challenging for organizations with unique requirements. Careful
evaluation of service offerings is necessary.
13. Unpredictable Costs: Cloud costs can be unpredictable, especially if usage patterns change. Organizations need to implement effective cost management strategies, such
as monitoring usage and optimizing resource allocation.
5
6
7
8
9
10
11
12
13
Summary
14
QUIZ
1. What is Cloud Computing?
a) Cloud Computing means providing services like storage, servers, database, networking, etc
b) Cloud Computing means storing data in a database
c) Cloud Computing is a tool used to create an application
d) None of the mentioned