600.412.lecture02

600.412.lecture02 - Security and Privacy in Cloud Computing...

Info iconThis preview shows pages 1–6. Sign up to view the full content.

View Full Document Right Arrow Icon
Ragib Hasan Johns Hopkins University en.600.412 Spring 2010 Lecture 2 02/01/2010 Security and Privacy in Cloud Computing
Background image of page 1

Info iconThis preview has intentionally blurred sections. Sign up to view the full version.

View Full Document Right Arrow Icon
Threats, vulnerabilities, and enemies 2/1/2010 en.600.412 Spring 2010 Lecture 2 | JHU | Ragib Hasan 2 Goal Learn the cloud computing threat model by examining the assets, vulnerabilities, entry points, and actors in a cloud Technique Apply different threat modeling schemes
Background image of page 2
Assignment for next class Review : Thomas Ristenpart et al., Hey, You, Get Off of My Cloud! Exploring Information Leakage in Third-Party Compute Clouds , proc. ACM CCS 2009. Format : Summary : A brief overview of the paper, 1 paragraph (5 / 6 sentences) Pros : 3 or more issues Cons : 3 or more issues Possible improvements : Any possible suggestions to improve the work Due : 2.59 pm 2/8/2010 Submission : By email to [email protected] (text only, no attachments please) 2/1/2010 en.600.412 Spring 2010 Lecture 2 | JHU | Ragib Hasan 3
Background image of page 3

Info iconThis preview has intentionally blurred sections. Sign up to view the full version.

View Full Document Right Arrow Icon
Threat Model A threat mode l helps in analyzing a security problem, design mitigation strategies, and evaluate solutions Steps: Identify attackers, assets, threats and other components Rank the threats Choose mitigation strategies Build solutions based on the strategies 2/1/2010 en.600.412 Spring 2010 Lecture 2 | JHU | Ragib Hasan 4
Background image of page 4
Basic components
Background image of page 5

Info iconThis preview has intentionally blurred sections. Sign up to view the full version.

View Full Document Right Arrow Icon
Image of page 6
This is the end of the preview. Sign up to access the rest of the document.

{[ snackBarMessage ]}

Page1 / 24

600.412.lecture02 - Security and Privacy in Cloud Computing...

This preview shows document pages 1 - 6. Sign up to view the full document.

View Full Document Right Arrow Icon
Ask a homework question - tutors are online