600.412.lecture02

600.412.lecture02 - Security and Privacy in Cloud Computing...

Info icon This preview shows pages 1–6. Sign up to view the full content.

View Full Document Right Arrow Icon
Ragib Hasan Johns Hopkins University en.600.412 Spring 2010 Lecture 2 02/01/201 0 Security and Privacy in Cloud Computing
Image of page 1

Info iconThis preview has intentionally blurred sections. Sign up to view the full version.

View Full Document Right Arrow Icon
Threats, vulnerabilities, and enemies 2/1/2010 en.600.412 Spring 2010 Lecture 2 | JHU | Ragib Hasan 2 Goal Learn the cloud computing threat model by examining the assets, vulnerabilities, entry points, and actors in a cloud Technique Apply different threat modeling schemes
Image of page 2
Assignment for next class Review : Thomas Ristenpart et al., Hey, You, Get Off of My Cloud! Exploring Information Leakage in Third-Party Compute Clouds , proc. ACM CCS 2009. Format : Summary : A brief overview of the paper, 1 paragraph (5 / 6 sentences) Pros : 3 or more issues Cons : 3 or more issues Possible improvements : Any possible suggestions to improve the work 2/1/2010 en.600.412 Spring 2010 Lecture 2 | JHU | Ragib Hasan 3
Image of page 3

Info iconThis preview has intentionally blurred sections. Sign up to view the full version.

View Full Document Right Arrow Icon
Threat Model A threat mode l helps in analyzing a security problem, design mitigation strategies, and evaluate solutions Steps: Identify attackers, assets, threats and other components Rank the threats Choose mitigation strategies Build solutions based on the strategies 2/1/2010 en.600.412 Spring 2010 Lecture 2 | JHU | Ragib Hasan 4
Image of page 4
Threat Model Basic components Attacker modeling Choose what attacker to consider Attacker motivation and capabilities
Image of page 5

Info iconThis preview has intentionally blurred sections. Sign up to view the full version.

View Full Document Right Arrow Icon
Image of page 6
This is the end of the preview. Sign up to access the rest of the document.

{[ snackBarMessage ]}

What students are saying

  • Left Quote Icon

    As a current student on this bumpy collegiate pathway, I stumbled upon Course Hero, where I can find study resources for nearly all my courses, get online help from tutors 24/7, and even share my old projects, papers, and lecture notes with other students.

    Student Picture

    Kiran Temple University Fox School of Business ‘17, Course Hero Intern

  • Left Quote Icon

    I cannot even describe how much Course Hero helped me this summer. It’s truly become something I can always rely on and help me. In the end, I was not only able to survive summer classes, but I was able to thrive thanks to Course Hero.

    Student Picture

    Dana University of Pennsylvania ‘17, Course Hero Intern

  • Left Quote Icon

    The ability to access any university’s resources through Course Hero proved invaluable in my case. I was behind on Tulane coursework and actually used UCLA’s materials to help me move forward and get everything together on time.

    Student Picture

    Jill Tulane University ‘16, Course Hero Intern