Firewall:
•A WAF or web application firewall helps protect web application by filtering and monitoring HTTP traffic between a web application.
•Fire wall is crucial component in security perimeter.
•WAF is beneficial for company that provides an e-commerce site, online financial services or any type of web based products.
Cloud computing:
•Delivers computing, storage, even app as service across a network.
Types of Cloud:
1.Public Cloud: available via internet to anyone willing to pay.
2. Private cloud: run by a company for the company own use.
3. Hybrid cloud: includes both public and private cloud.
Cloud Services:
•Software as a service (SaaS): one or more applications available via internet (i.e. Word processor)
•Platform as a Service (PaaS): Software stack ready for application use via internet (i.e. a database servers)
•Infrastructure as a Service (LaaS): servers or storage available over Internet (i.e. storage available for backup use)
•Load balancer spread traffic across multiple applications.
•internet connectivity requires security like fire walls
Visualization:
•Allows operating system to run application within in oses.
•When computer language not complied to navitecode - interpretation.
• Visualization provides VMM
Security:
•Includes protection of information from theft or corruption or the preservation of availablity as defined in security policy.
Types of Security:
•Network Security
•System and software security.
•Physical Security.
Note: Software cannot protect software (may be hardware)
Network can protected better than software.
Types of Security Threats:
1. Program Threats: They attack specific program or carried and distributed in program.
2. System and Network Threat: They attack on operating system or the network itself or leverage those system to launch their attacks.
3. Rootkit: It is malicious software that activated each time your system bootup.
Program Threats:
1.Viruses
2.Buffer overflow.(It occur when more data is written to a block of memory or buffer than the buffer allocation hold .)
3.Logic bomb(This is not designed to cause havoc all time to occur in particular time or date is reached or some other noticeable event)
4.Trap Door.
5.Trojan Horse.(Blocking, modifying, copying, deletion, data modifying, distraction, performance).
Forms of Viruses:
•File.
•Boot.
•Source Code.
•Encrypted.
•Stealth.
Operating System security environment:
•Physically protect of computer running on OS (Pad lock, chain locks, guards , cameras)
•Model:
•Banking building (Operating system)
•Safe(Data base)
•Money(data)
Three components:
1. memory
2. Service
3. Files
Thank You...