5 Cloud Computing
v Cloud Computing: -
Ø Cloud computing is a technology that
allows us to access and use computing resources, like servers, storage,
databases, networking, software, and analytics over the Internet (the “cloud”)
instead of relying on local computer or on-premises servers.
Ø Essentially, it provides on-demand
access to computing power and services without the need to own and maintain
physical infrastructure.
Key Features of Cloud Computing: -
1.
On-demand self-service – Users can provision computing resources as needed without human
intervention from the service provider.
2.
Broad network access – Services are available over the Internet and can be accessed from
devices like laptops, smartphones, or tablets.
3.
Resource pooling – Providers serve multiple customers using shared resources while
keeping data isolated.
4.
Rapid elasticity – Resources can be scaled up or down quickly according to demand.
5.
Measured service – Users pay only for the resources they consume, like electricity
billing.
Types of Cloud Services (Service Models):
-
1.
IaaS (Infrastructure as a Service): Provides virtualized computing resources (servers,
storage, networks).
o
Example: Amazon EC2, Microsoft Azure Virtual Machines.
2.
PaaS (Platform as a Service): Provides a platform to develop, test, and deploy applications without
managing underlying infrastructure.
o
Example: Google App Engine, Heroku.
3.
SaaS (Software as a Service): Provides access to software applications over the Internet.
o
Example: Gmail, Microsoft Office 365, Zoom.
Types of Cloud Deployment models:
1.
Public Cloud: Services are delivered over the public Internet and shared among
multiple organizations.
2.
Private Cloud: Cloud infrastructure is dedicated to a single organization.
3.
Hybrid Cloud: Combines public and private clouds, allowing data and applications to
move between them.
v
Cyber
security Essentials: Types of threats: -
Cyber Security Essentials: Types of
Threats
1.
Malware: -
·
Malware, short for malicious software, is designed to damage, disrupt,
or gain unauthorized access to a computer system.
·
Common types of malwares include viruses, worms, trojans, ransomware,
and spyware.
·
Example: A virus can attach itself to a file and spread when the file is
shared.
2.
Phishing: -
·
Phishing is a technique where attackers trick users into revealing
sensitive information such as passwords, credit card numbers, or personal
details.
·
It usually occurs through fake emails, messages, or websites that look
legitimate.
·
Example: Receiving an email claiming to be from your bank asking you to
“verify” your account details.
3.
DoS Attacks (Denial of Service):
·
A DoS attack aims to make a computer, server, or network resource
unavailable to its users by overwhelming it with traffic.
·
It can disrupt normal business operations and cause financial loss.
·
Example: Sending a flood of requests to a website so it becomes slow or
crashes.
v Protective Measures: - Protective Measures in Cybersecurity are:
1.
Strong Passwords: -
·
A strong password helps protect accounts from unauthorized access.
·
It should include a combination of uppercase and lowercase letters,
numbers, and special characters.
·
Example: Instead of “password123”, use “P@ssw0rd!45”.
2.
Multi-Factor Authentication (MFA): -
·
MFA adds an extra layer of security by requiring two or more
verification methods to access an account.
·
These methods can include a password, a code sent to a mobile device, or
a biometric scan.
·
Example: Logging into your email with a password plus a one-time code
sent to your phone.
3.
Antivirus Software: -
·
Antivirus programs detect, block, and remove malware from computers and
devices.
·
They provide real-time protection against viruses, worms, trojans, and
spyware.
·
Example: Windows Defender or Avast scanning your system regularly to
prevent infections.
4.
Firewalls: -
·
A firewall monitors and controls incoming and outgoing network traffic
based on security rules.
·
It acts as a barrier between a trusted internal network and untrusted
external networks.
·
Example: A network firewall blocking suspicious traffic from the
Internet to protect sensitive company data.
v
Data Backup
and Recovery: -
1.
Data Backup:
·
Data backup is the process of creating copies of important files and
storing them separately to prevent loss.
·
Backups can be done on external drives, cloud storage, or
network-attached storage (NAS).
·
Example: Saving your work documents to Google Drive or an external hard
disk regularly.
2.
Data Recovery:
·
Data recovery is the process of restoring lost, corrupted, or
accidentally deleted data from backups or recovery tools.
·
It ensures business continuity and minimizes data loss in case of system
failures, malware attacks, or human error.
·
Example: Using backup files to restore a corrupted spreadsheet after a
system crash.
v
Safe
Browsing Practices: -
1.
Use Secure Websites: -
·
Only visit websites that use HTTPS, which encrypts data between your
browser and the website.
·
Example: Logging into online banking through “https://” ensures secure
data transmission.
2.
Avoid Clicking Suspicious Links: -
·
Do not click on unknown or suspicious links in emails, messages, or ads,
as they may lead to phishing or malware.
3.
Keep Software Updated: -
·
Regularly update your browser and security software to protect against
the latest threats.
4.
Use Strong Passwords and MFA: -
·
Use strong, unique passwords for different websites and enable
multi-factor authentication for added protection.
5.
Clear Cookies and Cache Regularly:
·
This helps protect your privacy and reduces the risk of tracking by
malicious sites.
v Introduction to Cyber Laws & Data Privacy
Regulations: -
1)
Cyber Laws: -
·
Cyber laws are legal frameworks designed to regulate activities in
cyberspace and protect users from cybercrimes.
·
They cover issues like hacking, data theft, online fraud, intellectual
property, and digital contracts.
·
Example: Unauthorized access to someone’s computer or spreading malware
is punishable under cyber laws.
2)
Data Privacy Regulations: -
·
Data privacy regulations are rules that govern how personal information
is collected, stored, processed, and shared by organizations.
·
They aim to protect individuals’ personal data and ensure transparency
and accountability.
3)
GDPR (General Data Protection Regulation): -
·
GDPR is a European Union regulation that protects the personal data and
privacy of EU citizens.
·
Organizations must obtain consent before collecting personal data and
provide rights like data access, correction, and deletion.
·
Example: A company cannot use your email for marketing without your
permission under GDPR.
4)
India’s DPDPA (Digital Personal Data Protection Act):
·
DPDPA is India’s legislation that regulates the processing of personal
data and ensures protection of digital privacy.
·
It requires organizations to implement security safeguards, seek consent
for data collection, and notify individuals in case of data breaches.
·
Example: An Indian e-commerce website must get your consent before
storing or sharing your purchase history.