Technical_Seminar_PPT_Template_2023-24.pptx

1rn20cs109rahulvpati 5 views 10 slides Mar 06, 2025
Slide 1
Slide 1 of 10
Slide 1
1
Slide 2
2
Slide 3
3
Slide 4
4
Slide 5
5
Slide 6
6
Slide 7
7
Slide 8
8
Slide 9
9
Slide 10
10

About This Presentation

H


Slide Content

National Conference /Technical Seminar :Presentation A Study on Cloud Based Intruder Security Systems RNS INSTITUTE OF TECHNOLOGY Department of Computer Science & Engineering Student Name: Rahul V Patil [ 1RN20CS109] Guide Name: Ms. Ancy Thomas Asst. Professor Dept. of CSE, RNSIT 15/04/2024 1

AGENDA Introduction Background Problem Statement Methodology Results. Conclusion. References. 15/04/2024 2

INTRODUCTION S ecurity solutions that are hosted and operated from the cloud . No on premise activity. Detection, access control, data protection and monitoring. Cost effective, Ease of deployment, central management. New threats. Evolution of digital Landscape. 15/04/2024 3

BACKGROUND Types of cloud deployments 1. Public. 2. Private. 3. Hybrid. Recognizing security concerns. Concepts such as Data encryption, compliance study, Threat detection. Study of evolution of cloud computing. Adequate knowledge on attacks. 15/04/2024 4

PROBLEM STATEMENT As organizations increasingly migrate their data, applications, and infrastructure to cloud computing environments to leverage the benefits of scalability, flexibility, and cost-efficiency, they face a growing array of security challenges . We hence need new age solutions to tackle these security concerns that crop up in today’s digital day and age. 15/04/2024 5

METHODOLOGY Problem identification. Requirement analysis and gathering inputs from security teams. Research and evaluation. Solution Design. Implementation of appropriate security measures and models. 15/04/2024 6

OBSERVATIONS Graph showing the growing global trends for cloud security application. 15/04/2024 7

COMMONLY DEPLOYED MODEL

CONCLUSION Study of the market. Study of the current tackling techniques. Study of the model deployed in accordance. Future scope. Scope for improvement 13/12/2023 9

REFERENCES Lei Chen, Ming Xian, Jian Liu, Huimei Wang “Intrusion Detecting System In cloud Comouting Environment” International Conference on Computer Communication and Network Security (CCNS) 2020 [ 2] K Badrinath , Y Navaneeth Krishnan, CHandan N Bhagawat , “Cloud Based Intruder Detection System” 2nd International Conference on Electronics and Communication Systems (ICECS) 2015   [ 3] Yasir Mehmood ; Muhammad Awais Shibli ; Umme Habiba ; Rahat Masood “Intrusion Detection System in Cloud Computing: Challenges and Opportunities” 2nd National Conference on Information Assurance (NCIA) 2013. 13/12/2023 10