Hello, everyone. So today here we're to talk about information security and the control mechanisms. So let's proceed with the information security needs. So the first one that we have to know is privacy. So we know that everybody wants their own personal information safe. And we don't want it to get into wrong hands. So that's the reason privacy's the most important aspect, especially in Cloud. And second is confidentiality, so we want the data to be accessed by only authorised parties. So we don't want to get it scattered across everywhere. So that's the second most important need and third is integrity. We don't want anyone to manipulate, delete, or modify the data. So this is the prime security need which will help us from protecting from hackers. And for this availability, we need to ensure that data is available to all our customers 24/7. So these are the four prime most information security needs. And now let's proceed with the pros and cons. So talking about pros, the information security would provide a centralization of data, so it's more secure, and both the data and the process are more secure. And the cons are if the data is available to all the customers, they might try to manipulate, as I told you, because of hackers there's a risk of hack or intrusion. So these two are the prime most concerns of information security. And now let's talk about, in detail, about what are the different types of issues and what are the different control mechanisms. So first, let's deal with data security. So data security, as I told you before it's all about giving authorization of the protected making of the services. So all the parties have to be really in confidentiality to this. But, in most of the scenarios there are very popular SQL injections and cookies manipulation, especially when it comes to direct security. And in order to control these, we have these three that is Cross Site Request Forgery, and browser enforced authenticity protection, and wavefront multiplexing. Moving ahead, let's deal with one of the few of the control mechanisms for network security. So network security comes into picture where hackers are involved. They generally put some malicious software into the data and screw all the services. So that's the reason we need to have mechanisms like Enhanced EDOS Shield, Transport Layer Security, secure servers like Secure Server Lock it and Security Assertion Markup Language that is SAML. So moving further, let's talk about some control mechanisms for data location. So the service provider needs to have service level agreements, let's say if he wants to provide across publicly, so he needs to have a service level agreement that the government or any of the country's policies and also the legal obligations have to be followed. And data integrity comes into picture where there's manipulation or modification of data. So service provider has to ensure that there are standard methods of data storage, and also proper regulations and standards are maintained across the data, and also access and authentication mechanisms have to be put on. So this concludes our presentation on information security needs and the control mechanisms. Thank you. >> [APPLAUSE]