Download as doc, pdf, or txt
Download as doc, pdf, or txt
You are on page 1of 9

SECURITY THREATS/ATTACKS PRESENT IN

CLOUD ENVIRONMENT
A Technical Seminar Report
Submitted by
B.ASHWINI

117Y1A0567

Submitted in partial fulfillment for the award of the degree


BACHELOR OF TECHNOLOGY
IN
COMPUTER SCIENCE & ENGINEERING

MARRI LAXMAN REDDY


Institute of Technology & Management

(Approved by AICTE, New Delhi & Affiliated JNTU, Hyderabad)


Dundigal, Quthbullapur (M), Hyderabad-500043.
APRIL 2015

MARRI LAXMAN REDDY


Institute of Technology & Management

(Approved by AICTE, New Delhi & Affiliated JNTU, Hyderabad)


Dundigal, Quthbullapur (M), Hyderabad-500043.

DEPARTMENT OF COMPUTER SCIENCE & ENGINEERING

CERTIFICATE
Certified that this is a bonafide record of the Seminar Entitled
SECURITY

THREATS/ATTACKS

ENVIRONMENT

PRESENT

IN

CLOUD

Done by B.ASHWINI (117Y1A0567). Of the

B.TECH IV year IV semester, COMPUTER SCIENCE AND ENGINNERING in


the Year 2014-2015 in partial fulfillment of the requirements to the
award of Degree Of Bachelor of Technology in COMPUTER SCIENCE

&

ENGINEERING

UNIVERSITY.

of

JAWAHARLAL

NEHRU

TECHNOLOGICAL

COORDINATOR

HEAD OF

DEPARTMENT

ACKNOWLEDGEMENT

YOUR NAME
HTNO

ABSTRACT

CONTENTS

CHAPTER 1

INTRODUCTION

CHAPTER 2

2.1 ARCHITECTURE,
2.2 APPLICATIONS)
2.3 LIMITATIONS, ETC.

(NOTE: Depending on the technical seminar topic , the


subtopics of this second chapter may increase. The subtopic
names(that is 2.1,2.1,2.3, etc. may change depending on your
technical seminar topic).The subtopics 2.1, 2.2, 2.3 are given as
examples , you may have extra subtopics. This second chapter
should cover all the technical details of your technical seminar.)

3.CONCLUSION

REFERENCES

You might also like