760 likes | 888 Views
Cloud Computing:. How Secure is your Information? -Brad Murphy. What is a cloud?. An internet cloud is a large server at a separate point in the world where people store their data. Clouds are servers “A way to share and store information on the internet through servers”.
E N D
Cloud Computing: How Secure is your Information? -Brad Murphy
What is a cloud? • An internet cloud is a large server at a separate point in the world where people store their data. • Clouds are servers • “A way to share and store information on the internet through servers”
Want does a Cloud Look Like? SBS Aurora Picture Credit to: Trishna Sharma, “A Cloud Server Of Microsoft For The Small Guy?”
What’s at Stake when Using a Cloud? • Clouds come with many undesirable risks. • You aren’t the only one who has access to your cloud • “A lack of privacy and Confidentiality” (David Tenecuya, “Internet Cloud security: The Illusion of Inclusion” • Clouds aren’t managed “directly within the company that owns them”
Malware • Many hackers use malware to access people’s clouds • This diagram shows the process malware takes to hack into cloud files: P.G. Dorey, A. Leite, “Cloud Security: A Security Problem or Solution?”
Phishing • A general way that hackers get into people’s files is “Phishing” • Phishing is done by sending out fake emails posing as companies in order to trick the recipient • Some emails are obviously fake, others are very convincing
How to Avoid Phishing • Phishing can easily be avoided by reading the full email • Check the URL at the bottom of the email page • Never give your credit card or SS number on an email. Only give that information on a trusted website • Take the test at my other laptop!
Benefits of Cloud Computing • Companies have grown to an all-time high on terms of productivity • Only takes a fraction of the amount of time that it used did in the past to share information company-wide • Google Drive allows users to collaborate and all work on a paper at once • iCloud enables users to share music and apps with family on the same service
Google Drive’s Collaboration As you can see, there are multiple people working on the same paper simultaneously
How Companies Secure Your Information • The main way companies secure information is known as Encryption. • Encryption is scrambling all the bits of data in a way that makes no sense and only the computer can solve • Computers only solve the encryption puzzle when a password is provided • CAPTCHAs are used as ways to prevent malware from learning passwords to get past encryption
CAPTCHAs • A CAPTCHA is a picture of words that are displayed in a way that a computer cannot solve.
The Future of Clouds • Developers have been constantly working on new ways to improve security • Tokenisation • Homomorphic Encryption • Encryption by spreading data to multiple locations All of these ways have not yet found efficient ways of implementation, but may find a way in the near future.
The Future of Clouds • Clouds have the potential to be alive for a long time • Although the functions of a cloud may change and expand, the over infrastructure of the will more than likely pass the test of time
Are Clouds Safe? • Clouds, although unsafe at first look, are in fact very safe • Main rule when using clouds: Don’t save important information on a cloud (SSN, Credit Card info)
Cloud Computing: How Secure is your Information? -Brad Murphy
What is a cloud? • An internet cloud is a large server at a separate point in the world where people store their data. • Clouds are servers • “A way to share and store information on the internet through servers”
Want does a Cloud Look Like? SBS Aurora Picture Credit to: Trishna Sharma, “A Cloud Server Of Microsoft For The Small Guy?”
What’s at Stake when Using a Cloud? • Clouds come with many undesirable risks. • You aren’t the only one who has access to your cloud • “A lack of privacy and Confidentiality” (David Tenecuya, “Internet Cloud security: The Illusion of Inclusion” • Clouds aren’t managed “directly within the company that owns them”
Malware • Many hackers use malware to access people’s clouds • This diagram shows the process malware takes to hack into cloud files: P.G. Dorey, A. Leite, “Cloud Security: A Security Problem or Solution?”
Phishing • A general way that hackers get into people’s files is “Phishing” • Phishing is done by sending out fake emails posing as companies in order to trick the recipient • Some emails are obviously fake, others are very convincing
How to Avoid Phishing • Phishing can easily be avoided by reading the full email • Check the URL at the bottom of the email page • Never give your credit card or SS number on an email. Only give that information on a trusted website • Take the test at my other laptop!
Benefits of Cloud Computing • Companies have grown to an all-time high on terms of productivity • Only takes a fraction of the amount of time that it used did in the past to share information company-wide • Google Drive allows users to collaborate and all work on a paper at once • iCloud enables users to share music and apps with family on the same service
Google Drive’s Collaboration As you can see, there are multiple people working on the same paper simultaneously
How Companies Secure Your Information • The main way companies secure information is known as Encryption. • Encryption is scrambling all the bits of data in a way that makes no sense and only the computer can solve • Computers only solve the encryption puzzle when a password is provided • CAPTCHAs are used as ways to prevent malware from learning passwords to get past encryption
CAPTCHAs • A CAPTCHA is a picture of words that are displayed in a way that a computer cannot solve.
The Future of Clouds • Developers have been constantly working on new ways to improve security • Tokenisation • Homomorphic Encryption • Encryption by spreading data to multiple locations All of these ways have not yet found efficient ways of implementation, but may find a way in the near future.
The Future of Clouds • Clouds have the potential to be alive for a long time • Although the functions of a cloud may change and expand, the over infrastructure of the will more than likely pass the test of time
Are Clouds Safe? • Clouds, although unsafe at first look, are in fact very safe • Main rule when using clouds: Don’t save important information on a cloud (SSN, Credit Card info)
Cloud Computing: How Secure is your Information? -Brad Murphy
What is a cloud? • An internet cloud is a large server at a separate point in the world where people store their data. • Clouds are servers • “A way to share and store information on the internet through servers”
Want does a Cloud Look Like? SBS Aurora Picture Credit to: Trishna Sharma, “A Cloud Server Of Microsoft For The Small Guy?”
What’s at Stake when Using a Cloud? • Clouds come with many undesirable risks. • You aren’t the only one who has access to your cloud • “A lack of privacy and Confidentiality” (David Tenecuya, “Internet Cloud security: The Illusion of Inclusion” • Clouds aren’t managed “directly within the company that owns them”
Malware • Many hackers use malware to access people’s clouds • This diagram shows the process malware takes to hack into cloud files: P.G. Dorey, A. Leite, “Cloud Security: A Security Problem or Solution?”
Phishing • A general way that hackers get into people’s files is “Phishing” • Phishing is done by sending out fake emails posing as companies in order to trick the recipient • Some emails are obviously fake, others are very convincing
How to Avoid Phishing • Phishing can easily be avoided by reading the full email • Check the URL at the bottom of the email page • Never give your credit card or SS number on an email. Only give that information on a trusted website • Take the test at my other laptop!
Benefits of Cloud Computing • Companies have grown to an all-time high on terms of productivity • Only takes a fraction of the amount of time that it used did in the past to share information company-wide • Google Drive allows users to collaborate and all work on a paper at once • iCloud enables users to share music and apps with family on the same service
Google Drive’s Collaboration As you can see, there are multiple people working on the same paper simultaneously
How Companies Secure Your Information • The main way companies secure information is known as Encryption. • Encryption is scrambling all the bits of data in a way that makes no sense and only the computer can solve • Computers only solve the encryption puzzle when a password is provided • CAPTCHAs are used as ways to prevent malware from learning passwords to get past encryption
CAPTCHAs • A CAPTCHA is a picture of words that are displayed in a way that a computer cannot solve.
The Future of Clouds • Developers have been constantly working on new ways to improve security • Tokenisation • Homomorphic Encryption • Encryption by spreading data to multiple locations All of these ways have not yet found efficient ways of implementation, but may find a way in the near future.
The Future of Clouds • Clouds have the potential to be alive for a long time • Although the functions of a cloud may change and expand, the over infrastructure of the will more than likely pass the test of time
Are Clouds Safe? • Clouds, although unsafe at first look, are in fact very safe • Main rule when using clouds: Don’t save important information on a cloud (SSN, Credit Card info)
Cloud Computing: How Secure is your Information? -Brad Murphy
What is a cloud? • An internet cloud is a large server at a separate point in the world where people store their data. • Clouds are servers • “A way to share and store information on the internet through servers”
Want does a Cloud Look Like? SBS Aurora Picture Credit to: Trishna Sharma, “A Cloud Server Of Microsoft For The Small Guy?”
What’s at Stake when Using a Cloud? • Clouds come with many undesirable risks. • You aren’t the only one who has access to your cloud • “A lack of privacy and Confidentiality” (David Tenecuya, “Internet Cloud security: The Illusion of Inclusion” • Clouds aren’t managed “directly within the company that owns them”
Malware • Many hackers use malware to access people’s clouds • This diagram shows the process malware takes to hack into cloud files: P.G. Dorey, A. Leite, “Cloud Security: A Security Problem or Solution?”