+ All Categories
Home > Documents > Cloud Computing:

Cloud Computing:

Date post: 24-Feb-2016
Category:
Upload: truly
View: 33 times
Download: 0 times
Share this document with a friend
Description:
Cloud Computing:. How Secure is your Information? -Brad Murphy. What is a cloud?. An internet cloud is a large server at a separate point in the world where people store their data. Clouds are servers “A way to share and store information on the internet through servers”. - PowerPoint PPT Presentation
Popular Tags:
75
How Secure is your Information? -Brad Murphy Cloud Computing:
Transcript
Page 1: Cloud Computing:

How Secure is your Information?

-Brad Murphy

Cloud Computing:

Page 2: Cloud Computing:

• An internet cloud is a large server at a separate point in the world where people store their data.

• Clouds are servers

• “A way to share and store information on the internet through servers”

What is a cloud?

Page 3: Cloud Computing:

Want does a Cloud Look Like?

SBS Aurora Picture Credit to: Trishna Sharma, “A Cloud Server

Of Microsoft For The Small Guy?”

Page 4: Cloud Computing:

• Clouds come with many undesirable risks.

• You aren’t the only one who has access to your cloud

• “A lack of privacy and Confidentiality” (David Tenecuya, “Internet Cloud security: The Illusion of Inclusion”

• Clouds aren’t managed “directly within the company that owns them”

What’s at Stake when Using a Cloud?

Page 5: Cloud Computing:

• Many hackers use malware to access people’s clouds

• This diagram shows the process malware takes to hack into cloud files:

Malware

P.G. Dorey, A. Leite, “Cloud Security: A Security Problem or Solution?”

Page 6: Cloud Computing:

• A general way that hackers get into people’s files is “Phishing”

• Phishing is done by sending out fake emails posing as companies in order to trick the recipient

• Some emails are obviously fake, others are very convincing

Phishing

Page 7: Cloud Computing:

Example of Phishing

Page 8: Cloud Computing:

• Phishing can easily be avoided by reading the full email

• Check the URL at the bottom of the email page

• Never give your credit card or SS number on an email. Only give that information on a trusted website

• Take the test at my other laptop!

How to Avoid Phishing

Page 9: Cloud Computing:

• Companies have grown to an all-time high on terms of productivity

• Only takes a fraction of the amount of time that it used did in the past to share information company-wide

• Google Drive allows users to collaborate and all work on a paper at once

• iCloud enables users to share music and apps with family on the same service

Benefits of Cloud Computing

Page 10: Cloud Computing:

Google Drive’s CollaborationAs you can see, there are multiple people working on the same

paper simultaneously

Page 11: Cloud Computing:

• The main way companies secure information is known as Encryption.

• Encryption is scrambling all the bits of data in a way that makes no sense and only the computer can solve

• Computers only solve the encryption puzzle when a password is provided

• CAPTCHAs are used as ways to prevent malware from learning passwords to get past encryption

How Companies Secure Your Information

Page 12: Cloud Computing:

• A CAPTCHA is a picture of words that are displayed in a way that a computer cannot solve.

CAPTCHAs

Page 13: Cloud Computing:

• Developers have been constantly working on new ways to improve security• Tokenisation• Homomorphic Encryption• Encryption by spreading data to multiple locations

The Future of Clouds

• All of these ways have not yet found efficient ways of implementation, but may find a way in the near future.

Page 14: Cloud Computing:

• Clouds have the potential to be alive for a long time

• Although the functions of a cloud may change and expand, the over infrastructure of the will more than likely pass the test of time

The Future of Clouds

Page 15: Cloud Computing:

• Clouds, although unsafe at first look, are in fact very safe

• Main rule when using clouds: Don’t save important information on a cloud (SSN, Credit Card info)

Are Clouds Safe?

Page 16: Cloud Computing:

How Secure is your Information?

-Brad Murphy

Cloud Computing:

Page 17: Cloud Computing:

• An internet cloud is a large server at a separate point in the world where people store their data.

• Clouds are servers

• “A way to share and store information on the internet through servers”

What is a cloud?

Page 18: Cloud Computing:

Want does a Cloud Look Like?

SBS Aurora Picture Credit to: Trishna Sharma, “A Cloud Server

Of Microsoft For The Small Guy?”

Page 19: Cloud Computing:

• Clouds come with many undesirable risks.

• You aren’t the only one who has access to your cloud

• “A lack of privacy and Confidentiality” (David Tenecuya, “Internet Cloud security: The Illusion of Inclusion”

• Clouds aren’t managed “directly within the company that owns them”

What’s at Stake when Using a Cloud?

Page 20: Cloud Computing:

• Many hackers use malware to access people’s clouds

• This diagram shows the process malware takes to hack into cloud files:

Malware

P.G. Dorey, A. Leite, “Cloud Security: A Security Problem or Solution?”

Page 21: Cloud Computing:

• A general way that hackers get into people’s files is “Phishing”

• Phishing is done by sending out fake emails posing as companies in order to trick the recipient

• Some emails are obviously fake, others are very convincing

Phishing

Page 22: Cloud Computing:

Example of Phishing

Page 23: Cloud Computing:

• Phishing can easily be avoided by reading the full email

• Check the URL at the bottom of the email page

• Never give your credit card or SS number on an email. Only give that information on a trusted website

• Take the test at my other laptop!

How to Avoid Phishing

Page 24: Cloud Computing:

• Companies have grown to an all-time high on terms of productivity

• Only takes a fraction of the amount of time that it used did in the past to share information company-wide

• Google Drive allows users to collaborate and all work on a paper at once

• iCloud enables users to share music and apps with family on the same service

Benefits of Cloud Computing

Page 25: Cloud Computing:

Google Drive’s CollaborationAs you can see, there are multiple people working on the same

paper simultaneously

Page 26: Cloud Computing:

• The main way companies secure information is known as Encryption.

• Encryption is scrambling all the bits of data in a way that makes no sense and only the computer can solve

• Computers only solve the encryption puzzle when a password is provided

• CAPTCHAs are used as ways to prevent malware from learning passwords to get past encryption

How Companies Secure Your Information

Page 27: Cloud Computing:

• A CAPTCHA is a picture of words that are displayed in a way that a computer cannot solve.

CAPTCHAs

Page 28: Cloud Computing:

• Developers have been constantly working on new ways to improve security• Tokenisation• Homomorphic Encryption• Encryption by spreading data to multiple locations

The Future of Clouds

• All of these ways have not yet found efficient ways of implementation, but may find a way in the near future.

Page 29: Cloud Computing:

• Clouds have the potential to be alive for a long time

• Although the functions of a cloud may change and expand, the over infrastructure of the will more than likely pass the test of time

The Future of Clouds

Page 30: Cloud Computing:

• Clouds, although unsafe at first look, are in fact very safe

• Main rule when using clouds: Don’t save important information on a cloud (SSN, Credit Card info)

Are Clouds Safe?

Page 31: Cloud Computing:

How Secure is your Information?

-Brad Murphy

Cloud Computing:

Page 32: Cloud Computing:

• An internet cloud is a large server at a separate point in the world where people store their data.

• Clouds are servers

• “A way to share and store information on the internet through servers”

What is a cloud?

Page 33: Cloud Computing:

Want does a Cloud Look Like?

SBS Aurora Picture Credit to: Trishna Sharma, “A Cloud Server

Of Microsoft For The Small Guy?”

Page 34: Cloud Computing:

• Clouds come with many undesirable risks.

• You aren’t the only one who has access to your cloud

• “A lack of privacy and Confidentiality” (David Tenecuya, “Internet Cloud security: The Illusion of Inclusion”

• Clouds aren’t managed “directly within the company that owns them”

What’s at Stake when Using a Cloud?

Page 35: Cloud Computing:

• Many hackers use malware to access people’s clouds

• This diagram shows the process malware takes to hack into cloud files:

Malware

P.G. Dorey, A. Leite, “Cloud Security: A Security Problem or Solution?”

Page 36: Cloud Computing:

• A general way that hackers get into people’s files is “Phishing”

• Phishing is done by sending out fake emails posing as companies in order to trick the recipient

• Some emails are obviously fake, others are very convincing

Phishing

Page 37: Cloud Computing:

Example of Phishing

Page 38: Cloud Computing:

• Phishing can easily be avoided by reading the full email

• Check the URL at the bottom of the email page

• Never give your credit card or SS number on an email. Only give that information on a trusted website

• Take the test at my other laptop!

How to Avoid Phishing

Page 39: Cloud Computing:

• Companies have grown to an all-time high on terms of productivity

• Only takes a fraction of the amount of time that it used did in the past to share information company-wide

• Google Drive allows users to collaborate and all work on a paper at once

• iCloud enables users to share music and apps with family on the same service

Benefits of Cloud Computing

Page 40: Cloud Computing:

Google Drive’s CollaborationAs you can see, there are multiple people working on the same

paper simultaneously

Page 41: Cloud Computing:

• The main way companies secure information is known as Encryption.

• Encryption is scrambling all the bits of data in a way that makes no sense and only the computer can solve

• Computers only solve the encryption puzzle when a password is provided

• CAPTCHAs are used as ways to prevent malware from learning passwords to get past encryption

How Companies Secure Your Information

Page 42: Cloud Computing:

• A CAPTCHA is a picture of words that are displayed in a way that a computer cannot solve.

CAPTCHAs

Page 43: Cloud Computing:

• Developers have been constantly working on new ways to improve security• Tokenisation• Homomorphic Encryption• Encryption by spreading data to multiple locations

The Future of Clouds

• All of these ways have not yet found efficient ways of implementation, but may find a way in the near future.

Page 44: Cloud Computing:

• Clouds have the potential to be alive for a long time

• Although the functions of a cloud may change and expand, the over infrastructure of the will more than likely pass the test of time

The Future of Clouds

Page 45: Cloud Computing:

• Clouds, although unsafe at first look, are in fact very safe

• Main rule when using clouds: Don’t save important information on a cloud (SSN, Credit Card info)

Are Clouds Safe?

Page 46: Cloud Computing:

How Secure is your Information?

-Brad Murphy

Cloud Computing:

Page 47: Cloud Computing:

• An internet cloud is a large server at a separate point in the world where people store their data.

• Clouds are servers

• “A way to share and store information on the internet through servers”

What is a cloud?

Page 48: Cloud Computing:

Want does a Cloud Look Like?

SBS Aurora Picture Credit to: Trishna Sharma, “A Cloud Server

Of Microsoft For The Small Guy?”

Page 49: Cloud Computing:

• Clouds come with many undesirable risks.

• You aren’t the only one who has access to your cloud

• “A lack of privacy and Confidentiality” (David Tenecuya, “Internet Cloud security: The Illusion of Inclusion”

• Clouds aren’t managed “directly within the company that owns them”

What’s at Stake when Using a Cloud?

Page 50: Cloud Computing:

• Many hackers use malware to access people’s clouds

• This diagram shows the process malware takes to hack into cloud files:

Malware

P.G. Dorey, A. Leite, “Cloud Security: A Security Problem or Solution?”

Page 51: Cloud Computing:

• A general way that hackers get into people’s files is “Phishing”

• Phishing is done by sending out fake emails posing as companies in order to trick the recipient

• Some emails are obviously fake, others are very convincing

Phishing

Page 52: Cloud Computing:

Example of Phishing

Page 53: Cloud Computing:

• Phishing can easily be avoided by reading the full email

• Check the URL at the bottom of the email page

• Never give your credit card or SS number on an email. Only give that information on a trusted website

• Take the test at my other laptop!

How to Avoid Phishing

Page 54: Cloud Computing:

• Companies have grown to an all-time high on terms of productivity

• Only takes a fraction of the amount of time that it used did in the past to share information company-wide

• Google Drive allows users to collaborate and all work on a paper at once

• iCloud enables users to share music and apps with family on the same service

Benefits of Cloud Computing

Page 55: Cloud Computing:

Google Drive’s CollaborationAs you can see, there are multiple people working on the same

paper simultaneously

Page 56: Cloud Computing:

• The main way companies secure information is known as Encryption.

• Encryption is scrambling all the bits of data in a way that makes no sense and only the computer can solve

• Computers only solve the encryption puzzle when a password is provided

• CAPTCHAs are used as ways to prevent malware from learning passwords to get past encryption

How Companies Secure Your Information

Page 57: Cloud Computing:

• A CAPTCHA is a picture of words that are displayed in a way that a computer cannot solve.

CAPTCHAs

Page 58: Cloud Computing:

• Developers have been constantly working on new ways to improve security• Tokenisation• Homomorphic Encryption• Encryption by spreading data to multiple locations

The Future of Clouds

• All of these ways have not yet found efficient ways of implementation, but may find a way in the near future.

Page 59: Cloud Computing:

• Clouds have the potential to be alive for a long time

• Although the functions of a cloud may change and expand, the over infrastructure of the will more than likely pass the test of time

The Future of Clouds

Page 60: Cloud Computing:

• Clouds, although unsafe at first look, are in fact very safe

• Main rule when using clouds: Don’t save important information on a cloud (SSN, Credit Card info)

Are Clouds Safe?

Page 61: Cloud Computing:

How Secure is your Information?

-Brad Murphy

Cloud Computing:

Page 62: Cloud Computing:

• An internet cloud is a large server at a separate point in the world where people store their data.

• Clouds are servers

• “A way to share and store information on the internet through servers”

What is a cloud?

Page 63: Cloud Computing:

Want does a Cloud Look Like?

SBS Aurora Picture Credit to: Trishna Sharma, “A Cloud Server

Of Microsoft For The Small Guy?”

Page 64: Cloud Computing:

• Clouds come with many undesirable risks.

• You aren’t the only one who has access to your cloud

• “A lack of privacy and Confidentiality” (David Tenecuya, “Internet Cloud security: The Illusion of Inclusion”

• Clouds aren’t managed “directly within the company that owns them”

What’s at Stake when Using a Cloud?

Page 65: Cloud Computing:

• Many hackers use malware to access people’s clouds

• This diagram shows the process malware takes to hack into cloud files:

Malware

P.G. Dorey, A. Leite, “Cloud Security: A Security Problem or Solution?”

Page 66: Cloud Computing:

• A general way that hackers get into people’s files is “Phishing”

• Phishing is done by sending out fake emails posing as companies in order to trick the recipient

• Some emails are obviously fake, others are very convincing

Phishing

Page 67: Cloud Computing:

Example of Phishing

Page 68: Cloud Computing:

• Phishing can easily be avoided by reading the full email

• Check the URL at the bottom of the email page

• Never give your credit card or SS number on an email. Only give that information on a trusted website

• Take the test at my other laptop!

How to Avoid Phishing

Page 69: Cloud Computing:

• Companies have grown to an all-time high on terms of productivity

• Only takes a fraction of the amount of time that it used did in the past to share information company-wide

• Google Drive allows users to collaborate and all work on a paper at once

• iCloud enables users to share music and apps with family on the same service

Benefits of Cloud Computing

Page 70: Cloud Computing:

Google Drive’s CollaborationAs you can see, there are multiple people working on the same

paper simultaneously

Page 71: Cloud Computing:

• The main way companies secure information is known as Encryption.

• Encryption is scrambling all the bits of data in a way that makes no sense and only the computer can solve

• Computers only solve the encryption puzzle when a password is provided

• CAPTCHAs are used as ways to prevent malware from learning passwords to get past encryption

How Companies Secure Your Information

Page 72: Cloud Computing:

• A CAPTCHA is a picture of words that are displayed in a way that a computer cannot solve.

CAPTCHAs

Page 73: Cloud Computing:

• Developers have been constantly working on new ways to improve security• Tokenisation• Homomorphic Encryption• Encryption by spreading data to multiple locations

The Future of Clouds

• All of these ways have not yet found efficient ways of implementation, but may find a way in the near future.

Page 74: Cloud Computing:

• Clouds have the potential to be alive for a long time

• Although the functions of a cloud may change and expand, the over infrastructure of the will more than likely pass the test of time

The Future of Clouds

Page 75: Cloud Computing:

• Clouds, although unsafe at first look, are in fact very safe

• Main rule when using clouds: Don’t save important information on a cloud (SSN, Credit Card info)

Are Clouds Safe?


Recommended