Cloud Computing: - PowerPoint PPT Presentation

cloud computing n.
Download
Skip this Video
Loading SlideShow in 5 Seconds..
Cloud Computing: PowerPoint Presentation
Download Presentation
Cloud Computing:

play fullscreen
1 / 75
Cloud Computing:
107 Views
Download Presentation
truly
Download Presentation

Cloud Computing:

- - - - - - - - - - - - - - - - - - - - - - - - - - - E N D - - - - - - - - - - - - - - - - - - - - - - - - - - -
Presentation Transcript

  1. Cloud Computing: How Secure is your Information? -Brad Murphy

  2. What is a cloud? • An internet cloud is a large server at a separate point in the world where people store their data. • Clouds are servers • “A way to share and store information on the internet through servers”

  3. Want does a Cloud Look Like? SBS Aurora Picture Credit to: Trishna Sharma, “A Cloud Server Of Microsoft For The Small Guy?”

  4. What’s at Stake when Using a Cloud? • Clouds come with many undesirable risks. • You aren’t the only one who has access to your cloud • “A lack of privacy and Confidentiality” (David Tenecuya, “Internet Cloud security: The Illusion of Inclusion” • Clouds aren’t managed “directly within the company that owns them”

  5. Malware • Many hackers use malware to access people’s clouds • This diagram shows the process malware takes to hack into cloud files: P.G. Dorey, A. Leite, “Cloud Security: A Security Problem or Solution?”

  6. Phishing • A general way that hackers get into people’s files is “Phishing” • Phishing is done by sending out fake emails posing as companies in order to trick the recipient • Some emails are obviously fake, others are very convincing

  7. Example of Phishing

  8. How to Avoid Phishing • Phishing can easily be avoided by reading the full email • Check the URL at the bottom of the email page • Never give your credit card or SS number on an email. Only give that information on a trusted website • Take the test at my other laptop!

  9. Benefits of Cloud Computing • Companies have grown to an all-time high on terms of productivity • Only takes a fraction of the amount of time that it used did in the past to share information company-wide • Google Drive allows users to collaborate and all work on a paper at once • iCloud enables users to share music and apps with family on the same service

  10. Google Drive’s Collaboration As you can see, there are multiple people working on the same paper simultaneously

  11. How Companies Secure Your Information • The main way companies secure information is known as Encryption. • Encryption is scrambling all the bits of data in a way that makes no sense and only the computer can solve • Computers only solve the encryption puzzle when a password is provided • CAPTCHAs are used as ways to prevent malware from learning passwords to get past encryption

  12. CAPTCHAs • A CAPTCHA is a picture of words that are displayed in a way that a computer cannot solve.

  13. The Future of Clouds • Developers have been constantly working on new ways to improve security • Tokenisation • Homomorphic Encryption • Encryption by spreading data to multiple locations All of these ways have not yet found efficient ways of implementation, but may find a way in the near future.

  14. The Future of Clouds • Clouds have the potential to be alive for a long time • Although the functions of a cloud may change and expand, the over infrastructure of the will more than likely pass the test of time

  15. Are Clouds Safe? • Clouds, although unsafe at first look, are in fact very safe • Main rule when using clouds: Don’t save important information on a cloud (SSN, Credit Card info)

  16. Cloud Computing: How Secure is your Information? -Brad Murphy

  17. What is a cloud? • An internet cloud is a large server at a separate point in the world where people store their data. • Clouds are servers • “A way to share and store information on the internet through servers”

  18. Want does a Cloud Look Like? SBS Aurora Picture Credit to: Trishna Sharma, “A Cloud Server Of Microsoft For The Small Guy?”

  19. What’s at Stake when Using a Cloud? • Clouds come with many undesirable risks. • You aren’t the only one who has access to your cloud • “A lack of privacy and Confidentiality” (David Tenecuya, “Internet Cloud security: The Illusion of Inclusion” • Clouds aren’t managed “directly within the company that owns them”

  20. Malware • Many hackers use malware to access people’s clouds • This diagram shows the process malware takes to hack into cloud files: P.G. Dorey, A. Leite, “Cloud Security: A Security Problem or Solution?”

  21. Phishing • A general way that hackers get into people’s files is “Phishing” • Phishing is done by sending out fake emails posing as companies in order to trick the recipient • Some emails are obviously fake, others are very convincing

  22. Example of Phishing

  23. How to Avoid Phishing • Phishing can easily be avoided by reading the full email • Check the URL at the bottom of the email page • Never give your credit card or SS number on an email. Only give that information on a trusted website • Take the test at my other laptop!

  24. Benefits of Cloud Computing • Companies have grown to an all-time high on terms of productivity • Only takes a fraction of the amount of time that it used did in the past to share information company-wide • Google Drive allows users to collaborate and all work on a paper at once • iCloud enables users to share music and apps with family on the same service

  25. Google Drive’s Collaboration As you can see, there are multiple people working on the same paper simultaneously

  26. How Companies Secure Your Information • The main way companies secure information is known as Encryption. • Encryption is scrambling all the bits of data in a way that makes no sense and only the computer can solve • Computers only solve the encryption puzzle when a password is provided • CAPTCHAs are used as ways to prevent malware from learning passwords to get past encryption

  27. CAPTCHAs • A CAPTCHA is a picture of words that are displayed in a way that a computer cannot solve.

  28. The Future of Clouds • Developers have been constantly working on new ways to improve security • Tokenisation • Homomorphic Encryption • Encryption by spreading data to multiple locations All of these ways have not yet found efficient ways of implementation, but may find a way in the near future.

  29. The Future of Clouds • Clouds have the potential to be alive for a long time • Although the functions of a cloud may change and expand, the over infrastructure of the will more than likely pass the test of time

  30. Are Clouds Safe? • Clouds, although unsafe at first look, are in fact very safe • Main rule when using clouds: Don’t save important information on a cloud (SSN, Credit Card info)

  31. Cloud Computing: How Secure is your Information? -Brad Murphy

  32. What is a cloud? • An internet cloud is a large server at a separate point in the world where people store their data. • Clouds are servers • “A way to share and store information on the internet through servers”

  33. Want does a Cloud Look Like? SBS Aurora Picture Credit to: Trishna Sharma, “A Cloud Server Of Microsoft For The Small Guy?”

  34. What’s at Stake when Using a Cloud? • Clouds come with many undesirable risks. • You aren’t the only one who has access to your cloud • “A lack of privacy and Confidentiality” (David Tenecuya, “Internet Cloud security: The Illusion of Inclusion” • Clouds aren’t managed “directly within the company that owns them”

  35. Malware • Many hackers use malware to access people’s clouds • This diagram shows the process malware takes to hack into cloud files: P.G. Dorey, A. Leite, “Cloud Security: A Security Problem or Solution?”

  36. Phishing • A general way that hackers get into people’s files is “Phishing” • Phishing is done by sending out fake emails posing as companies in order to trick the recipient • Some emails are obviously fake, others are very convincing

  37. Example of Phishing

  38. How to Avoid Phishing • Phishing can easily be avoided by reading the full email • Check the URL at the bottom of the email page • Never give your credit card or SS number on an email. Only give that information on a trusted website • Take the test at my other laptop!

  39. Benefits of Cloud Computing • Companies have grown to an all-time high on terms of productivity • Only takes a fraction of the amount of time that it used did in the past to share information company-wide • Google Drive allows users to collaborate and all work on a paper at once • iCloud enables users to share music and apps with family on the same service

  40. Google Drive’s Collaboration As you can see, there are multiple people working on the same paper simultaneously

  41. How Companies Secure Your Information • The main way companies secure information is known as Encryption. • Encryption is scrambling all the bits of data in a way that makes no sense and only the computer can solve • Computers only solve the encryption puzzle when a password is provided • CAPTCHAs are used as ways to prevent malware from learning passwords to get past encryption

  42. CAPTCHAs • A CAPTCHA is a picture of words that are displayed in a way that a computer cannot solve.

  43. The Future of Clouds • Developers have been constantly working on new ways to improve security • Tokenisation • Homomorphic Encryption • Encryption by spreading data to multiple locations All of these ways have not yet found efficient ways of implementation, but may find a way in the near future.

  44. The Future of Clouds • Clouds have the potential to be alive for a long time • Although the functions of a cloud may change and expand, the over infrastructure of the will more than likely pass the test of time

  45. Are Clouds Safe? • Clouds, although unsafe at first look, are in fact very safe • Main rule when using clouds: Don’t save important information on a cloud (SSN, Credit Card info)

  46. Cloud Computing: How Secure is your Information? -Brad Murphy

  47. What is a cloud? • An internet cloud is a large server at a separate point in the world where people store their data. • Clouds are servers • “A way to share and store information on the internet through servers”

  48. Want does a Cloud Look Like? SBS Aurora Picture Credit to: Trishna Sharma, “A Cloud Server Of Microsoft For The Small Guy?”

  49. What’s at Stake when Using a Cloud? • Clouds come with many undesirable risks. • You aren’t the only one who has access to your cloud • “A lack of privacy and Confidentiality” (David Tenecuya, “Internet Cloud security: The Illusion of Inclusion” • Clouds aren’t managed “directly within the company that owns them”

  50. Malware • Many hackers use malware to access people’s clouds • This diagram shows the process malware takes to hack into cloud files: P.G. Dorey, A. Leite, “Cloud Security: A Security Problem or Solution?”