How Secure is your Information? -Brad Murphy. An internet cloud is a large server at a separate...

75
How Secure is your Information? -Brad Murphy Cloud Computing:

Transcript of How Secure is your Information? -Brad Murphy. An internet cloud is a large server at a separate...

How Secure is your Information?

-Brad Murphy

Cloud Computing:

• An internet cloud is a large server at a separate point in the world where people store their data.

• Clouds are servers

• “A way to share and store information on the internet through servers”

What is a cloud?

Want does a Cloud Look Like?

SBS Aurora Picture Credit to: Trishna Sharma, “A Cloud Server

Of Microsoft For The Small Guy?”

• Clouds come with many undesirable risks.

• You aren’t the only one who has access to your cloud

• “A lack of privacy and Confidentiality” (David Tenecuya, “Internet Cloud security: The Illusion of Inclusion”

• Clouds aren’t managed “directly within the company that owns them”

What’s at Stake when Using a Cloud?

• Many hackers use malware to access people’s clouds

• This diagram shows the process malware takes to hack into cloud files:

Malware

P.G. Dorey, A. Leite, “Cloud Security: A Security Problem or Solution?”

• A general way that hackers get into people’s files is “Phishing”

• Phishing is done by sending out fake emails posing as companies in order to trick the recipient

• Some emails are obviously fake, others are very convincing

Phishing

Example of Phishing

• Phishing can easily be avoided by reading the full email

• Check the URL at the bottom of the email page

• Never give your credit card or SS number on an email. Only give that information on a trusted website

• Take the test at my other laptop!

How to Avoid Phishing

• Companies have grown to an all-time high on terms of productivity

• Only takes a fraction of the amount of time that it used did in the past to share information company-wide

• Google Drive allows users to collaborate and all work on a paper at once

• iCloud enables users to share music and apps with family on the same service

Benefits of Cloud Computing

Google Drive’s Collaboration

As you can see, there are multiple people working on the same paper simultaneously

• The main way companies secure information is known as Encryption.

• Encryption is scrambling all the bits of data in a way that makes no sense and only the computer can solve

• Computers only solve the encryption puzzle when a password is provided

• CAPTCHAs are used as ways to prevent malware from learning passwords to get past encryption

How Companies Secure Your Information

• A CAPTCHA is a picture of words that are displayed in a way that a computer cannot solve.

CAPTCHAs

• Developers have been constantly working on new ways to improve security• Tokenisation• Homomorphic Encryption• Encryption by spreading data to multiple locations

The Future of Clouds

• All of these ways have not yet found efficient ways of implementation, but may find a way in the near future.

• Clouds have the potential to be alive for a long time

• Although the functions of a cloud may change and expand, the over infrastructure of the will more than likely pass the test of time

The Future of Clouds

• Clouds, although unsafe at first look, are in fact very safe

• Main rule when using clouds: Don’t save important information on a cloud (SSN, Credit Card info)

Are Clouds Safe?

How Secure is your Information?

-Brad Murphy

Cloud Computing:

• An internet cloud is a large server at a separate point in the world where people store their data.

• Clouds are servers

• “A way to share and store information on the internet through servers”

What is a cloud?

Want does a Cloud Look Like?

SBS Aurora Picture Credit to: Trishna Sharma, “A Cloud Server

Of Microsoft For The Small Guy?”

• Clouds come with many undesirable risks.

• You aren’t the only one who has access to your cloud

• “A lack of privacy and Confidentiality” (David Tenecuya, “Internet Cloud security: The Illusion of Inclusion”

• Clouds aren’t managed “directly within the company that owns them”

What’s at Stake when Using a Cloud?

• Many hackers use malware to access people’s clouds

• This diagram shows the process malware takes to hack into cloud files:

Malware

P.G. Dorey, A. Leite, “Cloud Security: A Security Problem or Solution?”

• A general way that hackers get into people’s files is “Phishing”

• Phishing is done by sending out fake emails posing as companies in order to trick the recipient

• Some emails are obviously fake, others are very convincing

Phishing

Example of Phishing

• Phishing can easily be avoided by reading the full email

• Check the URL at the bottom of the email page

• Never give your credit card or SS number on an email. Only give that information on a trusted website

• Take the test at my other laptop!

How to Avoid Phishing

• Companies have grown to an all-time high on terms of productivity

• Only takes a fraction of the amount of time that it used did in the past to share information company-wide

• Google Drive allows users to collaborate and all work on a paper at once

• iCloud enables users to share music and apps with family on the same service

Benefits of Cloud Computing

Google Drive’s Collaboration

As you can see, there are multiple people working on the same paper simultaneously

• The main way companies secure information is known as Encryption.

• Encryption is scrambling all the bits of data in a way that makes no sense and only the computer can solve

• Computers only solve the encryption puzzle when a password is provided

• CAPTCHAs are used as ways to prevent malware from learning passwords to get past encryption

How Companies Secure Your Information

• A CAPTCHA is a picture of words that are displayed in a way that a computer cannot solve.

CAPTCHAs

• Developers have been constantly working on new ways to improve security• Tokenisation• Homomorphic Encryption• Encryption by spreading data to multiple locations

The Future of Clouds

• All of these ways have not yet found efficient ways of implementation, but may find a way in the near future.

• Clouds have the potential to be alive for a long time

• Although the functions of a cloud may change and expand, the over infrastructure of the will more than likely pass the test of time

The Future of Clouds

• Clouds, although unsafe at first look, are in fact very safe

• Main rule when using clouds: Don’t save important information on a cloud (SSN, Credit Card info)

Are Clouds Safe?

How Secure is your Information?

-Brad Murphy

Cloud Computing:

• An internet cloud is a large server at a separate point in the world where people store their data.

• Clouds are servers

• “A way to share and store information on the internet through servers”

What is a cloud?

Want does a Cloud Look Like?

SBS Aurora Picture Credit to: Trishna Sharma, “A Cloud Server

Of Microsoft For The Small Guy?”

• Clouds come with many undesirable risks.

• You aren’t the only one who has access to your cloud

• “A lack of privacy and Confidentiality” (David Tenecuya, “Internet Cloud security: The Illusion of Inclusion”

• Clouds aren’t managed “directly within the company that owns them”

What’s at Stake when Using a Cloud?

• Many hackers use malware to access people’s clouds

• This diagram shows the process malware takes to hack into cloud files:

Malware

P.G. Dorey, A. Leite, “Cloud Security: A Security Problem or Solution?”

• A general way that hackers get into people’s files is “Phishing”

• Phishing is done by sending out fake emails posing as companies in order to trick the recipient

• Some emails are obviously fake, others are very convincing

Phishing

Example of Phishing

• Phishing can easily be avoided by reading the full email

• Check the URL at the bottom of the email page

• Never give your credit card or SS number on an email. Only give that information on a trusted website

• Take the test at my other laptop!

How to Avoid Phishing

• Companies have grown to an all-time high on terms of productivity

• Only takes a fraction of the amount of time that it used did in the past to share information company-wide

• Google Drive allows users to collaborate and all work on a paper at once

• iCloud enables users to share music and apps with family on the same service

Benefits of Cloud Computing

Google Drive’s Collaboration

As you can see, there are multiple people working on the same paper simultaneously

• The main way companies secure information is known as Encryption.

• Encryption is scrambling all the bits of data in a way that makes no sense and only the computer can solve

• Computers only solve the encryption puzzle when a password is provided

• CAPTCHAs are used as ways to prevent malware from learning passwords to get past encryption

How Companies Secure Your Information

• A CAPTCHA is a picture of words that are displayed in a way that a computer cannot solve.

CAPTCHAs

• Developers have been constantly working on new ways to improve security• Tokenisation• Homomorphic Encryption• Encryption by spreading data to multiple locations

The Future of Clouds

• All of these ways have not yet found efficient ways of implementation, but may find a way in the near future.

• Clouds have the potential to be alive for a long time

• Although the functions of a cloud may change and expand, the over infrastructure of the will more than likely pass the test of time

The Future of Clouds

• Clouds, although unsafe at first look, are in fact very safe

• Main rule when using clouds: Don’t save important information on a cloud (SSN, Credit Card info)

Are Clouds Safe?

How Secure is your Information?

-Brad Murphy

Cloud Computing:

• An internet cloud is a large server at a separate point in the world where people store their data.

• Clouds are servers

• “A way to share and store information on the internet through servers”

What is a cloud?

Want does a Cloud Look Like?

SBS Aurora Picture Credit to: Trishna Sharma, “A Cloud Server

Of Microsoft For The Small Guy?”

• Clouds come with many undesirable risks.

• You aren’t the only one who has access to your cloud

• “A lack of privacy and Confidentiality” (David Tenecuya, “Internet Cloud security: The Illusion of Inclusion”

• Clouds aren’t managed “directly within the company that owns them”

What’s at Stake when Using a Cloud?

• Many hackers use malware to access people’s clouds

• This diagram shows the process malware takes to hack into cloud files:

Malware

P.G. Dorey, A. Leite, “Cloud Security: A Security Problem or Solution?”

• A general way that hackers get into people’s files is “Phishing”

• Phishing is done by sending out fake emails posing as companies in order to trick the recipient

• Some emails are obviously fake, others are very convincing

Phishing

Example of Phishing

• Phishing can easily be avoided by reading the full email

• Check the URL at the bottom of the email page

• Never give your credit card or SS number on an email. Only give that information on a trusted website

• Take the test at my other laptop!

How to Avoid Phishing

• Companies have grown to an all-time high on terms of productivity

• Only takes a fraction of the amount of time that it used did in the past to share information company-wide

• Google Drive allows users to collaborate and all work on a paper at once

• iCloud enables users to share music and apps with family on the same service

Benefits of Cloud Computing

Google Drive’s Collaboration

As you can see, there are multiple people working on the same paper simultaneously

• The main way companies secure information is known as Encryption.

• Encryption is scrambling all the bits of data in a way that makes no sense and only the computer can solve

• Computers only solve the encryption puzzle when a password is provided

• CAPTCHAs are used as ways to prevent malware from learning passwords to get past encryption

How Companies Secure Your Information

• A CAPTCHA is a picture of words that are displayed in a way that a computer cannot solve.

CAPTCHAs

• Developers have been constantly working on new ways to improve security• Tokenisation• Homomorphic Encryption• Encryption by spreading data to multiple locations

The Future of Clouds

• All of these ways have not yet found efficient ways of implementation, but may find a way in the near future.

• Clouds have the potential to be alive for a long time

• Although the functions of a cloud may change and expand, the over infrastructure of the will more than likely pass the test of time

The Future of Clouds

• Clouds, although unsafe at first look, are in fact very safe

• Main rule when using clouds: Don’t save important information on a cloud (SSN, Credit Card info)

Are Clouds Safe?

How Secure is your Information?

-Brad Murphy

Cloud Computing:

• An internet cloud is a large server at a separate point in the world where people store their data.

• Clouds are servers

• “A way to share and store information on the internet through servers”

What is a cloud?

Want does a Cloud Look Like?

SBS Aurora Picture Credit to: Trishna Sharma, “A Cloud Server

Of Microsoft For The Small Guy?”

• Clouds come with many undesirable risks.

• You aren’t the only one who has access to your cloud

• “A lack of privacy and Confidentiality” (David Tenecuya, “Internet Cloud security: The Illusion of Inclusion”

• Clouds aren’t managed “directly within the company that owns them”

What’s at Stake when Using a Cloud?

• Many hackers use malware to access people’s clouds

• This diagram shows the process malware takes to hack into cloud files:

Malware

P.G. Dorey, A. Leite, “Cloud Security: A Security Problem or Solution?”

• A general way that hackers get into people’s files is “Phishing”

• Phishing is done by sending out fake emails posing as companies in order to trick the recipient

• Some emails are obviously fake, others are very convincing

Phishing

Example of Phishing

• Phishing can easily be avoided by reading the full email

• Check the URL at the bottom of the email page

• Never give your credit card or SS number on an email. Only give that information on a trusted website

• Take the test at my other laptop!

How to Avoid Phishing

• Companies have grown to an all-time high on terms of productivity

• Only takes a fraction of the amount of time that it used did in the past to share information company-wide

• Google Drive allows users to collaborate and all work on a paper at once

• iCloud enables users to share music and apps with family on the same service

Benefits of Cloud Computing

Google Drive’s Collaboration

As you can see, there are multiple people working on the same paper simultaneously

• The main way companies secure information is known as Encryption.

• Encryption is scrambling all the bits of data in a way that makes no sense and only the computer can solve

• Computers only solve the encryption puzzle when a password is provided

• CAPTCHAs are used as ways to prevent malware from learning passwords to get past encryption

How Companies Secure Your Information

• A CAPTCHA is a picture of words that are displayed in a way that a computer cannot solve.

CAPTCHAs

• Developers have been constantly working on new ways to improve security• Tokenisation• Homomorphic Encryption• Encryption by spreading data to multiple locations

The Future of Clouds

• All of these ways have not yet found efficient ways of implementation, but may find a way in the near future.

• Clouds have the potential to be alive for a long time

• Although the functions of a cloud may change and expand, the over infrastructure of the will more than likely pass the test of time

The Future of Clouds

• Clouds, although unsafe at first look, are in fact very safe

• Main rule when using clouds: Don’t save important information on a cloud (SSN, Credit Card info)

Are Clouds Safe?