The Cloud is Safe Pract The Facts. Backround: The recent hacking of the Cloud poses many issues with respect to Internet security. Just recently a hacker.

Slides:



Advertisements
Similar presentations
Tips and tools to keep you and your information safe on-line. We will go over a lot of information today, so it is important to pay attention and follow.
Advertisements

Copyright 2006 Mid-City Offices Systems. Busy people… How would your business be affected, if you suddenly lost all of your computer data? Rush through.
INADEQUATE SECURITY POLICIES Each covered entity and business associate must have written polices that cover all the Required and Addressable HIPAA standards.
Part I: Making Good Online Choices
Cloud Computing EDT Cloud Computing Overview Cloud Computing can be defined as a network of applications, services, and infrastructure that are.
Tips and tools to keep you and your information safe on-line. We will go over a lot of information today, so it is important to pay attention and follow.
SECURITY CHECK Protecting Your System and Yourself Source:
Computer viruses Hardware theft Software Theft Unauthorized access by hackers Information Theft Computer Crimes.
BEWARE! IDENTITY THEFT CARL JOHNSON FINANCIAL LITERACY JENKS HIGH CSHOOL.
Data Security for Healthcare Facilities Debbie Abbott Health Information Consultant Resolutions (Int) Pty Ltd.
Viruses,Hacking and Backups By Grace Mackay 8K Viruses Hacking and Hackers Backups.
Security, Privacy, and Ethics Online Computer Crimes.
How safe is the cloud? Pract The Facts. What is the issue? Click to see video.
IDENTITY THEFT ARE YOU SAFE?. HOW DOES THIS HAPPEN TO ME? Internet “Security “ When using a public computer, never access any vital accounts like banking.
Safe Information By Eli Salazar. The Government The Internet A strategic way to communicate top secret plans. The government used Internet for its safety.
Personal Security on the Internet. Introduction What is InfoSec? Information Security (InfoSec) is: –Protection of information –Its critical elements.
Internet Security Passwords.
Identity-Theft is the fastest growing crime in America; 9.9 MILLION victims were reported last year, according to a Federal Trade Commission survey!
CLOUD COMPUTING Michael Gumbleton. Preview What is the cloud Internet facts DrawbacksSolutionFutureConclusion.
EVERYTHING YOU NEED TO KNOW ABOUT CLOUD STORAGE BY: JONATHAN SANBORN SECTION 005.
E safety. Ads It’s always best to not click on ads when you see them, and it’s always a good idea to ignore them, but if there are too many you can always.
Viruses & Security Threats Unit 1 – Understanding Computer Systems JMW 2012.
Protecting Information. Who We Are We are working on our Information Assurance MBA This is part of our curriculum; to present on information security.
Social impacts of the use of it By: Mohamed Abdalla.
GOLD UNIT 4 - IT SECURITY FOR USERS (2 CREDITS) Cameron Simpson.
Microsoft Windows LEARNING HOW USE AN OPERATING SYSTEM 1.
Operating Systems Concepts 1/e Ruth Watson Chapter 4 Chapter 4 Windows Utilities Ruth Watson.
Identity Theft By: Chelsea Thompson. What is identity theft? The crime of obtaining the personal or financial information of another person for the purpose.
IT Security for Users By Matthew Moody.
Staying Safe Online Keep your Information Secure.
GOLD UNIT 4 - IT SECURITY FOR USERS (2 CREDITS) Liam Bradford.
Threat to I.T Security By Otis Powers. Hacking Hacking is a big threat to society because it could expose secrets of the I.T industry that perhaps should.
IT security By Tilly Gerlack.
GOLD UNIT 4 - IT SECURITY FOR USERS (2 CREDITS) Thomas Jenkins.
Ways to organize electronic files Witness fitness By: Simran and Navneet.
GOLD UNIT 4 - IT SECURITY FOR USERS (2 CREDITS). SELECT AND USE APPROPRIATE METHODS TO MINIMISE SECURITY RISK TO IT SYSTEMS AND DATA 1.1 I can describe.
 INADEQUATE SECURITY POLICIES ›Each covered entity and business associate must have written polices that cover all the Required and Addressable HIPAA.
Personal Privacy and Security Zenia C. Bahorski Ph.D. Department of Computer Science Eastern Michigan University Personal Privacy & Security - Z. Bahorski,
GOLD UNIT 4 - IT SECURITY FOR USERS (2 CREDITS) Rebecca Pritchard.
Phishing scams Phishing is the fraudulent practice of sending s purporting to be from reputable companies in order to induce individuals to reveal.
Digital Citizenship Lesson 3. Does it Matter who has your Data What kinds of information about yourself do you share online? What else do you do online.
Chapter 3 Software. Learning Objectives Upon successful completion of this chapter, you will be able to: Define the term software Describe the two primary.
 You always need to have the latest anti- virus software so that you can prevent picking up unwanted virus’.  To prevent receiving junk mail, being.
This is a presentation about viruses, Hacking and back ups!! By Alice Daniels 7P.
Viruses Hackers Backups Stuxnet Portfolio Computer viruses are small programs or scripts that can negatively affect the health of your computer. A.
Computer Security... By Kate Robinson 8P Viruses Hackers Backups Stuxnet Gary Mckinnon.
For brownies this PowerPoint will help you understand computer viruses and help stop them!!!!
INTERNET SAFETY FOR KIDS
Viruses For… What is a virus? A virus, affects your computer and damages its software. It can affect your computer, and some viruses can damage your.
GOLD UNIT 4 - IT SECURITY FOR USERS (2 CREDITS) Kamran Didcote.
Hackers And Hacking.
Passwords and more How to cope with computer passwords and avoid identity theft You can download this from Mark Cross.
What is The Cloud?. The Cloud.
All about viruses, hacking and backups By Harriet Thomas.
Firewall firewalls Is a program on your computer to protect your computer from all types of threats and if you have a server and you wasn’t to protect.
GOLD UNIT 4 - IT SECURITY FOR USERS (2 CREDITS) Bailey Ryan.
GOLD UNIT 4 - IT SECURITY FOR USERS (2 CREDITS) Cameron Simpson.
INTRODUCTION & QUESTIONS.
5 different ways to get tricked on the internet. 1. Viruses A virus is a computer malware program that copies it’s files to the computer. This may allow.
Google and the Cloud Review. Definition The Cloud refers to anything that involves delivering hosted services over the internet.
DoS Attacks Phishing Keylogging Computer Laws/Acts.
CHAPTER 18 TECHNOLOGY ADVANCEMENTS IN THE WORKPLACE.
Cloud Computing 10 Cloud Computing 10. Cloud Computing 10 You’ll have heard about the ‘Cloud’ Lots of you will use it! But you need to be clear about.
Applications Software. Is a software used to carry out a particular task e.g. a game or word processor.
Cloud Computing Cloud computing: (the Internet represents the Cloud).
Ways to protect yourself against hackers
How to build a good reputation online
Unit 4 IT Security Kerris Davies.
Revision PowerPoint By Nicole Davidson.
Chapter 3 Software.
Presentation transcript:

The Cloud is Safe Pract The Facts

Backround: The recent hacking of the Cloud poses many issues with respect to Internet security. Just recently a hacker infiltrated the Cloud system and stole very sensitive photographs of celebrities and distributed them over the Internet. See cbsnews.com/news/jennifer- lawrence-mary-elizabeth-winstead-hacked-how-safe- are-your-cloud-photos-and-data/. So to Pract the fact, is this a matter of Cloud security, or is this matter of personal discretion by the users….should you be more careful with what you put on the Internet?cbsnews.com/news/jennifer- lawrence-mary-elizabeth-winstead-hacked-how-safe- are-your-cloud-photos-and-data/ Pract The Facts

Lesson Objectives: 1.Why the Cloud is Safe. 2.Methods used to keep the cloud safe. Pract The Facts

The cloud offers better security than you can provide yourself. When using the cloud you don’t have to worry about hard drive failures, scams, and/or virus damaging your files. Pract The Facts

Click to see the video Pract The Facts

There are different view points on safety and the cloud. 1.Services on the cloud are not any less safe than in house servers. (or your own computer.) 2. The cloud is not the problem. It was the information from an individuals account that was stolen. Pract The Facts

According to James Gordon, the chief information officer at Needham Bank in Massachusetts user due dillegence is the key! "I believe the cloud can be safe, but users of the cloud must know their data and how it's protected and stored both at rest and in transit,” Pract The Facts

Large companies that manage cloud facilities are better able to protect themselves from threats to the data. They are also better at maintaining the hardware used to store the information. Pract The Facts

How do they keep the data safe? Pract The Facts

Where is the cloud? This video can give you and idea Of where your data may be stored and how secure the facility is. Pract The Facts click to see the video

Hiring people to hack into their data centers. Many companies out there such as Google hold contest or hire contractors to To try and hack their sites. Buy doing this they can discover security issues and fix them Before someone else can use the bugs to cause damage. Companies that do this: Google paid 3.3 million in reward money for their site. Facebook paid $2204 per bug from contractors for their site. Microsoft paid 100 million dollars in rewards for their site. Mozilla (Firefox) paid 1.5 million dollars in reward money for their site. Pract The Facts

Microsoft protects its Cloud system using the following methods: 1.No one person has access to your data in a cloud facility (on location). Only maintenance can enter the center but they cannot access the data. 2.There are controls in the servers so unknown programs are not allowed to run on servers. 3.The company is always testing the system for weak spots and fixing them. Pract The Facts

In summary we have learned: 1.Why the cloud is safe. 2.Methods used to keep the cloud safe. Pract The Facts