How Secure is your Information? -Brad Murphy. An internet cloud is a large server at a separate point in the world where people store their data. Clouds.

Slides:



Advertisements
Similar presentations
How to protect yourself, your computer, and others on the internet
Advertisements

Unit 1 Living in the Digital WorldChapter 1 Lets Communicate Internet Safety.
Cloud Computing EDT Cloud Computing Overview Cloud Computing can be defined as a network of applications, services, and infrastructure that are.
Social Network Security Issues: Social Engineering and Phishing Attacks Jeffrey Allen, Leon Gomez, Marlon Green, Phillip Ricciardi, Christian Sanabria.
INTERNET SAFETY FOR STUDENTS
Jason Rich CIS  The purpose of this project is to inform the audience about the act of phishing. Phishing is when fake websites are created.
Prepared by: Nahed Al-Salah
Web Security A how to guide on Keeping your Website Safe. By: Robert Black.
Andrew Schroeder Networking Aspects of Cloud Computing.
FIRST COURSE Computer Concepts Internet and Microsoft Office Get to Know Your Computer.
Norman SecureTide Powerful cloud solution to stop spam and threats before it reaches your network.
Security Liaisons Information Presentation. Introduction  What’s the big deal with computer security? Don’t we have an IT security department to take.
Software. stands for electronic mail. software enables you to send an electronic message to another person anywhere in the world. The message.
COMPUTER CRIME AND TYPES OF CRIME Prepared by: NURUL FATIHAH BT ANAS.
Internet safety By Lydia Snowden.
Microsoft Office PowerPoint 2013 Microsoft Office PowerPoint 2013 Courseware # 3256 Lesson 8: Sharing Presentations.
Viruses & Security Threats Unit 1 – Understanding Computer Systems JMW 2012.
Protecting Information. Who We Are We are working on our Information Assurance MBA This is part of our curriculum; to present on information security.
The World-Wide Web. Why we care? How much of your personal info was released to the Internet each time you view a Web page? How much of your personal.
GOLD UNIT 4 - IT SECURITY FOR USERS (2 CREDITS) Cameron Simpson.
MOBILE DEVICE SECURITY. WHAT IS MOBILE DEVICE SECURITY? Mobile Devices  Smartphones  Laptops  Tablets  USB Memory  Portable Media Player  Handheld.
GIS and Cloud Computing. Flickr  Upload and manage your photos online  Share your photos with your family and friends  Post your photos everywhere.
ESCCO Data Security Training David Dixon September 2014.
By Chris Versaci CLOUD SECURITY. WHAT IS CLOUD COMPUTING? Cloud computing is a concept that involves a large number of computers connected through a real-time.
Staying Safe Online Keep your Information Secure.
Reliability & Desirability of Data
GOLD UNIT 4 - IT SECURITY FOR USERS (2 CREDITS) Liam Bradford.
Lesson 2- Protecting Yourself Online. Determine the strength of passwords Evaluate online threats Protect against malware/hacking Protect against identity.
GOLD UNIT 4 - IT SECURITY FOR USERS (2 CREDITS) Thomas Jenkins.
Safeguarding Your Privacy Section 1.3. Safeguarding Your Privacy 1. What is Identity Theft? 2. Research a story on identity theft and be prepared to report.
Year 9 Autumn Assessment Computer system/Information security-Planning, Communicating, Information. By Louis Smith-Lassey 9k 9Y1.
Starter How many methods of keeping data secure can you think of… Username and Password Biometrics Digital Signature Encryption Access Levels Physical.
GOLD UNIT 4 - IT SECURITY FOR USERS (2 CREDITS) Rebecca Pritchard.
 Research on the best software that suits your preference. I recommend Adobe Dreamweaver as that is what I’m using to create my website.
3.05 Protect Your Computer and Information Unit 3 Internet Basics.
Advantages of Using a Network By Ryan Riddell. Shared Files The same files can be accessed from different computers on the network Files can be traded,
Malicious Attacks By: Albert, Alex, Andon, Ben, Robert.
Minding your business on the internet Kelly Trevino Regional Director October 6,2015.
Chapter 12: How Private are Web Interactions?. Why we care? How much of your personal info was released to the Internet each time you view a Web page?
By Liam Wright Manga comic group Japan SAFETY on your computer.
Internet Safety and Productivity Tips Presented by ITS Kerri Sorenson and Sean Hernandez December 11, 8:30-9:00 am.
MANAGING RISK. CYBER CRIME The use of the internet and developments in IT bring with it a risk of cyber crime. Credit card details are stolen, hackers.
TRUENORTH TECHNOLOGY POLICIES OVERVIEW. This includes but is not limited to : – Games – Non-work related software – Streaming media applications – Mobile.
LESSON 5-2 Protecting Your Computer Lesson Contents Protecting Your Computer Best Practices for Securing Online and Network Transactions Measures for Securing.
Google and the Cloud Review. Definition The Cloud refers to anything that involves delivering hosted services over the internet.
Cybersecurity Test Review Introduction to Digital Technology.
Introduction: Introduction: As technology advances, we have cheaper and easier ways to stay connected to the world around us. We are able to order almost.
Security risks in a network. Remote access  When you connect a computer to a network it is visible to all other computers on the network. When you connect.
Created by Alexis Ford Research done by Rebecca Tanner Ford 1.
Todays’ Agenda Private vs. Personal Information Take out your notebook and copy the following information. Private information – information that can be.
is short for electronic mail!. What is ? An electronic message sent from one computer to another. saves money and time compared to regular.
Computer Security Keeping you and your computer safe in the digital world.
[FUNCTIONALITY AND SAFETY OF A MODERN TECHNOLOGY] [CLOUD COMPUTING FOR INDIVIDUAL CONSUMERS]
SECURE DATA TRANSFER Melvin Freeman The Next Step Public Charter School.
Internet Security TEAMS March 18 th, ISP:Internet Service Provider.
How to Make Yourself More Secure Using Public Computers and Free Public Wi-Fi.
Why Does The Site Need an SSL Certification?. Security should always be a high concern for your website, but do you need an SSL certificate? A secure.
Chapter 40 Internet Security.
An Introduction to Phishing and Viruses
Common Methods Used to Commit Computer Crimes
Big Picture Consider this How many online threats might you be faced with a day?
Ways to protect yourself against hackers
is short for electronic mail!
How And The Internet Work
The Internet of Unsecure Things
Cloud computing.
Computer Security.
Security Hardening through Awareness August 2018
Information Security.
School of Medicine Orientation Information Security Training
Presentation transcript:

How Secure is your Information? -Brad Murphy

An internet cloud is a large server at a separate point in the world where people store their data. Clouds are servers “A way to share and store information on the internet through servers” What is a cloud?

Want does a Cloud Look Like? SBS Aurora Picture Credit to: Trishna Sharma, “A Cloud Server Of Microsoft For The Small Guy?”

Clouds come with many undesirable risks. You aren’t the only one who has access to your cloud “A lack of privacy and Confidentiality” (David Tenecuya, “Internet Cloud security: The Illusion of Inclusion” Clouds aren’t managed “directly within the company that owns them” What’s at Stake when Using a Cloud?

Many hackers use malware to access people’s clouds This diagram shows the process malware takes to hack into cloud files: Malware P.G. Dorey, A. Leite, “Cloud Security: A Security Problem or Solution?”

A general way that hackers get into people’s files is “Phishing” Phishing is done by sending out fake s posing as companies in order to trick the recipient Some s are obviously fake, others are very convincing Phishing

Example of Phishing

Phishing can easily be avoided by reading the full Check the URL at the bottom of the page Never give your credit card or SS number on an . Only give that information on a trusted website Take the test at my other laptop! How to Avoid Phishing

Companies have grown to an all-time high on terms of productivity Only takes a fraction of the amount of time that it used did in the past to share information company-wide Google Drive allows users to collaborate and all work on a paper at once iCloud enables users to share music and apps with family on the same service Benefits of Cloud Computing

Google Drive’s Collaboration As you can see, there are multiple people working on the same paper simultaneously

The main way companies secure information is known as Encryption. Encryption is scrambling all the bits of data in a way that makes no sense and only the computer can solve Computers only solve the encryption puzzle when a password is provided CAPTCHAs are used as ways to prevent malware from learning passwords to get past encryption How Companies Secure Your Information

A CAPTCHA is a picture of words that are displayed in a way that a computer cannot solve. CAPTCHAs

Developers have been constantly working on new ways to improve security Tokenisation Homomorphic Encryption Encryption by spreading data to multiple locations The Future of Clouds All of these ways have not yet found efficient ways of implementation, but may find a way in the near future.

Clouds have the potential to be alive for a long time Although the functions of a cloud may change and expand, the over infrastructure of the will more than likely pass the test of time The Future of Clouds

Clouds, although unsafe at first look, are in fact very safe Main rule when using clouds: Don’t save important information on a cloud (SSN, Credit Card info) Are Clouds Safe?

How Secure is your Information? -Brad Murphy

An internet cloud is a large server at a separate point in the world where people store their data. Clouds are servers “A way to share and store information on the internet through servers” What is a cloud?

Want does a Cloud Look Like? SBS Aurora Picture Credit to: Trishna Sharma, “A Cloud Server Of Microsoft For The Small Guy?”

Clouds come with many undesirable risks. You aren’t the only one who has access to your cloud “A lack of privacy and Confidentiality” (David Tenecuya, “Internet Cloud security: The Illusion of Inclusion” Clouds aren’t managed “directly within the company that owns them” What’s at Stake when Using a Cloud?

Many hackers use malware to access people’s clouds This diagram shows the process malware takes to hack into cloud files: Malware P.G. Dorey, A. Leite, “Cloud Security: A Security Problem or Solution?”

A general way that hackers get into people’s files is “Phishing” Phishing is done by sending out fake s posing as companies in order to trick the recipient Some s are obviously fake, others are very convincing Phishing

Example of Phishing

Phishing can easily be avoided by reading the full Check the URL at the bottom of the page Never give your credit card or SS number on an . Only give that information on a trusted website Take the test at my other laptop! How to Avoid Phishing

Companies have grown to an all-time high on terms of productivity Only takes a fraction of the amount of time that it used did in the past to share information company-wide Google Drive allows users to collaborate and all work on a paper at once iCloud enables users to share music and apps with family on the same service Benefits of Cloud Computing

Google Drive’s Collaboration As you can see, there are multiple people working on the same paper simultaneously

The main way companies secure information is known as Encryption. Encryption is scrambling all the bits of data in a way that makes no sense and only the computer can solve Computers only solve the encryption puzzle when a password is provided CAPTCHAs are used as ways to prevent malware from learning passwords to get past encryption How Companies Secure Your Information

A CAPTCHA is a picture of words that are displayed in a way that a computer cannot solve. CAPTCHAs

Developers have been constantly working on new ways to improve security Tokenisation Homomorphic Encryption Encryption by spreading data to multiple locations The Future of Clouds All of these ways have not yet found efficient ways of implementation, but may find a way in the near future.

Clouds have the potential to be alive for a long time Although the functions of a cloud may change and expand, the over infrastructure of the will more than likely pass the test of time The Future of Clouds

Clouds, although unsafe at first look, are in fact very safe Main rule when using clouds: Don’t save important information on a cloud (SSN, Credit Card info) Are Clouds Safe?

How Secure is your Information? -Brad Murphy

An internet cloud is a large server at a separate point in the world where people store their data. Clouds are servers “A way to share and store information on the internet through servers” What is a cloud?

Want does a Cloud Look Like? SBS Aurora Picture Credit to: Trishna Sharma, “A Cloud Server Of Microsoft For The Small Guy?”

Clouds come with many undesirable risks. You aren’t the only one who has access to your cloud “A lack of privacy and Confidentiality” (David Tenecuya, “Internet Cloud security: The Illusion of Inclusion” Clouds aren’t managed “directly within the company that owns them” What’s at Stake when Using a Cloud?

Many hackers use malware to access people’s clouds This diagram shows the process malware takes to hack into cloud files: Malware P.G. Dorey, A. Leite, “Cloud Security: A Security Problem or Solution?”

A general way that hackers get into people’s files is “Phishing” Phishing is done by sending out fake s posing as companies in order to trick the recipient Some s are obviously fake, others are very convincing Phishing

Example of Phishing

Phishing can easily be avoided by reading the full Check the URL at the bottom of the page Never give your credit card or SS number on an . Only give that information on a trusted website Take the test at my other laptop! How to Avoid Phishing

Companies have grown to an all-time high on terms of productivity Only takes a fraction of the amount of time that it used did in the past to share information company-wide Google Drive allows users to collaborate and all work on a paper at once iCloud enables users to share music and apps with family on the same service Benefits of Cloud Computing

Google Drive’s Collaboration As you can see, there are multiple people working on the same paper simultaneously

The main way companies secure information is known as Encryption. Encryption is scrambling all the bits of data in a way that makes no sense and only the computer can solve Computers only solve the encryption puzzle when a password is provided CAPTCHAs are used as ways to prevent malware from learning passwords to get past encryption How Companies Secure Your Information

A CAPTCHA is a picture of words that are displayed in a way that a computer cannot solve. CAPTCHAs

Developers have been constantly working on new ways to improve security Tokenisation Homomorphic Encryption Encryption by spreading data to multiple locations The Future of Clouds All of these ways have not yet found efficient ways of implementation, but may find a way in the near future.

Clouds have the potential to be alive for a long time Although the functions of a cloud may change and expand, the over infrastructure of the will more than likely pass the test of time The Future of Clouds

Clouds, although unsafe at first look, are in fact very safe Main rule when using clouds: Don’t save important information on a cloud (SSN, Credit Card info) Are Clouds Safe?

How Secure is your Information? -Brad Murphy

An internet cloud is a large server at a separate point in the world where people store their data. Clouds are servers “A way to share and store information on the internet through servers” What is a cloud?

Want does a Cloud Look Like? SBS Aurora Picture Credit to: Trishna Sharma, “A Cloud Server Of Microsoft For The Small Guy?”

Clouds come with many undesirable risks. You aren’t the only one who has access to your cloud “A lack of privacy and Confidentiality” (David Tenecuya, “Internet Cloud security: The Illusion of Inclusion” Clouds aren’t managed “directly within the company that owns them” What’s at Stake when Using a Cloud?

Many hackers use malware to access people’s clouds This diagram shows the process malware takes to hack into cloud files: Malware P.G. Dorey, A. Leite, “Cloud Security: A Security Problem or Solution?”

A general way that hackers get into people’s files is “Phishing” Phishing is done by sending out fake s posing as companies in order to trick the recipient Some s are obviously fake, others are very convincing Phishing

Example of Phishing

Phishing can easily be avoided by reading the full Check the URL at the bottom of the page Never give your credit card or SS number on an . Only give that information on a trusted website Take the test at my other laptop! How to Avoid Phishing

Companies have grown to an all-time high on terms of productivity Only takes a fraction of the amount of time that it used did in the past to share information company-wide Google Drive allows users to collaborate and all work on a paper at once iCloud enables users to share music and apps with family on the same service Benefits of Cloud Computing

Google Drive’s Collaboration As you can see, there are multiple people working on the same paper simultaneously

The main way companies secure information is known as Encryption. Encryption is scrambling all the bits of data in a way that makes no sense and only the computer can solve Computers only solve the encryption puzzle when a password is provided CAPTCHAs are used as ways to prevent malware from learning passwords to get past encryption How Companies Secure Your Information

A CAPTCHA is a picture of words that are displayed in a way that a computer cannot solve. CAPTCHAs

Developers have been constantly working on new ways to improve security Tokenisation Homomorphic Encryption Encryption by spreading data to multiple locations The Future of Clouds All of these ways have not yet found efficient ways of implementation, but may find a way in the near future.

Clouds have the potential to be alive for a long time Although the functions of a cloud may change and expand, the over infrastructure of the will more than likely pass the test of time The Future of Clouds

Clouds, although unsafe at first look, are in fact very safe Main rule when using clouds: Don’t save important information on a cloud (SSN, Credit Card info) Are Clouds Safe?

How Secure is your Information? -Brad Murphy

An internet cloud is a large server at a separate point in the world where people store their data. Clouds are servers “A way to share and store information on the internet through servers” What is a cloud?

Want does a Cloud Look Like? SBS Aurora Picture Credit to: Trishna Sharma, “A Cloud Server Of Microsoft For The Small Guy?”

Clouds come with many undesirable risks. You aren’t the only one who has access to your cloud “A lack of privacy and Confidentiality” (David Tenecuya, “Internet Cloud security: The Illusion of Inclusion” Clouds aren’t managed “directly within the company that owns them” What’s at Stake when Using a Cloud?

Many hackers use malware to access people’s clouds This diagram shows the process malware takes to hack into cloud files: Malware P.G. Dorey, A. Leite, “Cloud Security: A Security Problem or Solution?”

A general way that hackers get into people’s files is “Phishing” Phishing is done by sending out fake s posing as companies in order to trick the recipient Some s are obviously fake, others are very convincing Phishing

Example of Phishing

Phishing can easily be avoided by reading the full Check the URL at the bottom of the page Never give your credit card or SS number on an . Only give that information on a trusted website Take the test at my other laptop! How to Avoid Phishing

Companies have grown to an all-time high on terms of productivity Only takes a fraction of the amount of time that it used did in the past to share information company-wide Google Drive allows users to collaborate and all work on a paper at once iCloud enables users to share music and apps with family on the same service Benefits of Cloud Computing

Google Drive’s Collaboration As you can see, there are multiple people working on the same paper simultaneously

The main way companies secure information is known as Encryption. Encryption is scrambling all the bits of data in a way that makes no sense and only the computer can solve Computers only solve the encryption puzzle when a password is provided CAPTCHAs are used as ways to prevent malware from learning passwords to get past encryption How Companies Secure Your Information

A CAPTCHA is a picture of words that are displayed in a way that a computer cannot solve. CAPTCHAs

Developers have been constantly working on new ways to improve security Tokenisation Homomorphic Encryption Encryption by spreading data to multiple locations The Future of Clouds All of these ways have not yet found efficient ways of implementation, but may find a way in the near future.

Clouds have the potential to be alive for a long time Although the functions of a cloud may change and expand, the over infrastructure of the will more than likely pass the test of time The Future of Clouds

Clouds, although unsafe at first look, are in fact very safe Main rule when using clouds: Don’t save important information on a cloud (SSN, Credit Card info) Are Clouds Safe?