Presentation is loading. Please wait.

Presentation is loading. Please wait.

How Secure is your Information? -Brad Murphy. An internet cloud is a large server at a separate point in the world where people store their data. Clouds.

Similar presentations


Presentation on theme: "How Secure is your Information? -Brad Murphy. An internet cloud is a large server at a separate point in the world where people store their data. Clouds."— Presentation transcript:

1 How Secure is your Information? -Brad Murphy

2 An internet cloud is a large server at a separate point in the world where people store their data. Clouds are servers “A way to share and store information on the internet through servers” What is a cloud?

3 Want does a Cloud Look Like? SBS Aurora Picture Credit to: Trishna Sharma, “A Cloud Server Of Microsoft For The Small Guy?”

4 Clouds come with many undesirable risks. You aren’t the only one who has access to your cloud “A lack of privacy and Confidentiality” (David Tenecuya, “Internet Cloud security: The Illusion of Inclusion” Clouds aren’t managed “directly within the company that owns them” What’s at Stake when Using a Cloud?

5 Many hackers use malware to access people’s clouds This diagram shows the process malware takes to hack into cloud files: Malware P.G. Dorey, A. Leite, “Cloud Security: A Security Problem or Solution?”

6 A general way that hackers get into people’s files is “Phishing” Phishing is done by sending out fake emails posing as companies in order to trick the recipient Some emails are obviously fake, others are very convincing Phishing

7 Example of Phishing

8 Phishing can easily be avoided by reading the full email Check the URL at the bottom of the email page Never give your credit card or SS number on an email. Only give that information on a trusted website Take the test at my other laptop! How to Avoid Phishing

9 Companies have grown to an all-time high on terms of productivity Only takes a fraction of the amount of time that it used did in the past to share information company-wide Google Drive allows users to collaborate and all work on a paper at once iCloud enables users to share music and apps with family on the same service Benefits of Cloud Computing

10 Google Drive’s Collaboration As you can see, there are multiple people working on the same paper simultaneously

11 The main way companies secure information is known as Encryption. Encryption is scrambling all the bits of data in a way that makes no sense and only the computer can solve Computers only solve the encryption puzzle when a password is provided CAPTCHAs are used as ways to prevent malware from learning passwords to get past encryption How Companies Secure Your Information

12 A CAPTCHA is a picture of words that are displayed in a way that a computer cannot solve. CAPTCHAs

13 Developers have been constantly working on new ways to improve security Tokenisation Homomorphic Encryption Encryption by spreading data to multiple locations The Future of Clouds All of these ways have not yet found efficient ways of implementation, but may find a way in the near future.

14 Clouds have the potential to be alive for a long time Although the functions of a cloud may change and expand, the over infrastructure of the will more than likely pass the test of time The Future of Clouds

15 Clouds, although unsafe at first look, are in fact very safe Main rule when using clouds: Don’t save important information on a cloud (SSN, Credit Card info) Are Clouds Safe?

16 How Secure is your Information? -Brad Murphy

17 An internet cloud is a large server at a separate point in the world where people store their data. Clouds are servers “A way to share and store information on the internet through servers” What is a cloud?

18 Want does a Cloud Look Like? SBS Aurora Picture Credit to: Trishna Sharma, “A Cloud Server Of Microsoft For The Small Guy?”

19 Clouds come with many undesirable risks. You aren’t the only one who has access to your cloud “A lack of privacy and Confidentiality” (David Tenecuya, “Internet Cloud security: The Illusion of Inclusion” Clouds aren’t managed “directly within the company that owns them” What’s at Stake when Using a Cloud?

20 Many hackers use malware to access people’s clouds This diagram shows the process malware takes to hack into cloud files: Malware P.G. Dorey, A. Leite, “Cloud Security: A Security Problem or Solution?”

21 A general way that hackers get into people’s files is “Phishing” Phishing is done by sending out fake emails posing as companies in order to trick the recipient Some emails are obviously fake, others are very convincing Phishing

22 Example of Phishing

23 Phishing can easily be avoided by reading the full email Check the URL at the bottom of the email page Never give your credit card or SS number on an email. Only give that information on a trusted website Take the test at my other laptop! How to Avoid Phishing

24 Companies have grown to an all-time high on terms of productivity Only takes a fraction of the amount of time that it used did in the past to share information company-wide Google Drive allows users to collaborate and all work on a paper at once iCloud enables users to share music and apps with family on the same service Benefits of Cloud Computing

25 Google Drive’s Collaboration As you can see, there are multiple people working on the same paper simultaneously

26 The main way companies secure information is known as Encryption. Encryption is scrambling all the bits of data in a way that makes no sense and only the computer can solve Computers only solve the encryption puzzle when a password is provided CAPTCHAs are used as ways to prevent malware from learning passwords to get past encryption How Companies Secure Your Information

27 A CAPTCHA is a picture of words that are displayed in a way that a computer cannot solve. CAPTCHAs

28 Developers have been constantly working on new ways to improve security Tokenisation Homomorphic Encryption Encryption by spreading data to multiple locations The Future of Clouds All of these ways have not yet found efficient ways of implementation, but may find a way in the near future.

29 Clouds have the potential to be alive for a long time Although the functions of a cloud may change and expand, the over infrastructure of the will more than likely pass the test of time The Future of Clouds

30 Clouds, although unsafe at first look, are in fact very safe Main rule when using clouds: Don’t save important information on a cloud (SSN, Credit Card info) Are Clouds Safe?

31 How Secure is your Information? -Brad Murphy

32 An internet cloud is a large server at a separate point in the world where people store their data. Clouds are servers “A way to share and store information on the internet through servers” What is a cloud?

33 Want does a Cloud Look Like? SBS Aurora Picture Credit to: Trishna Sharma, “A Cloud Server Of Microsoft For The Small Guy?”

34 Clouds come with many undesirable risks. You aren’t the only one who has access to your cloud “A lack of privacy and Confidentiality” (David Tenecuya, “Internet Cloud security: The Illusion of Inclusion” Clouds aren’t managed “directly within the company that owns them” What’s at Stake when Using a Cloud?

35 Many hackers use malware to access people’s clouds This diagram shows the process malware takes to hack into cloud files: Malware P.G. Dorey, A. Leite, “Cloud Security: A Security Problem or Solution?”

36 A general way that hackers get into people’s files is “Phishing” Phishing is done by sending out fake emails posing as companies in order to trick the recipient Some emails are obviously fake, others are very convincing Phishing

37 Example of Phishing

38 Phishing can easily be avoided by reading the full email Check the URL at the bottom of the email page Never give your credit card or SS number on an email. Only give that information on a trusted website Take the test at my other laptop! How to Avoid Phishing

39 Companies have grown to an all-time high on terms of productivity Only takes a fraction of the amount of time that it used did in the past to share information company-wide Google Drive allows users to collaborate and all work on a paper at once iCloud enables users to share music and apps with family on the same service Benefits of Cloud Computing

40 Google Drive’s Collaboration As you can see, there are multiple people working on the same paper simultaneously

41 The main way companies secure information is known as Encryption. Encryption is scrambling all the bits of data in a way that makes no sense and only the computer can solve Computers only solve the encryption puzzle when a password is provided CAPTCHAs are used as ways to prevent malware from learning passwords to get past encryption How Companies Secure Your Information

42 A CAPTCHA is a picture of words that are displayed in a way that a computer cannot solve. CAPTCHAs

43 Developers have been constantly working on new ways to improve security Tokenisation Homomorphic Encryption Encryption by spreading data to multiple locations The Future of Clouds All of these ways have not yet found efficient ways of implementation, but may find a way in the near future.

44 Clouds have the potential to be alive for a long time Although the functions of a cloud may change and expand, the over infrastructure of the will more than likely pass the test of time The Future of Clouds

45 Clouds, although unsafe at first look, are in fact very safe Main rule when using clouds: Don’t save important information on a cloud (SSN, Credit Card info) Are Clouds Safe?

46 How Secure is your Information? -Brad Murphy

47 An internet cloud is a large server at a separate point in the world where people store their data. Clouds are servers “A way to share and store information on the internet through servers” What is a cloud?

48 Want does a Cloud Look Like? SBS Aurora Picture Credit to: Trishna Sharma, “A Cloud Server Of Microsoft For The Small Guy?”

49 Clouds come with many undesirable risks. You aren’t the only one who has access to your cloud “A lack of privacy and Confidentiality” (David Tenecuya, “Internet Cloud security: The Illusion of Inclusion” Clouds aren’t managed “directly within the company that owns them” What’s at Stake when Using a Cloud?

50 Many hackers use malware to access people’s clouds This diagram shows the process malware takes to hack into cloud files: Malware P.G. Dorey, A. Leite, “Cloud Security: A Security Problem or Solution?”

51 A general way that hackers get into people’s files is “Phishing” Phishing is done by sending out fake emails posing as companies in order to trick the recipient Some emails are obviously fake, others are very convincing Phishing

52 Example of Phishing

53 Phishing can easily be avoided by reading the full email Check the URL at the bottom of the email page Never give your credit card or SS number on an email. Only give that information on a trusted website Take the test at my other laptop! How to Avoid Phishing

54 Companies have grown to an all-time high on terms of productivity Only takes a fraction of the amount of time that it used did in the past to share information company-wide Google Drive allows users to collaborate and all work on a paper at once iCloud enables users to share music and apps with family on the same service Benefits of Cloud Computing

55 Google Drive’s Collaboration As you can see, there are multiple people working on the same paper simultaneously

56 The main way companies secure information is known as Encryption. Encryption is scrambling all the bits of data in a way that makes no sense and only the computer can solve Computers only solve the encryption puzzle when a password is provided CAPTCHAs are used as ways to prevent malware from learning passwords to get past encryption How Companies Secure Your Information

57 A CAPTCHA is a picture of words that are displayed in a way that a computer cannot solve. CAPTCHAs

58 Developers have been constantly working on new ways to improve security Tokenisation Homomorphic Encryption Encryption by spreading data to multiple locations The Future of Clouds All of these ways have not yet found efficient ways of implementation, but may find a way in the near future.

59 Clouds have the potential to be alive for a long time Although the functions of a cloud may change and expand, the over infrastructure of the will more than likely pass the test of time The Future of Clouds

60 Clouds, although unsafe at first look, are in fact very safe Main rule when using clouds: Don’t save important information on a cloud (SSN, Credit Card info) Are Clouds Safe?

61 How Secure is your Information? -Brad Murphy

62 An internet cloud is a large server at a separate point in the world where people store their data. Clouds are servers “A way to share and store information on the internet through servers” What is a cloud?

63 Want does a Cloud Look Like? SBS Aurora Picture Credit to: Trishna Sharma, “A Cloud Server Of Microsoft For The Small Guy?”

64 Clouds come with many undesirable risks. You aren’t the only one who has access to your cloud “A lack of privacy and Confidentiality” (David Tenecuya, “Internet Cloud security: The Illusion of Inclusion” Clouds aren’t managed “directly within the company that owns them” What’s at Stake when Using a Cloud?

65 Many hackers use malware to access people’s clouds This diagram shows the process malware takes to hack into cloud files: Malware P.G. Dorey, A. Leite, “Cloud Security: A Security Problem or Solution?”

66 A general way that hackers get into people’s files is “Phishing” Phishing is done by sending out fake emails posing as companies in order to trick the recipient Some emails are obviously fake, others are very convincing Phishing

67 Example of Phishing

68 Phishing can easily be avoided by reading the full email Check the URL at the bottom of the email page Never give your credit card or SS number on an email. Only give that information on a trusted website Take the test at my other laptop! How to Avoid Phishing

69 Companies have grown to an all-time high on terms of productivity Only takes a fraction of the amount of time that it used did in the past to share information company-wide Google Drive allows users to collaborate and all work on a paper at once iCloud enables users to share music and apps with family on the same service Benefits of Cloud Computing

70 Google Drive’s Collaboration As you can see, there are multiple people working on the same paper simultaneously

71 The main way companies secure information is known as Encryption. Encryption is scrambling all the bits of data in a way that makes no sense and only the computer can solve Computers only solve the encryption puzzle when a password is provided CAPTCHAs are used as ways to prevent malware from learning passwords to get past encryption How Companies Secure Your Information

72 A CAPTCHA is a picture of words that are displayed in a way that a computer cannot solve. CAPTCHAs

73 Developers have been constantly working on new ways to improve security Tokenisation Homomorphic Encryption Encryption by spreading data to multiple locations The Future of Clouds All of these ways have not yet found efficient ways of implementation, but may find a way in the near future.

74 Clouds have the potential to be alive for a long time Although the functions of a cloud may change and expand, the over infrastructure of the will more than likely pass the test of time The Future of Clouds

75 Clouds, although unsafe at first look, are in fact very safe Main rule when using clouds: Don’t save important information on a cloud (SSN, Credit Card info) Are Clouds Safe?


Download ppt "How Secure is your Information? -Brad Murphy. An internet cloud is a large server at a separate point in the world where people store their data. Clouds."

Similar presentations


Ads by Google