The Cloud September 10, 2016.

Slides:



Advertisements
Similar presentations
Tips and tools to keep you and your information safe on-line. We will go over a lot of information today, so it is important to pay attention and follow.
Advertisements

How to protect yourself, your computer, and others on the internet
Cloud Computing EDT Cloud Computing Overview Cloud Computing can be defined as a network of applications, services, and infrastructure that are.
Tips and tools to keep you and your information safe on-line. We will go over a lot of information today, so it is important to pay attention and follow.
So much alike! What is Personal Branding? 1. Make a clear, specific, and consistent image of yourself on the internet that reflects who YOU are. 2. Make.
Andrew Schroeder Networking Aspects of Cloud Computing.
Tracking, Privacy, You & The 21 st Century When you talk online the internet listens.
Microsoft Office 2013 ®® Appendix A Introduction to Cloud Computing.
ESCCO Data Security Training David Dixon September 2014.
Google cloud Vs Apple Cloud Made By: Pooja Dubey (ITSNS)
Safeguarding Your Privacy Section 1.3. Safeguarding Your Privacy 1. What is Identity Theft? 2. Research a story on identity theft and be prepared to report.
Don’t be a Typical Teen Driver!!!!!! Survey from more than 1,000 teens/ from April % Text- message while driving 66% Exceed speed limit by 10 mph.
Chapter 12: How Private are Web Interactions?. Why we care? How much of your personal info was released to the Internet each time you view a Web page?
Society & Computers PowerPoint
LESSON 5-2 Protecting Your Computer Lesson Contents Protecting Your Computer Best Practices for Securing Online and Network Transactions Measures for Securing.
and Internet Explorer.  The transmission of messages and files via a computer network  Messages can consist of simple text or can contain attachments,
ONLINE SECURITY Tips 1 Online Security Online Security Tips.
Phillip Schneider Information Services Librarian Gail Borden Public Library District Cybersecurity: Keeping Your Computers & Devices Safe.
[FUNCTIONALITY AND SAFETY OF A MODERN TECHNOLOGY] [CLOUD COMPUTING FOR INDIVIDUAL CONSUMERS]
Discovering Computers 2009 Chapter 1 Introduction to Computers.
IT Vocabulary Basics Review Sit at tables. Need pencil/pen.
MOBILE TECHNOLOGY BY: AMANDA HANKS. SKYDRIVE VS. DROPBOX SkyDrive: More Free Storage Space (7 GB) Less Costly for more Storage Space $10,$25,$50 Less.
Networks : What is a network? A Network is formed when 2 or more computers (devices) are linked together. Every computer or device on a network can send.
1.4 wired and wireless networks lesson 1
Digital Security Identity theft Copyright Laws Plagiarism, and More.
Take Charge of your Finances
Getting Connected: Benefits of Broadband in your Home
Welcome to our E – Safety Open Evening.
Tips to help keep children safe on the internet and social networks
TECHNOLOGY.
The Internet in Business: Corporations, Businesses, and Entrepreneurs
Unit 13 IT Systems Troubleshooting and Repair Anne Sewell
Objectives Overview Explain why computer literacy is vital to success in today’s world Define the term, computer, and describe the relationship between.
Positive choices with driving:
Protecting What’s Yours: Your Identity
The Internet Industry Week Two.
Cloud Computing.
Ways to protect yourself against hackers
Pre-writing topic discussion: Speak to your partner
Take Charge of your Finances
Tech Terminology Overview
What Home Computer Skills do I need
What is Tapestry? An Online learning journal system.
Vocabulary Big Data - “Big data is a broad term for datasets so large or complex that traditional data processing applications are inadequate.” Moore’s.
Unit 4 IT Security.
Tips to help keep children safe on the internet and social networks
Connecting to the Internet
Why use the Internet? © EIT, Author Gay Robertson, 2016.
© EIT, Author Gay Robertson, 2017
Objectives Overview Explain why computer literacy is vital to success in today's world Describe the five components of a computer Discuss the advantages.
Information is at the heart of any University, and Harvard is no exception. We create it, analyze it, share it, and apply it. As you would imagine, we.
Information Technology Services Education and Awareness Team
Cloud Storage Services
Content Management lifecycle
Objectives Overview Explain why computer literacy is vital to success in today’s world Define the term, computer, and describe the relationship between.
What Is Tapestry? An Online learning journal system.
Mobile Commerce.
Cloud computing.
Computer Skills and Applications II
It’s in the Clouds? An Overview of Cloud Services
What Home Computer Skills do I need
The dark web By Riley. Sampare.
What Is Tapestry? An Online learning journal system.
Internet Social Media. Internet Social Media Benefits: Internet is a useful tool if utilized appropriately. Uses Benefits: Internet is a useful tool.
Digital Parenting Internet Safety Day 2019.
BTEC level 3 Learning Aim D.
Information Technology Services Education and Awareness Team
TECHNOLOGICAL CONVERGENCE for Institutions & Audiences
Seminar-2019 CONDUCTED BY:- Gayatri institute of computer management TOPIC:-INFORMATION IS WEAlTH UNDER THE GUIDANCE OF:- BIBEK SIR PRESENTED BY:- SHAIK.
Do You Have Multiple Amazon Seller Accounts? Amazon Knows it! By EsellersCare Contact : +1 (855)
Presentation transcript:

The Cloud September 10, 2016

Are you in The Cloud? YES!

How can I be so sure? You use email You shop and/or bank online You Web surf for news, entertainment & information You access and view videos, YouTube, movies You stream music You participate in social media You use audio / visual communication services

How can I be so sure? You store your files online (limited device storage) You use online applications You back up your files online You collaborate with others online (work; other) You game play online And many more – some you don’t even know about

So what is The Cloud and how did it get started? Cloud computing = shared resources to optimize performance Began in the 1950’s with dumb terminals & mainframes Originally wired; then added wireless (Wi-Fi, cellular, etc.) Began in business & academia; then homes, now everywhere Internet of Things (IoT); artificial intelligence Some aspects cost money; others are “free” But with all these advances, are there any risks?

Chicago man says he hacked celebrities ‘Computer nerd' to plead guilty to swiping nude photos in Celebgate (Chicago Tribune; 8/31/16) (This was a 2014 Apple iCloud hack, which also involved email accounts)

So what are the risks? Your information may be stolen during transmission Your information may be stolen from Cloud servers Those with whom you interact may sell your data Your files may be lost if the provider goes out of business Ownership of stored information may not be clear Back-up copies may not be deleted when you delete a file Government agencies may access your information

Given the risks, should I simply avoid or abandon The Cloud Given the risks, should I simply avoid or abandon The Cloud? Answer: It would be very difficult to do Besides……..

Yet we still drive, despite distracted drivers. Why? Consider this: In 2010, there were an estimated 5,419,000 crashes (30,296 fatal crashes), killing 32,999 and injuring 2,239,000. The 32,479 traffic fatalities in 2011 were the lowest in 62 years (1949). Records indicate that there has been a total of 3,613,732 motor vehicle fatalities in the United States from 1899 to 2013. (Wikipedia) Yet we still drive, despite distracted drivers. Why?

We must go to some other location Speed Convenience (timeliness, comfort, companionship) And so we drive – but we take precautions. We buy safe cars. We maintain our cars. We wear seat belts. We practice defensive driving. We avoid night driving because of visibility & drunks. And, we hope for the best……..

What other risks do we take every day? Eating Drinking Breathing Seeking medical care Investing Believing politicians Buying things for children / grandchildren Coming in contact with other people

What’s the point? Life is based on a certain amount of trust Life also carries risks Common sense calls for enjoying life, with some caution The same idea applies to cloud computing Take stock of how we interface with the world through our devices & identify specific areas of possible concern Research, select and implement countermeasures – starting with the highest priority and going from there

Create our own server

Unique passwords & user names; change frequently Other Options Unique passwords & user names; change frequently Use one-time credit cards (BofA ShopSafe) Implement two-factor authentication for login Research your providers; change where appropriate Consider an email client vs. webmail Encrypt everything – phone, email, browser, hard drive Utilize a VPN (Virtual Private Network) Use Duck Duck Go as your search provider Use Ghostery / Disconnect to offset tracking cookies

Search the Web / media for information about this topic Conclusion Search the Web / media for information about this topic One search will often provide useful link(s) to a new site Share information / new risks / countermeasures Ask yourself why you are ……………………….. Is this needed / beneficial or not? Is there a better way to accomplish the task? Seek a reasonable balance between paranoia & benefit