Dangers of Cloud Computing How to keep your documents safe.

Slides:



Advertisements
Similar presentations
Are you being a safe and successful digital citizen? E-safety
Advertisements

Mobile device security Practical advice on how to keep your mobile device and the data on it safe.
A note for you We have created this presentation for you, the outstanding employee who has IT security on the brain. We want to help you spread the word.
Services Course Windows Live SkyDrive Participant Guide.
Wired Wednesday! eBooks Abington Free Library. Today, we will… Talk about eBooks and eBook readers Show you how to get started for the first time with.
Services Course Windows Live SkyDrive Participant Guide.
Setting Up Dropbox PCNA: HOW TO SETUP & SYNC FILES WITH DROPBOX.
LET’S GET UPDATING FUN….FUN….FUN How to Update Your Web Site Presented by: Leonora Fimbres & Marci Haight February 13, 2002.
The Effects of Cloud Services on Compliance and Data Protection
Cloud Computing COMP 1631, Winter 2011 Yanggang Chen.
Personal Data Protection and Security Measures Justin Law IT Services - Information Security Team 25 & 27 November 2013.
HNA-Drive Familiarization Presentation. From the address bar in your preferred internet browser, navigate to Site supports: Internet.
Personal Data Protection and Security Measures Justin Law IT Services - Information Security Team 18, 20 & 25 March 2015.
Are you being a safe and successful digital citizen?
Microsoft Office 2013 ®® Appendix A Introduction to Cloud Computing.
Introduction to Microsoft Office Web Apps with Jim Mollé Learn iT! Computer Software Training.
Company/Product Overview. You have lots of files all over the place.
The Study of Security and Privacy in Mobile Applications Name: Liang Wei
Attendee overview 1 Joining a Redback Webinar. Before the Webinar Getting organised It’s always a good idea to ensure you are prepared well in advance.
Manjit kaur Manjit Kaur1. Why do we need to protect our computer from a virus? A reason why we need to protect our computer from a virus is because it.
Welcome to iDOC Corp. DocHost Solution Online Document Management DocHost 14 Day Free Trial
Using Reader, Drive, and Cloud Printing. Subscribe to Webpages, Wikis, Photo shares and Webblogs (Blogs) enabled with Rich/RDF Site Summary/Really Simple.
Information guide.
ESCCO Data Security Training David Dixon September 2014.
Stay Safe & Secure Online. Outline Passwords Everyday Security Security Physical Security Protecting Personal Information.
Using Google Drive/Docs Skills: use Google Drive/Docs Concepts: we download and run programs inside our Web clients, wire-frame diagram, user interface,
IT security By Tilly Gerlack.
Using Technology Tools in the Classroom to Actively Engage Students in the Learning Process By Mrs. Teresa Jackson Dutchtown High School Follow me on twitter.
GOLD UNIT 4 - IT SECURITY FOR USERS (2 CREDITS) Thomas Jenkins.
Copyright ©: SAMSUNG & Samsung Hope for Youth. All rights reserved Tutorials The internet: Staying safe online Suitable for: Beginner.
Internet Safety & Security Tips for Parents Dorothy Grant Elementary School, April 2015.
GOLD UNIT 4 - IT SECURITY FOR USERS (2 CREDITS) Rebecca Pritchard.
Manjit kaur Manjit Kaur1. Why do we need to protect our computer from a virus? A reason why we need to protect our computer from a virus is because it.
STARTFINISH DisposePrint & ScanShareStore Protect information and equipment ClassifyProtect.
Holiday Homework The school building may be closing early but this doesn’t mean that the learning has to stop. You teachers have set you work to do in.
Using LastPass. Great password management is impossible w/o a great tool Auto-fill (hands-free login) will save you approximately one hour per month You.
Convenience product security Collin Busch. What is a convenience product? A convenience product is a device or application that makes your life easier.
 Google Apps for Business Lucas Angell Thy Chau Laura Graham Beza Negash "Build" your business with Google Apps video.
The internet is an inspiring and positive place. It is an amazing resource which enables people (young and old) to connect, communicate and be creative.
Introduction: Introduction: As technology advances, we have cheaper and easier ways to stay connected to the world around us. We are able to order almost.
Dextrosoft SCHEDULED PHONE BACKUP Backup your mobile life Version Copyright © 2015 Dextrosoft Private Limited. All Rights Reserved.
Introduction to Cloud Computing What is cloud? Use of computing resources (hardware and software) that are delivered as a service over a network Why cloud.
Blogs How to use the bog safely and secure? Create new username. Create a strong password to your account. Create the password to your uploaded files.
©2012 Check Point Software Technologies Ltd. [PROTECTED] — All rights reserved. Securing Your Data in Endpoint and Mobile Environments Frank Suijten Security.
Office 365 is cloud- based productivity, hosted by Microsoft. Business-class Gain large, 50GB mailboxes that can send messages up to 25MB in size,
STOP. THINK. CONNECT. Online Safety Quiz. Round 1: Safety and Security.
Lindsey Velez, Director of Instructional Technology Single Sign-On One Click.
Cloud Computing 10 Cloud Computing 10. Cloud Computing 10 You’ll have heard about the ‘Cloud’ Lots of you will use it! But you need to be clear about.
BizSmart Lunch & Learn Webinar Information Security and Protecting your business With the increased risk of some sort of cyber- attack over the past few.
Mobile device security Practical advice on how to keep your mobile device and the data on it safe.
Basic Web Design UVICELL Week 4 Templates and site management Week 4 Templates and site management.
Dial-In Number: 1 (631) Webinar ID: FHC Tech Talk Automation and Efficiency Series Talk #1 Carbonite automated backup.
Sharing and Synching files
Using iLocker.
Boomerang Adds Smart Calendar Assistant and Reminders to Office 365 That Increase Productivity and Simplify Meeting Scheduling OFFICE 365 APP BUILDER.
Quick Guide 1. Sign In 2. My Apps 3. Update Password 4. App Library
Unit 4 IT Security.
Reset Kindle To Factory Settings. (Check Here)
Introduction to Soonr by ….
STOP. THINK. CONNECT. Online Safety Quiz.
Call AVG Antivirus Support | Fix Your PC
Cloud Storage Services
+Vonus: An Intuitive, Cloud-Based Point-of-Sale Solution That’s Powered by Microsoft Office 365 with Tools to Increase Sales Using Social Media OFFICE.
Social Media Safety Freshman Seminar.
How to Set up Remote Access to Personal U: drive
Internet safety By DAGAS YACMAS team.
Cloud computing.
BluVault Provides Secure and Cost-Effective Cloud Endpoint Backup and Recovery Using Power of Microsoft OneDrive Business and Microsoft Azure OFFICE 365.
Tapestry.
Presentation transcript:

Dangers of Cloud Computing How to keep your documents safe.

Introduction In today's ever growing networked world, "the confidentiality, integrity, and availability of data is more important than ever. Therefore, security, privacy, and auditing of cloud-based services should be of interest to [everyone].” [1]

What’s this about trust? Cloud computing means we have to trust the big companies who provide the services to keep us safe, and if their security is compromised in any way, we’re left with a big cleanup and a potentially devastating loss of personal data.

Sounds bad, but most people like the idea of Cloud Computing. Peoples perception of Cloud Computing can vary depending on who you ask. But people who are in support of Cloud Computing argue that the service facilitates their lives more than ever before, by being able to synchronize all their documents, or their thoughts, between all of their connected devices. In summary then, they’re able to access everything they have stored, both whenever and wherever.

It can’t all be good news, can it? Not really, the opposing argument is such that people who haven’t bought into the idea of Cloud Computing feel that the big corporation products (such as Google Drive, Microsoft’s SkyDrive and Dropbox etc...) will now own your intellectual property as all your data will be stored online. Some critics argue that new product/service ideas saved by an end-user in The Cloud will give corporations free reign to steal the idea and design the product.

Ok, am I safe as I can be? There are several ways of making sure everything you upload remains yours. Cloudswave [2] advises us that “[Keeping your documents safe] is simple. The Cloud and your presence within it is as safe or unsafe as you want it to be.”

So What Can I do? There’s no right or wrong way to keep your documents safe. But making small changes to the way you protect your data can make a big difference to stopping unwanted eyes accessing it. Here are some basic steps to help you: [3] 1. Select a good password. 2. Use security questions sensibly – You may not need to give the correct answer, just remember what you entered. 3. When possible, use encryption. 4. Backup your data! 5. Delete your data when it’s no longer necessary. 6. If you’re going to share your online folder, make sure its shared to only the people who need to see it.

That’s just for my documents, what else should I keep in mind? Its not just uploading and storing your data that you need to be mindful of. As mobile phone and tablet application development is vastly expanding, there are some people/companies out there who use this expansion as a way of developing ‘Trojan’ apps. Once downloaded, these will access your data and upload it to their servers – all without you knowing.

This sounds worse, what can I do? The Fearless Web Team give a list of tips that we should always keep in mind: [4] 1. Only download mobile apps through official app stores and consider downloading a mobile security client. 2. Be careful when clicking links. 3. Keep your browser and computer [mobile equipment] up-to-date.

In Summary then… We’ve learnt that the Cloud is as safe as you make it. But as we said at the beginning, making small changes to the way you work can make a big difference. Always be mindful of what you upload and what you intend to do with it. Always protect your information and be careful who you share it with.

References [1] Mather, T. Kumaraswamy, S. Latif, S. Cloud Security and Privacy. O’Reilly, Sebastopol, 2009, p12. [2] [3] Vedic-Words, How to stay safe in The Cloud, [Online] Available from: [Accessed 13 th November 2012]. [4] Fearless Web Team, How safe is the Cloud?, [Online] Available from: [Accessed 13 th November 2012].