Privacy in a Public World ISACA North Alabama Chapter March 11, 2008.

Slides:



Advertisements
Similar presentations
Transfer Content to a Website What is FTP? File Transfer Protocol FTP is a protocol – a set of rules Designed to allow files to be transferred across.
Advertisements

Creating HIPAA-Compliant Medical Data Applications with Amazon Web Services Presented by, Tulika Srivastava Purdue University.
Lori Fitterling LI843 SSL Secured Sockets Layer. What is Secure Sockets Layer (SSL)? It is protection of data transferred over the Internet using encryption.
By: Hassan Waqar.  A PROTOCOL for securely transmitting data via the internet.  NETWORK LAYER application.  Developed by NETSCAPE.
Company Overview May, 2013 For BMRG members. Agenda SmartVault – why we exist! Key Benefits / Value Propositions Competitive Landscape Security & Data.
Secure File Interchange 2 Whitenoise Laboratories Inc. Quick User Guide.
Caroline Cappuccio Katherine Ananis Spring Part 1: About Xythos  What is Xythos?  Who can use Xythos at UMB?  Why use Xythos?  How do you access.
The Internet Useful Definitions and Concepts About the Internet.
Copyright © 2009 by The McGraw-Hill Companies, Inc. All Rights Reserved. McGraw-Hill Chapter 5 Personal Health Records Electronic Health Records for Allied.
11 CONFIGURE INTERNET EXPLORER Chapter 5. Chapter 5: Configure Internet Explorer2 CHAPTER OVERVIEW AND OBJECTIVES  Configuring Accessibility and Language.
Online Banking Security Magdalena Padyasek. Why Security?  Computer-based businesses  Advances in technology  Internet crimes  September 11 th attacks.
Web Payments via Christopher Woods Aaron Buma. Agenda  Introduction  About it  Why to use it  Services they Provide  Seller Protection  Ebay Aspect.
Working with Applications Lesson 7. Objectives Administer Internet Explorer Secure Internet Explorer Configure Application Compatibility Configure Application.
Your storage on the ground; Your files in the cloud.
 Security and Smartphones By Parker Moore. The Smartphone Takeover  Half of mobile phone subscribers in the United States have a smartphone.  An estimated.
Cloud Computing Kwangyun Cho v=8AXk25TUSRQ.
MCSE Guide to Microsoft Exchange Server 2003 Administration Chapter Four Configuring Outlook and Outlook Web Access.
©Kwan Sai Kit, All Rights Reserved Windows Small Business Server 2003 Features.
Your storage on the ground; Your files in the cloud.
Chapter 9: Novell NetWare
CPSC203 Introduction to Computers Lab 69 By Jie Gao.
Delight QuickBooks Online Banking Internal Support Training QuickBooks Windows 2009/2010 Online Banking.
Chapter 8 Safeguarding the Internet. Firewalls Firewalls: hardware & software that are built using routers, servers and other software A point between.
CIS 250 Advanced Computer Applications Internet/WWW Review.
Section 12.1 Discuss the functions of a Web site Create a feedback form Compare and contrast option buttons and check boxes Section 12.2 Explain the use.
Wikispaces Private Label for Higher Education. Unlimited wikis, unlimited pages, unlimited possibilities Popular use cases: Collaborative coursework E-portfolios.
Cloud Project. SaaS: Software-as-a-Service Also known as an on-demand software, SaaS is an application that can be accessed from anywhere on the world.
The VAO is operated by the VAO, LLC. What is cloud computing and how can scientists use it? Matthew J. Graham, Caltech.
Advanced file encryption Copyright © 2002 Deerfield.com, All Rights Reserved.
CHAPTER 7 THE INTERNET AND INTRANETS 1/11. What is the Internet? 2/11 Large computer network ARPANET (Dept of Defense) It is international and growing.
Internet2 AdvCollab Apps 1 Access Grid Vision To create virtual spaces where distributed people can work together. Challenges:
Copyright © 2009 by The McGraw-Hill Companies, Inc. All Rights Reserved. McGraw-Hill Chapter 5 Personal Health Records Electronic Health Records for Allied.
© 1stworks Corp. The Connected Community 85% of US corporations have a PC 75% of these PCs have an Internet connection 50% of US households have a PC 80%
CIT 380: Securing Computer SystemsSlide #1 CIT 380: Securing Computer Systems Web Security.
What’s New Data Loss Prevention 14. Information is Everywhere Brings Productivity, Agility, Convenience ……and Problems Copyright © 2015 Symantec Corporation.
MCSE Guide to Microsoft Exchange Server 2003 Administration Chapter One Introduction to Exchange Server 2003.
AirLock Secure storage for all your sensitive account data Cross platform (Windows, Linux, Mac) (Optional) Sync between multiple pc’s (Optional) Access.
Uploading Web Page  It would be meaningful to share your web page with the rest of the net user.  Thus, we have to upload the web page to the web server.
Blogs How to use the bog safely and secure? Create new username. Create a strong password to your account. Create the password to your uploaded files.
Network Technology Associate Certification Exam Review.
Citrix ShareFile. Instant file access from any device Sharing and collaboration—with anyone Easy & Familiar (love Dropbox) USERS DEMAND Security Control.
Online Data Storage Companies MY Docs Online. Comparison Name Personal Edition Enterprise Edition Transcription Edition Price $9.95 monthly rate $4.99.
Communication protocols 2. HTTP Hypertext Transfer Protocol, is the protocol of World Wide Web (www) Client web browser Web server Request files Respond.
Web 2.0: Concepts and Applications 6 Linking Data.
Unit 3 Virtualization.
DATA SECURITY FOR MEDICAL RESEARCH
3.02H Publishing a Website 3.02 Develop webpages..
ZIMBRA DESKTOP USER MANUAL
BEST CLOUD COMPUTING PLATFORM Skype : mukesh.k.bansal.
Amazon Storage- S3 and Glacier
DIRECTOR OF CLOUD SERVICES
Introduction to Soonr by ….
Magento Enterprise Hosting Magento enterprise hosting is an internet space provider which provides website space and other services to make their website.
An Introduction to Collaborative Online Documents
Cloud computing.
An Introduction to Cloud Computing
REDCap and Data Governance
Unit# 5: Internet and Worldwide Web
4.02 Develop web pages using various layouts and technologies.
Internet Protocols IP: Internet Protocol
4.02 Develop web pages using various layouts and technologies.
Using Technology for Cooperative Grouping: Office 365
Data Security Awareness
AWS S3 Cloud Backup Licensing per system Starting at $79 per year.
Electronic Payment Security Technologies
Revision PowerPoint By Nicole Davidson.
To change the image on this slide, select the picture and delete it
Computer Applications Unit B
Practice Management & Patient Health Record sharing system
INTERNET SECURITY.
Presentation transcript:

Privacy in a Public World ISACA North Alabama Chapter March 11, 2008

About WebSafe Secure online storage Platform independent Share files with other WebSafe users Information exchange via WebSafe eliminates issues Features such as MyMedSafe (PHR) provide guidance for consumers

WebSafe Storage Unique encryption key for each account SSL 128 bit encryption during transfer AES 256 bit encryption while stored Reliable data facility backed up with Amazon S-3 service Independent testing of site for known vulnerabilities

Access Methods Browser Based - Windows or Macintosh WebDAV connection - provides a “virtual hard drive” WebSafe tools provide for secure transfer or upload of multiple files WebSafeDirect Open API for application developers

WebSafe “Send” Secure delivery of files into another WebSafe user’s inbox No file size limitation Notification of delivery

WebSafe Trusted Online Storage Convenient Access via Internet Collaborate with Other Qualified Users Secure transfer and sharing of information MyMedSafe Personal Health Record (PHR)

Privacy in a Public World