Download presentation
Presentation is loading. Please wait.
Published bySusanna Preston Modified over 8 years ago
1
Data Security and the Internet Xiaohui Zhang University of the Fraser Valley
2
Importance O Data security branch O Protection of privacy O Examples
3
Overview of technologies O Firewalls O Sub-computations O Cloud storage
4
Reference O Anthes, G. (2010). Security in the Cloud.. Communications of the ACM, 53(11), p16-18. Retrieved March 11, 2013, from the Business Source Complete database. O Arellano, N. (2013). 50 million Evernote passwords hacked - Page 1 - Security. IT World Canada Information Technology news on products, services and issues for CIOs, IT managers and network admins. Retrieved March 13, 2013, from http://www.itworldcanada.com/news/50-million-evernote-passwords-hacked/146819 O Boyle, L. (2013). Celebrities hacked: Kim Kardashian and Beyoncé among 13 celebrity victims of hacker | Mail Online. Home | Mail Online. Retrieved March 13, 2013, from http://www.dailymail.co.uk/news/article-2291892/Celebrities- hacked-Kim-Kardashian-Beyonc-13-celebrity-victims-hacker.html O Chenoweth, T., Minch, R., & Tabor, S. (2010). Wireless Insecurity: Examining User Security Behavior on Public Networks. Communications of the ACM, 53(2), p134-138. Retrieved February 27, 2013, from the Business Source Complete database. O Greenemeier, L. (2008). International Report: What Impact Is Technology Having on Privacy around the World?: Scientific American. Science News, Articles and Information | Scientific American. Retrieved March 11, 2013, from http://www.scientificamerican.com/article.cfm?id=international-report-technology O Greenemeier, L. (2011). From Dot.Coms to Cloud Computing: What's Old Is New Again: Scientific American. Science News, Articles and Information | Scientific American. Retrieved March 11, 2013, from http://www.scientificamerican.com/article.cfm?id=dot-com-cloud-computing O Hall, C. (2012). privacy and security security of the Internet and the Known Unknowns. Communications of the ACM, 55(6), p35-37. Retrieved February 27, 2013, from the Business Source Complete database. O How Cloud Computing is Forcing Us to Rethink Data Security. (2011). http://www.youtube.com. Retrieved March 11, 2013, from Youtube:How Cloud Computing is Forchttp://www.youtube.com/watch?v=8o85_Uyg-FQ O Hussain, I. (2012). A Study to Evaluate the Social Media Trends among University Students. Social and Behavioral Sciences, 64, p639–645. Retrieved March 11, 2013, from the ScienceDirect database. O Jones, C. (2013, February 2). Twitter says 250,000 accounts have been hacked in security breach | Technology | guardian.co.uk. Latest US news, world news, sport and comment from the Guardian | guardiannews.com | The Guardian. Retrieved March 13, 2013, from http://www.guardian.co.uk/technology/2013/feb/02/twitter-hacked-accounts-reset- security O Kam, R. (2013). 5 steps to managing data security risks in the cloud | Government Health IT. Government Health IT. Retrieved March 13, 2013, from http://www.govhealthit.com/news/5-steps-managing-data-security-risks-cloud O Nawrocki, T. (2011). Data Security in a Tech-Crazed World. Journal of Financial Planning, 24(7), p20-25. Retrieved February 27, 2013, from the Business Source Complete database. O Room, S. (2013). The only way is tough – the future of data protection law. ComputerWeekly.com | Information Technology (IT) News, UK IT Jobs, Industry News. Retrieved March 13, 2013, from http://www.computerweekly.com/opinion/The-only-way-is-tough-the-future-of-data-protection-law O Sahare, S., Joshi, M., & Gehlot, M. (2012). A Survey paper: Data Security in Local Networks Using Distributed Firewalls. Computer Science & Engineering, 4(9), p.1617-1622. Retrieved February 27, 2013, from the Academic Search Premier database. O Savage, N. (2013). Stopping the Leaks. Communications of the ACM, 56(1), p19-21. Retrieved February 27, 2013, from the Business Source Complete database.
Similar presentations
© 2025 SlidePlayer.com. Inc.
All rights reserved.