Download presentation
Presentation is loading. Please wait.
Published byLoreen Bennett Modified over 9 years ago
1
How Secure is your Information? -Brad Murphy
2
An internet cloud is a large server at a separate point in the world where people store their data. Clouds are servers “A way to share and store information on the internet through servers” What is a cloud?
3
Want does a Cloud Look Like? SBS Aurora Picture Credit to: Trishna Sharma, “A Cloud Server Of Microsoft For The Small Guy?”
4
Clouds come with many undesirable risks. You aren’t the only one who has access to your cloud “A lack of privacy and Confidentiality” (David Tenecuya, “Internet Cloud security: The Illusion of Inclusion” Clouds aren’t managed “directly within the company that owns them” What’s at Stake when Using a Cloud?
5
Many hackers use malware to access people’s clouds This diagram shows the process malware takes to hack into cloud files: Malware P.G. Dorey, A. Leite, “Cloud Security: A Security Problem or Solution?”
6
A general way that hackers get into people’s files is “Phishing” Phishing is done by sending out fake emails posing as companies in order to trick the recipient Some emails are obviously fake, others are very convincing Phishing
7
Example of Phishing
8
Phishing can easily be avoided by reading the full email Check the URL at the bottom of the email page Never give your credit card or SS number on an email. Only give that information on a trusted website Take the test at my other laptop! How to Avoid Phishing
9
Companies have grown to an all-time high on terms of productivity Only takes a fraction of the amount of time that it used did in the past to share information company-wide Google Drive allows users to collaborate and all work on a paper at once iCloud enables users to share music and apps with family on the same service Benefits of Cloud Computing
10
Google Drive’s Collaboration As you can see, there are multiple people working on the same paper simultaneously
11
The main way companies secure information is known as Encryption. Encryption is scrambling all the bits of data in a way that makes no sense and only the computer can solve Computers only solve the encryption puzzle when a password is provided CAPTCHAs are used as ways to prevent malware from learning passwords to get past encryption How Companies Secure Your Information
12
A CAPTCHA is a picture of words that are displayed in a way that a computer cannot solve. CAPTCHAs
13
Developers have been constantly working on new ways to improve security Tokenisation Homomorphic Encryption Encryption by spreading data to multiple locations The Future of Clouds All of these ways have not yet found efficient ways of implementation, but may find a way in the near future.
14
Clouds have the potential to be alive for a long time Although the functions of a cloud may change and expand, the over infrastructure of the will more than likely pass the test of time The Future of Clouds
15
Clouds, although unsafe at first look, are in fact very safe Main rule when using clouds: Don’t save important information on a cloud (SSN, Credit Card info) Are Clouds Safe?
16
How Secure is your Information? -Brad Murphy
17
An internet cloud is a large server at a separate point in the world where people store their data. Clouds are servers “A way to share and store information on the internet through servers” What is a cloud?
18
Want does a Cloud Look Like? SBS Aurora Picture Credit to: Trishna Sharma, “A Cloud Server Of Microsoft For The Small Guy?”
19
Clouds come with many undesirable risks. You aren’t the only one who has access to your cloud “A lack of privacy and Confidentiality” (David Tenecuya, “Internet Cloud security: The Illusion of Inclusion” Clouds aren’t managed “directly within the company that owns them” What’s at Stake when Using a Cloud?
20
Many hackers use malware to access people’s clouds This diagram shows the process malware takes to hack into cloud files: Malware P.G. Dorey, A. Leite, “Cloud Security: A Security Problem or Solution?”
21
A general way that hackers get into people’s files is “Phishing” Phishing is done by sending out fake emails posing as companies in order to trick the recipient Some emails are obviously fake, others are very convincing Phishing
22
Example of Phishing
23
Phishing can easily be avoided by reading the full email Check the URL at the bottom of the email page Never give your credit card or SS number on an email. Only give that information on a trusted website Take the test at my other laptop! How to Avoid Phishing
24
Companies have grown to an all-time high on terms of productivity Only takes a fraction of the amount of time that it used did in the past to share information company-wide Google Drive allows users to collaborate and all work on a paper at once iCloud enables users to share music and apps with family on the same service Benefits of Cloud Computing
25
Google Drive’s Collaboration As you can see, there are multiple people working on the same paper simultaneously
26
The main way companies secure information is known as Encryption. Encryption is scrambling all the bits of data in a way that makes no sense and only the computer can solve Computers only solve the encryption puzzle when a password is provided CAPTCHAs are used as ways to prevent malware from learning passwords to get past encryption How Companies Secure Your Information
27
A CAPTCHA is a picture of words that are displayed in a way that a computer cannot solve. CAPTCHAs
28
Developers have been constantly working on new ways to improve security Tokenisation Homomorphic Encryption Encryption by spreading data to multiple locations The Future of Clouds All of these ways have not yet found efficient ways of implementation, but may find a way in the near future.
29
Clouds have the potential to be alive for a long time Although the functions of a cloud may change and expand, the over infrastructure of the will more than likely pass the test of time The Future of Clouds
30
Clouds, although unsafe at first look, are in fact very safe Main rule when using clouds: Don’t save important information on a cloud (SSN, Credit Card info) Are Clouds Safe?
31
How Secure is your Information? -Brad Murphy
32
An internet cloud is a large server at a separate point in the world where people store their data. Clouds are servers “A way to share and store information on the internet through servers” What is a cloud?
33
Want does a Cloud Look Like? SBS Aurora Picture Credit to: Trishna Sharma, “A Cloud Server Of Microsoft For The Small Guy?”
34
Clouds come with many undesirable risks. You aren’t the only one who has access to your cloud “A lack of privacy and Confidentiality” (David Tenecuya, “Internet Cloud security: The Illusion of Inclusion” Clouds aren’t managed “directly within the company that owns them” What’s at Stake when Using a Cloud?
35
Many hackers use malware to access people’s clouds This diagram shows the process malware takes to hack into cloud files: Malware P.G. Dorey, A. Leite, “Cloud Security: A Security Problem or Solution?”
36
A general way that hackers get into people’s files is “Phishing” Phishing is done by sending out fake emails posing as companies in order to trick the recipient Some emails are obviously fake, others are very convincing Phishing
37
Example of Phishing
38
Phishing can easily be avoided by reading the full email Check the URL at the bottom of the email page Never give your credit card or SS number on an email. Only give that information on a trusted website Take the test at my other laptop! How to Avoid Phishing
39
Companies have grown to an all-time high on terms of productivity Only takes a fraction of the amount of time that it used did in the past to share information company-wide Google Drive allows users to collaborate and all work on a paper at once iCloud enables users to share music and apps with family on the same service Benefits of Cloud Computing
40
Google Drive’s Collaboration As you can see, there are multiple people working on the same paper simultaneously
41
The main way companies secure information is known as Encryption. Encryption is scrambling all the bits of data in a way that makes no sense and only the computer can solve Computers only solve the encryption puzzle when a password is provided CAPTCHAs are used as ways to prevent malware from learning passwords to get past encryption How Companies Secure Your Information
42
A CAPTCHA is a picture of words that are displayed in a way that a computer cannot solve. CAPTCHAs
43
Developers have been constantly working on new ways to improve security Tokenisation Homomorphic Encryption Encryption by spreading data to multiple locations The Future of Clouds All of these ways have not yet found efficient ways of implementation, but may find a way in the near future.
44
Clouds have the potential to be alive for a long time Although the functions of a cloud may change and expand, the over infrastructure of the will more than likely pass the test of time The Future of Clouds
45
Clouds, although unsafe at first look, are in fact very safe Main rule when using clouds: Don’t save important information on a cloud (SSN, Credit Card info) Are Clouds Safe?
46
How Secure is your Information? -Brad Murphy
47
An internet cloud is a large server at a separate point in the world where people store their data. Clouds are servers “A way to share and store information on the internet through servers” What is a cloud?
48
Want does a Cloud Look Like? SBS Aurora Picture Credit to: Trishna Sharma, “A Cloud Server Of Microsoft For The Small Guy?”
49
Clouds come with many undesirable risks. You aren’t the only one who has access to your cloud “A lack of privacy and Confidentiality” (David Tenecuya, “Internet Cloud security: The Illusion of Inclusion” Clouds aren’t managed “directly within the company that owns them” What’s at Stake when Using a Cloud?
50
Many hackers use malware to access people’s clouds This diagram shows the process malware takes to hack into cloud files: Malware P.G. Dorey, A. Leite, “Cloud Security: A Security Problem or Solution?”
51
A general way that hackers get into people’s files is “Phishing” Phishing is done by sending out fake emails posing as companies in order to trick the recipient Some emails are obviously fake, others are very convincing Phishing
52
Example of Phishing
53
Phishing can easily be avoided by reading the full email Check the URL at the bottom of the email page Never give your credit card or SS number on an email. Only give that information on a trusted website Take the test at my other laptop! How to Avoid Phishing
54
Companies have grown to an all-time high on terms of productivity Only takes a fraction of the amount of time that it used did in the past to share information company-wide Google Drive allows users to collaborate and all work on a paper at once iCloud enables users to share music and apps with family on the same service Benefits of Cloud Computing
55
Google Drive’s Collaboration As you can see, there are multiple people working on the same paper simultaneously
56
The main way companies secure information is known as Encryption. Encryption is scrambling all the bits of data in a way that makes no sense and only the computer can solve Computers only solve the encryption puzzle when a password is provided CAPTCHAs are used as ways to prevent malware from learning passwords to get past encryption How Companies Secure Your Information
57
A CAPTCHA is a picture of words that are displayed in a way that a computer cannot solve. CAPTCHAs
58
Developers have been constantly working on new ways to improve security Tokenisation Homomorphic Encryption Encryption by spreading data to multiple locations The Future of Clouds All of these ways have not yet found efficient ways of implementation, but may find a way in the near future.
59
Clouds have the potential to be alive for a long time Although the functions of a cloud may change and expand, the over infrastructure of the will more than likely pass the test of time The Future of Clouds
60
Clouds, although unsafe at first look, are in fact very safe Main rule when using clouds: Don’t save important information on a cloud (SSN, Credit Card info) Are Clouds Safe?
61
How Secure is your Information? -Brad Murphy
62
An internet cloud is a large server at a separate point in the world where people store their data. Clouds are servers “A way to share and store information on the internet through servers” What is a cloud?
63
Want does a Cloud Look Like? SBS Aurora Picture Credit to: Trishna Sharma, “A Cloud Server Of Microsoft For The Small Guy?”
64
Clouds come with many undesirable risks. You aren’t the only one who has access to your cloud “A lack of privacy and Confidentiality” (David Tenecuya, “Internet Cloud security: The Illusion of Inclusion” Clouds aren’t managed “directly within the company that owns them” What’s at Stake when Using a Cloud?
65
Many hackers use malware to access people’s clouds This diagram shows the process malware takes to hack into cloud files: Malware P.G. Dorey, A. Leite, “Cloud Security: A Security Problem or Solution?”
66
A general way that hackers get into people’s files is “Phishing” Phishing is done by sending out fake emails posing as companies in order to trick the recipient Some emails are obviously fake, others are very convincing Phishing
67
Example of Phishing
68
Phishing can easily be avoided by reading the full email Check the URL at the bottom of the email page Never give your credit card or SS number on an email. Only give that information on a trusted website Take the test at my other laptop! How to Avoid Phishing
69
Companies have grown to an all-time high on terms of productivity Only takes a fraction of the amount of time that it used did in the past to share information company-wide Google Drive allows users to collaborate and all work on a paper at once iCloud enables users to share music and apps with family on the same service Benefits of Cloud Computing
70
Google Drive’s Collaboration As you can see, there are multiple people working on the same paper simultaneously
71
The main way companies secure information is known as Encryption. Encryption is scrambling all the bits of data in a way that makes no sense and only the computer can solve Computers only solve the encryption puzzle when a password is provided CAPTCHAs are used as ways to prevent malware from learning passwords to get past encryption How Companies Secure Your Information
72
A CAPTCHA is a picture of words that are displayed in a way that a computer cannot solve. CAPTCHAs
73
Developers have been constantly working on new ways to improve security Tokenisation Homomorphic Encryption Encryption by spreading data to multiple locations The Future of Clouds All of these ways have not yet found efficient ways of implementation, but may find a way in the near future.
74
Clouds have the potential to be alive for a long time Although the functions of a cloud may change and expand, the over infrastructure of the will more than likely pass the test of time The Future of Clouds
75
Clouds, although unsafe at first look, are in fact very safe Main rule when using clouds: Don’t save important information on a cloud (SSN, Credit Card info) Are Clouds Safe?
Similar presentations
© 2025 SlidePlayer.com. Inc.
All rights reserved.