ابدأ بالتواصل مع الأشخاص وتبادل معارفك المهنية

أنشئ حسابًا أو سجّل الدخول للانضمام إلى مجتمعك المهني.

متابعة

Is cloud technology is secure for private and public sectors in IT? How can maintain our privacy in cloud?

user-image
تم إضافة السؤال من قبل Mohd Asif Ahmed Asif , Head Incharge , Telangana Star Communication
تاريخ النشر: 2015/06/13
Mohammad Terkawi
من قبل Mohammad Terkawi , Senior Software Quality Assurance Engineer , Lean Business Services

you can maintain our privacy in cloud through?

1. Avoid storing sensitive information in the cloud.

2. Read the user agreement to find out how your cloud service storage works.

3. Be serious about passwords.

4. Encrypt.

5. Use an encrypted cloud service.

Abdelrahman Alhajj
من قبل Abdelrahman Alhajj , Customer Support / Data Entry , Education10x, Remote Work

Cloud Computing isn't always secured. As the stored items in the Cloud Network can be accessed, depends on the reputable of the company and its staff.

 

To make sure the items and data be secured, we should encrypt them. As for more important and critical data and information, we shouldn't put them in a Cloud network. 

Renato Palattao
من قبل Renato Palattao , IT Client Support Specialist , Gulf Business Machines / Client: Kahramaa

To maintain our privacy using cloud technology, a unique encryption must be done. Set limitations that only authorized user is allowed to enter the system. Do not store sensitive information.

مستخدم محذوف‎
من قبل مستخدم محذوف‎

Basm Allah Alrahman Alrahim

 

Cloud Computing Or Cloud Storage ?

What is the different between your company server and cloud server and your home server ?

Which one of them more secure and stronger ?

Which one of them can be hacked easier ?

 

Is it the one at home maintain by you

Or

Is it the one at your company maintain by some

Or

Is it the one at The Cloud maintained by Professionals ( Sorry For small company Administrators and Engineers , I Know that you are very strong , But The ones whom Troubleshoot more are more stronger and of course who deal with millions of troubleshoot and security are stronger )

 

If I were a hacker which one of them I will think to hack first or steal information from ?

 

your home server then small company server .

 

IF I love to be famous and hack Cloud that is sick and not a lot with that famusity Disease , Or some of those think that they are a hackers while they are just play with the wrong persons , nothing called hacking with the cloud companies or any strong company , that called Stupidity, because it so easy in that age to be caught, no one think to hack strong company have a mind , if he got away that not mean he is genius but that mean he eat the cheese

 

Thank you for that interesting question

Francis Xavier
من قبل Francis Xavier , Project Manager IT/ Information Managment , Petrofac International LLC

"IT security is as secure as its Weakest link"

The answer is Yes and No

Securing a Cloud environment involves

end to end encryption

Packet inspection

Application (s) security

authentication

Hardware security

Network Security

Technical capability

And ofcourse People/end user

etc

When we speak of a Private cloud; Has the Private cloud operated invested in the latest technology? is it willing to keep abreast with newer technologies as they are released? Will that translate to Return on investment?

Let us face it although it is Romantic to own and operate a private cloud, very few companies can afford a secured private cloud and have the will to keep it secure.

yet there are weak-links at the User end

 

Cloud computing has given us an edge with multiple advantages so we cannot live without cloud in the current Global scenario

in a shared environment / hosting solutions platform, we will be able to address almost all the difficulties with the help of the industry leaders in their respective fields.

And Yes Cloud computing can be secured if the hosting solutions own the risk and keeps abreast with the changing Global Trends

Sameh Ahmed Elzamley
من قبل Sameh Ahmed Elzamley , مدير المشروع , المصرية الأوروبية

ud MORE LIKE THIS How can you be sure the information you store on the cloud is safe? The short answer is you can't. However, you can take some protective measures. Here are five data privacy protection tips to help you tackle the issue of cloud privacy.

By Victoria Ivey

CIO | Dec16,20137:00 AM PT

  RELATED TOPICS 112COMMENTS

The number of personal cloud users increases every year and is not about to slow down. Back in2012 Gartner predicted the complete shift from offline PC work to mostly on-cloud by2014. And it's happening.

Today, we rarely choose to send a bunch of photos by email, we no longer use USB flash drives to carry docs. The cloud has become a place where everyone meets and exchanges information. Moreover, it has become a place where data is being kept permanently.

private cloud, cloud storage, data in the cloud, data privacy

We trust the cloud more and more. Now even our documents from the bank, ID scans and confidential business papers work find their new residence on the cloud. But can you be sure your information is safe and secure out there?

resume makeover executiveIT Resume Makeover: How to add flavor to a bland resume

Don't count on your 'plain vanilla' resume to get you noticed - your resume needs a personal flavor to

READ NOW

Actually, for the time being you cannot. Data privacy legislation proceeds in a tempo that is unable to keep up with the speed of technology progress. Just take a look on how countries or regions deal with legal issues concerning data privacy on the cloud.

You'll hardly find any universal rules or laws that could be applicable to any user and any cloud service irrespective of geographical boundaries or residence. Today's legislature in the area of information privacy consists of plenty of declarations, proposals and roadmaps most of which are not legally binding.

Cloud Security Issues Span the Globe

Information privacy on the 'Net presents a problem for law makers all over the world. All legislative process stumbles over several issues. First, there's transborder data flow. Some countries are successful in regulating privacy issues of the data stored on the servers within the country, but they usually avoid transborder data flow regulation.

The most popular data storage servers are in the United States, but people who use them come from different countries all over the world, and so does their data. It remains unclear which laws of which country regulate that data privacy while it flows from the sender to the server.

Another problem is defining who, and under which circumstances, can gain legal permission to access data stored on the cloud. Users believe that their information isconfidential and protected from everyone just because it belongs to them and is their property. But they often forget that the space where they store it (namely the Internet) is not actually theirs and it functions by its own rules (or no rules). Therefore, you may still have to give up your data if one day state authorities ask for it.

20 Ways Your IT Team Makes You Look Like a Hero

BrandPost Sponsored by Tenable

20 Ways Your IT Team Makes You Look Like a Hero

One of the disturbing realities of working in IT is that most of your non-IT coworkers don’t know what...

 

But even if the law happens to be applicable to your situation and is on your side you still don't want to spend your time and effort later in the court proving how right you are, do you? So with all that legal uncertainty you simply have no choice but to take control and be responsible for your own data.

Cloud security

Here are five data privacy protection tips to help you tackle the issue of cloud privacy:

1. Avoid storing sensitive information in the cloud.

Many recommendations across the 'Net sound like this: "Don't keep your information on the cloud." Fair enough, but it's the same as if you asked, "How not to get my house burned down?" and the answer would be, "Do not have a house." The logic is solid, but a better way to translate such advice is, "avoid storing sensitive information on the cloud." So if you have a choice you should opt for keeping your crucial information away from virtual world or use appropriate solutions.

2. Read the user agreement to find out how your cloud service storage works.

If you are not sure what cloud storage to choose or if you have any questions as for how that or another cloud service works you can read the user agreement of the service you are planning to sign up for. There is no doubt it's hard and boring but you really need to face those text volumes. The document which traditionally suffers from insufficient attention may contain essential information you are looking for.

3. Be serious about passwords.

RESOURCES  SEE ALL  Go

You must have heard this warning a hundred times already, but yet most people do not follow it. Did you know that 90 percent of all passwords can be cracked within seconds? Indeed, a great part of all the sad stories about someone's account getting broken is caused by an easy-to-create-and-remember password. Moreover, doubling your email password for other services you use (your Facebook account, your cloud storage account) is a real trap as all your login information and forgotten passwords always arrive to your email.

Here is an efficient method of creating a secure password:

Choose a random word (preferably a long one) -- for example, "communication."
  1. Now let's say you are signing up for Gmail. What you should do is add a "Gmail" word to the word you have chosen. Thus your password for Gmail will be "communicationGmail." If you sign up for Skype, your password will be "communicationSkype", for example.

Therefore, you need to remember only your "core" word and the structure of your password. To strengthen it even more you can add a certain number before the name of the service, for example your birth date. In that case your password will look like "communicationSkype", etc.

You can invent any other way of memorizing your passwords, the one that appeals to you. But the main point doesn't change - such a method is really simple and effective.

4. Encrypt.

Encryption is, so far, the best way you can protect your data. Generally encryption works as follows: You have a file you want to move to a cloud, you use certain software with which you create a password for that file, you move that password-protected file to the cloud and no one is ever able to see the content of the file not knowing the password.

The most easy and handy way is to zip files and encrypt them with a password. To that end you can use B1 Free Archiver -- a free multiplatform compression tool. When creating the archive check the "Protect with a password" option, type in the password (keeping in mind the no.3 rule) and only after that you can move it to the cloud. If you want to share it with someone just give the password to that person. Note that B1 Free Archiver zips files only in B1 format which makes the overall protection of your info more reliable.

POPULAR ON CIO.COM

The only software that opens B1 files is B1 Free Archiver, therefore you won't be able to open any B1 archive, even one that isn't password-protected, without this utility. B1 encrypted archives appear to be more safe and secure than the usual zip files.

In case you have more time and energy or want to provide an even higher level of protection for your files you can useTrueCrypt encryption software. It's an open source encryption program with which you can create an encrypted file (the so called "virtual disk") and keep all of your private files protected with a password.

TrueCrypt is a bit harder to use than B1 Free Archiver, but it gives you the choice of encryption algorithms (in addition to AES it also offers Serpent, Twofish, etc) some of which deliver a higher level of reliability. But at the same time it also has its drawback as compared to encrypted zip files.

In TrueCrypt you preset a precise volume of your encrypted file from the very beginning so a lot of space may be wasted before you fill it with data. The size of an encrypted zip file depends only on the data volume contained in it.

5. Use an encrypted cloud service.

There are some cloud services that provide local encryption and decryption of your files in addition to storage and backup. It means that the service takes care of both encrypting your files on your own computer and storing them safely on the cloud. Therefore, there is a bigger chance that this time no one -- including service providers or server administrators -- will have access to your files (the so called "zero-knowledge" privacy). Among such services are Spideroak and Wuala.

Spideroak provides2GB space for full featured backup, sync, share, access and storage for free. However, you'll have to upgrade to Plus Plan for $10/monthly if you need more space. Wuala offers5GB for free and paid accounts with the price depending on the amount of space you need.

Cloud security

When choosing the best way of protecting your information keep in mind how valuable that information is to you and to what extent it is reasonable to protect it. Therefore, the first thing you should do is to define the level of privacy you need and thus a level of protection for it. If you do not actively use the Internet to work, even a two-step verification involving SMS with a code sent to your mobile phone may seem cumbersome, though most people who use email for sending business data appreciate this option.

Not everyone is ready to pay for data to be stored, but if you use cloud storage for keeping corporate data, you'll find paying for safe and secure data storage reasonable. So try to strike that delicate balance between the required level of protection and the time/effort/money spent on it.

Victoria Ivey a tech enthusiast and writer. She has a master's degree in journalism from Columbia University. Follow everything from CIO.com on Twitter @CIOonlineFacebook,Google + and 

محمود إبراهيم
من قبل محمود إبراهيم , IT Administrator - IT Eng , STENG

There are some steps that can be followed in order to be the most important insurance that there must be multiple lines of defense

Yogesh Dhakad
من قبل Yogesh Dhakad , Director Technical , Timeless Horizon Engineering Solutions

a) It is ok to trust a could service provider like Microsoft and Amazon (also prominent others).

b) Encryption at all the levels.

c) Sensitive information could be stored on web-servers that you own.

Ashraf El Gendy PMP®-ITIL®-IRCA®
من قبل Ashraf El Gendy PMP®-ITIL®-IRCA® , IT Manager + Chief Internal Auditor + E-Marketing Manager , Metrotec Egypt (ISO 9001:2015 Certified Company)

Private cloud (on-promise)is a great idea and is as secure as normal on-premise model, while public cloud has its own risks. Risk may be mitigated by having the hosting within the country, otherwise, strict SLAs need to be maintained with the hosting company, and continuous security testing need to take place.

mohammad salman
من قبل mohammad salman , Technical Support Engineer , Public Sector Firm

Hello everyone,

 

Nowadays Technology is driving businesses. Both public sector organisations and private companies are allocating a big chunk of their budgets in IT to run their businesses seamlessly. A few important requirements of any business in terms of Information Technology are:  "Data integrity & security", "High availability" and "Disaster recovery".

 

Cloud architecture is designed to meet the most complex business requirements and above mention aspects are a few of many. In regards to "security", Yes, Cloud computing provides is a very secure environment by implementing very high security standards. One of such standards is the "International cloud privacy standard, ISO8."

 

Amazon Web services (AWS), Microsoft Azure are leading Cloud providers and have scores of both public & private customer base.

 

Cloud technology goes by the caption “Do everything you dox faster/better/cheaper.” So it's high time for businesses to move to "Cloud".

 

Best regards,

Mohammad Salman

Support Engineer

Microsoft, India.

Mathews B
من قبل Mathews B , Retail Data Analyst (IT and Retail Commercial Operation) , City Centre

1. Implement a privacy compliance program that addresses collection and use of    

   personal information in the cloud.

2. Determine the type of data that will be sent to the cloud and how the information

   will be stored by the cloud provider. 

3. Outsourcing data storage can create a risk of misuse or  unauthorized disclosure

    and   therefore an organization may choose  to retain its most confidential  

    information    under its direct control. Ensure that that appropriate consents have

    been obtained to  send personal information to a cloud provider.   An organization

    needs to maintain  “control” over personal information that is sent to the cloud

    provider and prevent  secondary uses of that personal information. If the cloud

    provider will use personal  information for new purposes then  additional

    individual consents may need to be obtained.

4. Review the cloud provider’s contract terms to ensure that personal information

    received by the cloud provider is treated in   a manner consistent with the    

    organization’s obligations under applicable privacy laws.