how safe is your data? cloud computing a research paper by: adam shump

14
How Safe is your Data? Cloud Computing A Research Paper By: Adam Shump

Upload: jewel-shepherd

Post on 12-Jan-2016

216 views

Category:

Documents


0 download

TRANSCRIPT

Orange Earth

How Safe is your Data?Cloud ComputingA Research Paper By: Adam Shump

It is all about you, youre SAVINGS, youre DATA, youre LIFE. It can all be gone in a keystrokeNine out of ten organizations are very or moderately concerned about public cloud security issues Skimming is more prevalent than either physical or electronic breachesBoth businesses and consumers are hurt by breachesCloud security is the number one concern for cloud adoptionI propose the provider be held accountable regardless of criminal activities and stiffer penalties be evoked

ECPI CAP480Instructor: Elizabeth McCarthy ConjecturesWhat this paper covers,What is Cloud ComputingWhat is a Cloud ProviderWhat is a Data BreachStatistics of stolen informationWhat is this Internet of ThingsWho is at riskAre present penalties enoughProposed sulutionArts And Science Capstone

What is a Cloud Computing?

The cloud is just a metaphor for the InternetStores your data on the internetYour personal equipment is not the cloudYour information is available anywhere your onlineGenerated $100 billion in 2012There's no central body governing use of the cloud

Cloud ProvidersWhat is a providerInfrastructure as a Service (IaaS): servers, storage and computers

Software as a Service (SaaS): Delivery of software through the Internet

Platform as a Service (PaaS): A combination of IaaS and SaaS delivered as a unified service

("What is cloud provider? - Definition from WhatIs.com," n.d.)

Cloud Providers

Distil NetworksCloudSIgmaEngine YardWindows AzureWork ExpressLunacloudAmazon Web ServiceRockspaceDimensionQT Cloud Service

This is the top 10 by Popularity("Best Cloud Computing Providers Comparison," n.d.)

Saving DataWays Data is BreachedComputer files are hacked.

Point-of-sale system hacked exposing customers' information.

Back-up tape with account data has been lost.

A n employee has sold the records to criminals.

Large data broker members selling comprehensive consumer profiles.

Stolen laptop contains account data of thousands of customers.

("10 Critical Steps to Take After a Data Security Breach - Heimdal Security Blog," n.d.)

According to Perpecsys.com, the implications for public cloud adoption in 2015 and beyond could be grim.(Click on Screen for more information)2014 Breaches Impact on 2015 Cloud Adoption

("2014 Data Breaches: Impacts on 2015 Cloud Adoption - Perspecsys," n.d.)

(Gemalto, 2015, p.xx)

21014 Data Breaches by InstitutionThe internet of ThingsAnything that can be connected, will be connected.

Your Home appliancesYour carThe planes in the airThe boats on the waterYour ID (RFID Chips)Your Credit cards

("What is the internet of things? | Technology | The Guardian," n.d.)

Samsung Smart TV Privacy Policy

("error | Samsung SG," n.d.)SamSung is actually warning people that the possibility is there that some one can hack your Smart TV and can see and hear youSO, who is at Risk?Companies large and small

Students

The child on dialysis

The homeowner with their new appliances

All of us, and the risk multiplies every day

I can see you, but could you talk a little louder???

Are present Penalties Enough?What are they Exactly?

What laws protect users from crime in the cloud?

The Electronic Communications Privacy Act

The Fourth Amendment

The Foreign Intelligence Surveillance Act

See for yourself, follow the link below

CLOUD COMPUTING & NATIONAL SECURITY LAW

Taken from http://www.scvheritagedefense.org/not-so-blind-justice-what-is-a-hate-crime/Make the Provider Responsible

Impose Stiffer Fines on the Provider

Make the Provider Liable in Civil CourtGet involved, let Washington know we want protectionProposed Solutions"Find Your Representative"Its your information, keep it safe

References2014 Data Breaches: Impacts on 2015 Cloud Adoption - Perspecsys. (n.d.). Retrieved from http://perspecsys.com/2014-data-breaches-cloud/

Best Cloud Computing Providers Comparison. (n.d.). Retrieved from http://cloud-computing.softwareinsider.com/

Cloud Computing: A cluster of complex liability issues | Weber | European Journal of Current Legal Issues. (n.d.). Retrieved from http://webjcli.org/article/view/303/418

Cloud Computing: Legal and Regulatory Issues | TechNet. (n.d.). Retrieved from https://technet.microsoft.com/en-us/magazine/hh994647.aspx

Data Breaches in the Cloud: Who's Responsible?. (n.d.). Retrieved from http://www.govtech.com/security/Data-Breaches-in-the-Cloud-Whos-Responsible.html

error | Samsung SG. (n.d.). Retrieved from http://www.samsung.com/sg/info/privacy/smarttv.htmlwww.samsung.com/sg/info/privacy/smarttv.html

Gemalto. (2015). 2014 Year of Mega Breaches & Identity Theft. Breach Level Index, 01-016. Retrieved from http://breachlevelindex.com/#sthash.olkxJiu1.dpbs

Stanfield, A. (2014). Legal Implications of Cloud Computing. E.Law International, 01-30. Retrieved from (02) 8114 1717

The 10 Critical Steps to Take After a Data Security Breach - Heimdal Security Blog. (n.d.). Retrieved from https://heimdalsecurity.com/blog/critical-10-steps-data-security-breach/What is cloud provider? - Definition from WhatIs.com. (n.d.). Retrieved from http://searchcloudprovider.techtarget.com/definition/cloud-provider

What Is Cloud Computing? | PCMag.com. (n.d.). Retrieved from http://www.pcmag.com/article2/0,2817,2372163,00.asp

What is the internet of things? | Technology | The Guardian. (n.d.). Retrieved from http://www.theguardian.com/technology/2015/may/06/what-is-the-internet-of-things-google

The End