Loud Computing: Download Now: Speech-to-Text Services: AWS vs. Microsoft vs. Google
Loud Computing: Download Now: Speech-to-Text Services: AWS vs. Microsoft vs. Google
Cloud computing is a general term for anything that involves delivering hosted
services over the Internet. These services are broadly divided into three
categories: Infrastructure-as-a-Service (IaaS), Platform-as-a-Service (PaaS)
and Software-as-a-Service (SaaS). The name cloud computing was inspired
by the cloud symbol that's often used to represent the Internet in flowcharts
and diagrams.
Cloud computing boasts several attractive benefits for businesses and end
users. Five of the main benefits of cloud computing are:
Self-service provisioning : End users can spin up compute resources for
almost any type of workload on demand. This eliminates the traditional need
for IT administrators to provision and manage compute resources.
Although cloud computing has changed over time, it has been divided into
three broad service categories: infrastructure as a service (IaaS), platform as a
service (PaaS) and software as a service (SaaS).
Cloud service
categories
Cloud providers are competitive, and they constantly expand their services to
differentiate themselves. This has led public IaaS providers to offer far more
than common compute and storage instances.
With serverless computing, developers simply create code, and the cloud
provider loads and executes that code in response to real-world events, so
users don't have to worry about the server or instance aspect of the cloud
deployment. Users only pay for the number of transactions that the function
executes. AWS Lambda, Google Cloud Functions and Azure Functions are
examples of serverless computing services.
Public cloud computing also lends itself well to big data processing, which
demands enormous compute resources for relatively short durations. Cloud
providers have responded with big data services, including Google BigQuery for
large-scale data warehousing and Microsoft Azure Data Lake Analytics for
processing huge data sets.
Margaret Rouse asks:
ByEric Griffith
May 3, 2016 12:01AM EST Facebook
Lin kedin
Pin terest
Copy
What is the cloud? Where is the cloud? Are we in the cloud now? These are
all questions you've probably heard or even asked yourself. The term "cloud
computing" is everywhere.
In the simplest terms, cloud computing means storing and accessing data and
programs over the Internet instead of your computer's hard drive. The cloud is
just a metaphor for the Internet. It goes back to the days of flowcharts and
presentations that would represent the gigantic server-farm infrastructure of
the Internet as nothing but a puffy, white cumulus cloud , accepting
connections and doling out information as it floats.
What cloud computing is not about is your hard drive. When you store data on
or run programs from the hard drive, that's called local storage and
computing. Everything you need is physically close to you, which means
accessing your data is fast and easy, for that one computer, or others on the
local network. Working off your hard drive is how the computer industry
functioned for decades; some would argue it's still superior to cloud
computing, for reasons I'll explain shortly.
The cloud is also not about having a dedicated network attached storage
(NAS) hardware or server in residence. Storing data on a home or office
network does not count as utilizing the cloud. (However, some NAS will let
you remotely access things over the Internet, and there's at least one brand
from Western Digital named "My Cloud," just to keep things confusing.)
The lines between local computing and cloud computing sometimes get very,
very blurry. That's because the cloud is part of almost everything on our
computers these days. You can easily have a local piece of software (for
instance, Microsoft Office 365 ) that utilizes a form of cloud computing for
storage (Microsoft OneDrive ).
That said, Microsoft also offers a set of Web-based apps, Office Online , that
are Internet-only versions of Word, Excel, PowerPoint, and OneNote
accessed via your Web browser without installing anything. That makes them
a version of cloud computing (Web-based=cloud).
Some other major examples of cloud computing you're probably using:
Google Drive : This is a pure cloud computing service, with all the storage
found online so it can work with the cloud apps: Google Docs, Google Sheets,
and Google Slides. Drive is also available on more than just desktop
computers; you can use it on tablets like the iPad or on smartphones, and
there are separate apps for Docs and Sheets, as well. In fact, most of
Google's services could be considered cloud computing: Gmail, Google
Calendar, Google Maps, and so on.
Apple iCloud : Apple's cloud service is primarily used for online storage,
backup, and synchronization of your mail, contacts, calendar, and more. All
the data you need is available to you on your iOS, Mac OS, or Windows
device (Windows users have to install the iCloud control panel). Naturally,
Apple won't be outdone by rivals: it offers cloud-based versions of its word
processor (Pages), spreadsheet (Numbers), and presentations (Keynote) for
use by any iCloud subscriber. iCloud is also the place iPhone users go to
utilize the Find My iPhone feature that's all important when the handset goes
missing.
Amazon Cloud Drive : Storage at the big retailer is mainly for music,
preferably MP3s that you purchase from Amazon, and images—if you have
Amazon Prime, you get unlimited image storage. Amazon Cloud Drive also
holds anything you buy for the Kindle. It's essentially storage for anything
digital you'd buy from Amazon, baked into all its products and services.
Hybrid services like Box , Dropbox , and SugarSync all say they work in the
cloud because they store a synced version of your files online, but they also
sync those files with local storage. Synchronization is a cornerstone of the
cloud computing experience, even if you do access the file locally.
Cloud Hardware
In a 2013 edition of his feature What if?, xkcd-cartoonist (and former NASA
roboticist) Randall Monroe tried to answer the question of "When—if ever—
will the bandwidth of the Internet surpass that of FedEx?" The question was
posed because no matter how great your broadband connection, it's still
cheaper to send a package of hundreds of gigabytes of data via Fedex's
"sneakernet" of planes and trucks than it is to try and send it over the
Internet. (The answer, Monroe concluded, is the year 2040.)
In part, that comes from the potential for crashes. When there are problems at
a company like Amazon, which provides cloud storage services to big name
companies like Netflix and Pinterest, it can take out all those services ( as
happened in the summer of 2012 ). In 2014, outages afflicted Dropbox, Gmail,
Basecamp, Adobe, Evernote, iCloud, and Microsoft; in 2015 the outtages hit
Apple, Verizon, Microsoft, AOL, Level 3, and Google. Microsoft had another
this year. The problems typically last for just hours.
Wozniak was concerned more about the intellectual property issues. Who
owns the data you store online? Is it you or the company storing it? Consider
how many times there's been widespread controversy over the changing
terms of service for companies like Facebook and Instagram —which are
definitely cloud services—regarding what they get to do with your photos.
There's also a difference between data you upload, and data you create in the
cloud itself—a provider could have a strong claim on the latter. Ownership is
a relevant factor to be concerned about.
After all, there's no central body governing use of the cloud for storage and
services. The Institute of Electrical and Electronics Engineers (IEEE) is trying.
It created an IEEE Cloud Computing Initiative in 2011 to establish standards
for use, especially for the business sector. The Supreme Court ruling against
Aereo could have told us a lot about copyright of files in the cloud... but the
court side-stepped the issue to keep cloud computing status quo.
Cloud computing—like so much about the Internet—is a little bit like the Wild
West, where the rules are made up as you go, and you hope for the best.
For more, check out our roundups of the Business Choice Awards for Cloud
Computing Services and the Cloud Storage area of the PCMag Business
Software Index .
INFORMATION SECURITY
Introduction
A principle which is a core requirement of information security for the safe utilization, flow, and
storage of information is the CIA triad. CIA stands for confidentiality, integrity, and availability and
these are the three main objectives of information security. For a deeper look into these objectives,
check out out our security training classes.
Below is an illustration of the CIA triad along with the four layers of information security. These four
layers represent the way systems communicate and how information flows among systems. Тhe
concept of layers illustrates that data communications and computer network protocols are
designated to function in a layered manner, transferring the data from one layer to the next.
The Application Access Layer describes the notion that access to end-user applications have to be
constrained to business ought-to-know
The Infrastructure Access Layer describes the notion that access to infrastructure components has
to be constrained to business ought-to-know. For instance, access to servers.
The Physical Access Layer describes the notion that the physical access to any system, server,
computer, data center, or another physical object storing confidential information has to be
constrained to business ought-to-know.
The Data In Motion Layer describes the notion that data ought to be secured while in motion.
This little icon in the middle of the illustration shows the center of information security and the
reason for the emergence of the CIA principles; the icon represents information and represents the
need to protect sensitive information.
Confidentiality
The aim of confidentiality is to ensure that information is hidden from people unauthorized to access
it. The confidentiality principle dictates that information should solely be viewed by people with
appropriate and correct privileges. The science (and art) used to ensure data confidentiality is
cryptography, which involves encryption and decryption methods.
Cryptography
Cryptography’s beginning can be traced thousands of years ago. However, the contemporary
cryptography differs substantially from the classic one, which used pen and paper for encryption and
which was far less complex. The establishment of the Enigma rotor machine and the subsequent
emergence of electronics and computing enabled the usage of much more elaborate schemes and
allowed confidentiality to be protected much more effectively.
Encryption consists of changing the data located in files into unreadable bits of characters unless a
key to decode the file is provided.
Symmetric encryption occurs by utilizing character substitution with a key that will be the only means
of decrypting the bits of information. Conversely, asymmetric encryption is used when there are two
keys, a public key, and a private key. Any person may encrypt the information with the public key but
it can only be decrypted by the holder of the private key.
1. Encryption
If you encrypt your data, it will be unreadable for any third-party which may get hold of it. You can
encrypt your hard drive using Microsoft’s BitLocker software if you are using the Ultimate or
Enterprise version of Windows 7 or Vista or Enterprise/Pro version of Windows 8. To do so, you only
have to enable BitLocker in Control Panel > System and Security > BitLocker Drive. Alternatively,
you can use TrueCrypt or DiskCryptor (free of charge). You can also encrypt any external and USB
drive.
2. Two-factor authentication
Requiring two-factor authentication increases the safety of the confidential data and decreases the
probability of data leakage. Two-factor authentication enables you to access the information only if
you have both a physical object (like a card) and an immaterial* one (like a security code). Thus,
two-factor authentication means that there must be a thing that you know* and a thing that you
possess in order to gain access.
*It is presumed that you know the code as most companies require you to memorize the security
code as if you keep it written down it may be stolen. To add, the security code or password should
be a mixture of lowercase and uppercase letters, numbers, and symbols and be at least 10
characters long, preferably 12 or more.
Note that the average overall cost per business that reported a data breach in 2011 was 5.5 million
dollars. Thus, not only confidentiality has a central role in avoiding data breaches but it can also
save your company millions of dollars.
Drafting a successful confidentiality agreement that would effectively protect confidential data.
Business contracts often have confidential information clause(s), which is (are) inserted to protect
information they deem proprietary and sensitive from disclosure to unauthorized third parties. These
clauses usually state what is deemed as confidential information and what is not deemed as such.
Typically, the confidentiality provisions that enumerate what the parties consider confidential are
highly variable depending on the parties’ type of business whereas there is, to some extent, a
common stand on what is defined as non-confidential information.
A standard clause extracted from a non-disclosure agreement of Microsoft goes like this:
“‘Confidential Information’ means nonpublic information that Microsoft designates as being confidential or
which, under the circumstances surrounding disclosure ought to be treated as confidential by Recipient”. It is
worth mentioning that it is much more desirable to enlist the types of information that are to be considered
confidential and, in this way, create a narrow and unambiguous clause. Mary Hanson, a California business
lawyer, asserts that “Trying to cover too much information by defining the confidential information as ‘all
business information’ may backfire. It is important to try to identify particular information, without giving out
valuable information.” Accordingly, the confidential information involved in the agreement must be defined to
the extent which makes it enforceable in court without any particular sensitive information being disclosed in
it.
The definition of confidential information can be narrowed down to (1) marked information, (2) written
information, (3) information disclosed during a particular period of time and (4) particular categories of
information.
However, a breach of confidentiality can occur even without a signed confidentiality provision or agreement.
In the US, employees or other parties to a business contract are required to keep confidential any secret
information disclosed to them by the other party and breaches of confidentiality may be sanctioned in courts.
The courts will ask the following questions, which if answered affirmatively will result into a reimbursement
of the injured party:
Whether the information was disclosed in circumstances which show that it was confidential
It has to be noted that although the law implies a duty of confidentiality – its scope, nature, and obligations are
indeterminate and subject to judicial determination.
Statistics and discussion as regards to data breaches (failures to attain the objectives of information security
and complying with the CIA principles).
Frequent manners of leakage of confidential data are enumerated below to understand what
problems may occur when handling such information:
Concerning insider intellectual property thefts, statistics show that it is usually done by men who
serve in various positions such as scientists, managers, programmers within a month of leaving
the company from which they steal. Often they have created their own business or have started
working for another, only 20% steal the information as a consequence of recruitment by an
outsider that wants the information. 75% of the perpetrators stole material to which they were
granted access in the course of employment and trade secrets were unlawfully taken in 52% of
the thefts. Furthermore, most insider thieves of intellectual property were caught by non-
technical staff members.
It can be concluded that data breaches are a frequently occurring phenomena, and that not only
CISOs’ and other personnel in charge of information security ought to undertake measures to
attain the objectives of InfoSec but also that non-technical staff in companies shall be aware of
the risks and educated in maintaining the CIA principles in the course of their employment. This
is so as most criminals or cyber-criminals perform their attack because they see an easy prey in
their targets as their security is loose. Staff from all levels of the organization’s hierarchy shall
take measures to prevent theft, loss and take reasonable measures to protect the confidential
information they have been granted access to for the fulfillment of their duties.
Conclusion
It can be concluded from the discussion above that the fulfillment of the CIA principles and the compliance
with the goal of information security is not a goal with a clear end but an open goal that continually changes
with time and the development of technology, the means of information security and the emergence of new
threats and vulnerabilities. Lasting efforts must be exerted to maintain the confidentiality, integrity and
availability of information, it is not possible to take some precautions and declare that the CIA triad is fulfilled
and that nothing more should be done.
Moreover, it can be deduced from the discussion that efforts ought to be exerted not only by information
security professionals, but by employees and all holders of confidential information to safeguard the CIA
principles.
In a nutshell, the discussion above affirms the centrality and the “objectives” status of the CIA principles in
information security
References
PC World, ‘How to encrypt (almost) anything’. Available
at: http://www.pcworld.com/article/2025462/how-to-encrypt-almost-anything.html
Ricky M. Magalhaes, ‘Data Leakage, preserving confidentiality’. Available
at: http://www.windowsecurity.com/articles-tutorials/content_security/Data-Leakage-preserving-
confidentiality.html
Surveillance Self-Defense, ‘Instant Messaging (IM)’. Available at: https://ssd.eff.org/tech/im#im-
encryption
In Defense of Data, ‘Data Breach Trends & Stats’. Available at: http://www.indefenseofdata.com/data-
breach-trends-stats/
U.S. Department of Health & Human Services, ‘Breaches Affecting 500 or More Individuals’.
Available at: http://www.hhs.gov/ocr/privacy/hipaa/administrative/breachnotificationrule/breachtool.html
Margaret Rouse, ‘two-factor authentication’. Available
at: http://searchsecurity.techtarget.com/definition/two-factor-authentication
Wikipedia, ‘Information security’. Available at: http://en.wikipedia.org/wiki/Information_security
ContractStandards, ‘Confidential information’. Available at: http://www.contractstandards.com/contract-
structure/remedies/covenants/confidential-information
Torys LLP, ‘THE PROTECTION OF CONFIDENTIAL INFORMATION’. Available
at: http://www.torys.com/publications/documents/publication%20pdfs/artech-3t.pdf
George Garza, ‘Top 5 Layers of Information Security’. Available
at: http://www.brighthub.com/computing/enterprise-security/articles/86838.aspx
Duston Sackett, ‘The InfoSec Layer Methodology’. Available
at: http://www.theiia.org/intAuditor/itaudit/2009-articles/the-infosec-layer-methodology/
Vangie Beal, ‘The Differences and Features of Hardware and Software Firewalls’. Available
at: http://www.webopedia.com/DidYouKnow/Hardware_Software/2004/firewall_types.asp
Kioskea, ‘Firewall’. Available at: http://en.kioskea.net/contents/603-firewall
Intuit. QuickBase, ‘Information Security: A Closer Look’. Available
at: http://quickbase.intuit.com/articles/information-security-a-c loser-look
Wikipedia, ‘Encryption’. Available at: http://en.wikipedia.org/wiki/Encryption
Claudio LoCicero, ‘Confidentiality, Integrity, Availability and What it Means to You’. Available
at: http://searchwarp.com/swa268042.htm
Share