Cloud Storage
4 views | +0 today
Follow
Your new post is loading...
Your new post is loading...
Scooped by Noah Grieco
Scoop.it!

DHS Quietly Delivers Hacker Footprints to Industry

DHS Quietly Delivers Hacker Footprints to Industry | Cloud Storage | Scoop.it
A little-known firewall-protected website exchanges sensitive cyber intel between companies and agencies.
more...
Noah Grieco's comment, April 4, 2014 4:52 PM
The Department of Homeland Security set up the Cybersecurity Information Sharing and Collaboration Program. This brings together 70 critical organizations, energy companies and federal departments, to exchange sensitive hack intelligence.
Scooped by Noah Grieco
Scoop.it!

Cybersecurity Overview | Homeland Security

Cybersecurity Overview | Homeland Security | Cloud Storage | Scoop.it
Our daily life, economic vitality, and national security depend on a stable, safe, and resilient cyberspace.
more...
Noah Grieco's comment, April 4, 2014 4:12 PM
We rely on the wide array of networks to communicate and travel, power our homes, and run our economy. Department of Education plays a big role in securing these.
Noah Grieco's comment, April 4, 2014 4:16 PM
One of the ways our government combats Cyber Crime is through a Secret Service Electronic Crimes Task Forces. They focus on identifying and locating international cyber criminals.
Noah Grieco's comment, April 4, 2014 4:23 PM
One of the major way in which the public can protect against malicious content is through their web browser. Securing your web browser is a big deal because of the fact that most spyware is transmitted through them. Without the right security it could lead to spyware being installed all the way up to someone taking control of your computer
Scooped by Noah Grieco
Scoop.it!

Cloud Computing - Protect Your Personal Data in the Cloud | ICO

Cloud Computing - Protect Your Personal Data in the Cloud | ICO | Cloud Storage | Scoop.it
Advice on how to protect your personal data when using cloud computing services to store and share files.
more...
Noah Grieco's comment, March 14, 2014 3:53 PM
It is easy to backup files in cases where your physical storage is ruined (ex: fires, floods, or theft). You will still have your data and will be able to download it onto another physical storage and have it there again if you would like to.
Noah Grieco's comment, March 14, 2014 3:57 PM
The most secure way to use cloud storage is to encrypt your information before it leaves your computer and goes onto the cloud storage. While this is more secure, it also makes it harder to share files as the receiver would also need the encryption key.
Noah Grieco's comment, March 14, 2014 3:59 PM
Cloud storage is growing in popularity so it is harder for companies to give out large amounts of storage to everyone. Some providers have a limit to the data you can upload and others make you pay for an increased amount than the original.
Scooped by Noah Grieco
Scoop.it!

Cyber Security & Crime Prevention for IT, Computer & Data Information

Specialists in Cyber Security, Cyber Crime Crime Prevention, IT & Information Security Auditing & Preparation, & Emergency Data Loss & Corruption Response & Forensic Investigation
more...
Noah Grieco's comment, April 4, 2014 4:44 PM
Information theft led to credit card information, identities, and electronic funds to all be stolen. These crimes could happen to anyone if not properly protected.
Noah Grieco's comment, April 4, 2014 4:46 PM
We are committed to using the Internet for almost all business and social needs. This has the consequence of exposing us to risks of fraud and other forms of malicious use that could steal our confidential information.
Scooped by Noah Grieco
Scoop.it!

What is Cyber Security? | UMUC

What is Cyber Security? | UMUC | Cloud Storage | Scoop.it
Cyber security, or information technology security, protects computers, networks, programs & data from unintended or unauthorized access, change or destruction.
more...
Noah Grieco's comment, April 4, 2014 3:44 PM
There are two types of attacks. There is an active attack, which attempts to alter a system, its resources, its data or its operations, Then there is a passive attack, which attempts to learn or make use of the system without altering it, its resources, or its data.
Noah Grieco's comment, April 4, 2014 3:48 PM
Penetration Testing is method in which accessors try to find vulnerabilities in the security and see where they can bypass it from. It will show the strength of the security and see if they are capable of bypassing it.
Noah Grieco's comment, April 4, 2014 3:51 PM
A virus infects a computer and uses that computer to spread to another computer without the knowledge of the user. Malware can be a type of virus that performs an unauthorized function in the system without the knowledge of the user.
Scooped by Noah Grieco
Scoop.it!

KNOWHOW | What is cloud storage?

KNOWHOW | What is cloud storage? | Cloud Storage | Scoop.it
more...
Noah Grieco's comment, March 14, 2014 3:26 PM
Some might have worries about the security but there are reasons for looking past that. With this storage you can access your data from a computer anywhere in the world. You don't need anymore storage on your home computer so you don't have to worry about external hard drives or usb.
Noah Grieco's comment, March 14, 2014 3:41 PM
The downsides to cloud storage are also relevant when choosing what to use. Depending on how much you want to upload, it could take awhile even if you have a fast internet connection. An internet service provider could charge extra for you using a lot of bandwidth. Also if the provider goes out of business or there is trouble with the modem there is an increased chance of losing your data. The chances of these happening aren't very likely.
Noah Grieco's comment, March 14, 2014 3:46 PM
The overall simplicity for the users is also an advantage. Although the upload methods depends on the provider, they have the same basics. You can also set up encrypted passwords on your data to add extra security to sensitive information.