Skip to main content

Home/ CSIA 459/ Group items tagged cloud computing

Rss Feed Group items tagged

Gilbert Rivera

EBSCOhost: Storing Information in the Cloud - A Research Project - 0 views

  •  
    Cloud Data Storage: Annotated Bibliography In this research document, the authors provide us with a study of data storage in the cloud. It focuses on the management, operation and security of data stored for long periods of time in the cloud. This item is useful for the fact that it can present several demographics to business regarding cloud computing security, data storage functionality and also cites several business surveys that can assist in organizations to make the decision to migrate to cloud computing services and data storage.
Amy Harding

Embrace the cloud computing revolution - with caution | Comment is free | guardian.co.uk - 1 views

  •  
    For your cloud computing assignment
  •  
    I liked this article very much and understand his concerns. It is very hard to trust something that you can't examine. How do cloud computing agencies validate their systems, with there be a GOP security report that tells us what agencies are legitimate. I have to read that top 10 cloud reporting article to see exactly how that was determined.
Gilbert Rivera

Storing Information in the Cloud - A Research Project - 0 views

  •  
    Cloud Data Storage: Annotated Bibliography In this research document, the authors provide us with a study of data storage in the cloud. It focuses on the management, operation and security of data stored for long periods of time in the cloud. This item is useful for the fact that it can present several demographics to business regarding cloud computing security, data storage functionality and also cites several business surveys that can assist in organizations to make the decision to migrate to cloud computing services and data storage.
Marie Arrington

Cloud Computer Security - 0 views

  •  
    This is great explanation of security threats associated with cloud computing on the 3 available options in cloud computing: Infrastructure, Platform & Application.
James Thomas

Collaboration in Multicloud Computing Environments - 0 views

  •  
    This article describes a new concept in development for cloud computing which involves combining cloud services into a collection of clouds to form what it defines as a multicloud environment called cloud mashups.
Gilbert Rivera

Data Migration from Grid to Cloud Computing - 0 views

  •  
    Cloud Data Storage: Annotated Bibliography In this document the authors shows us the migration that business are taking from handling data from their grid to using cloud data storage services. This document focuses on how to use database libraries with data stored in the cloud. It provides guidance in using tools like SQL, Hadoop and HBase mapping. This item can be useful for business to access their databases from information stored in the cloud and can be very helpful.
Gilbert Rivera

A Journey from floppy disk to cloud storage - 0 views

  •  
    Cloud Data Storage: Annotated Bibliography The author of this article discusses the evolution of data storage from floppy disks to the new cloud data storage. This is a quite informative item which shows us the first data storage hardware and backup stores, and how it evolved through time and also its contribution on the world of networking. It also describes cloud data storage, how it works and the future of cloud computing in networking.
Marie Arrington

Cloud Compliance: Tackling Compliance in the Cloud - 0 views

  •  
    Most organizations already have started to use virtualization technology or cloud computing. Yet some still may be reluctant to move their mission-critical-tier-1 - applications to these relatively new environments. While the flexibility and cost benefits of virtualization are widely accepted, questions linger on how to adapt to new and different risks.
Marie Arrington

Cloud Computing Explained - 0 views

  •  
    This was a simple video that broke down cloud computing to its simplest form. I liked how it explained the billing and information use of the concept.
Amy Harding

Ranking the Top 10 Cloud Startups - CIO.com - 3 views

  •  
    This ranking of cloud start ups could be helpful to you for your research project.
  •  
    Very interesting report. People voted, not technicians, nor security agencies, just people who use the system. It seems a lot like how the personal computer came and the internet was created. Just get it up and running and security will come later. How can that be? A countries banking system just got compromised. No inspection standard to say this cloud solution is safe, just a group of people who say they can access that information when they want and the company saying it is perfectly safe. Little do they know it could also be accessed by others just as quickly - just my opinion, not quite facts yet.
Michael Madrzykowski

2013 Emerging Cyber Threats Report - 2 views

  •  
    Georgia Tech's security summit report
  • ...1 more comment...
  •  
    Nice find and I'm glad you posted this. On the topic of mobile malware, the report states that more smartphones were purchased in 2012 than PC's, and the Internet was accessed more on smartphones than any other device. The article mentions this, and I agree that the mobile malware threat will increase as the android and iOS ecosystems stretch wider and wider. It was also interesting to read about cloud storage, and how authorization will be one of it's major vulnerabilities as it becomes more widely used for business.
  •  
    Great article. Thing like this are very interesting to me. The section on Cloud Computing was by far my favorite. This type of technology is emerging and at the same time it has turned into a challenge for attackers to try to break. Security is going to be very vital for this service to work and more likely will be the subject of any topic related to cloud technology. Cloud service providers need to make a stronger statement and provide some type of assurance to the customer. Thanks!
  •  
    I had actually read this article before, but it was good to read it again. While they are many elements that are concerning I find the "filter bubbles" troubling. A user has the right to know that their search results have been filtered. You think you're conducting an open search, only to read this and find out your results may be limited.
Gilbert Rivera

Privacy Preserving Approaches in Cloud: a Survey - 0 views

  •  
    Cloud Data Storage: Annotated Bibliography As the authors note, this paper analyses and discusses various methods like adopting cryptographic methods, writing access rights and policies, segregating or fragmenting and then reconstructing the data, etc. All these approaches would preserve the privacy of user and data and while performing public auditing on the cloud. This survey is quite useful because it shows information in several security methodologies involving cloud computing and data storage. It provides with several approaches to the auditing of these systems and ensuring that data stored is secured.
glenn_g

Cloud computing in Cyberwarfare - 0 views

  •  
    If you want to know about cloud computing or the Flame virus, you need to read this article
Joseph Deleon

Cloud computing and collaboration - 0 views

  •  
    Takes a different perspective about cloud services and how to incorporate them.
Michael Austin

How a Google Headhunter's E-Mail Unraveled a Massive Net Security Hole | Threat Level |... - 0 views

  •  
    A fun read about a former Google vulnerability. Of note is the "attacker's" use of Amazon Web Services to aid in cracking certificates.
LaToya White

Priorities for Research on Current and Emerging Network Trends - 1 views

  •  
    This study and report was generated by a collaborative group of experts under the European Network and Information Security Agency (ENISA) umbrella. Five areas have been assessed as presenting the biggest need for research within a window of three to five years: cloud computing, real-time detection and diagnosis systems, future wireless networks, sensor networks, and supply chain integrity. This article interested me because as cyber security professionals, it's important to adopt a global mentality when researching technology and security solutions.
  •  
    Good source for all kinds of information. One topic which interested me from this site was privacy in online tracking. I feel this is especially important with social media and societies growing dependence on mobile technologies. Google and Facebook tap into many sources to include your location, cookies, likes, etc...They amount of information they mine is scary sometimes.
1 - 20 of 21 Next ›
Showing 20 items per page