Blue Skies Thinking for Cloud Security?

As cloud computing moves data and services from local systems to remote centres, the question of security for organisations must be addressed. A research paper published in the International Journal of Services and Standards suggests that a cloud-free security model is the best way forward and will circumvent the fact that cloud service providers are not yet meeting regulations and legal standards.

In the early days of computing, users accessed resources using desktop terminals connected to a mainframe. The personal computer changed all that uniting the input, processing and output devices in a single machine.

Recently, however, the merits of separating the computers on our desks and in our pockets from the processing workhorses has re-emerged especially as broadband and mobile networks have got faster. Today, countless business and individuals access their email and documents on remote web-based systems. Social networking tools, such as MySpace, Facebook, and Twitter maintain data on remote servers accessed through a web browser. Data storage and back up too are often undertaken on remote servers. Continue reading.

Related Posts

Mozilla Debates Whether to Trust Chinese CA Sometimes geeky technical details matter only to engineers. But sometimes a seemingly arcane technical decision exposes deep social or political divis...
A Portable Security Risk More and more employees are bringing personal mobile devices, such as media players, flash drives and smart phones, to work for entertainment, communi...
Soft Spots in Hardened Software Over the past decade, Microsoft, the target of choice for many online attackers, has hardened its operating system, adopting technologies designed to ...
How to Stop Distant Attacks on RFID Chips The limited power and processing ability of RFID chips makes them vulnerable to attackers operating at a distance. A new protocol could tackle this pr...
Scientist Invents a Digital Security Tool Good Enough for the CIA — And for You A British computer hacker equipped with a "Dummies" guide recently tapped into the Pentagon. As hackers get smarter, computers get more powerful and n...
How to manage disk encryption passphrases and key slots Disk encryption is one method you may use to enhance the physical security rating of your computer. From my experience, it is rarely used, which is a ...

We Recommend These Vendors and Free Offers

Launch an SSD VPS in Europe, USA, Asia & Australia on Vultr's KVM-based Cloud platform starting at $5:00/month (15 GB SSD, 768 MB of RAM).

Deploy an SSD Cloud server in 55 seconds on DigitalOcean. Built for developers and starting at $5:00/month (20 GB SSD, 512 MB of RAM).

Want to become an expert ethical hacker and penetration tester? Request your free video training course of Online Penetration Testing and Ethical Hacking

Whether you're new to Linux or are a Linux guru, you can learn a lot more about the Linux kernel by requesting your free ebook of Linux Kernel In A Nutshell.


Leave a Comment

Your email address will not be published. Required fields are marked *

*