Author Topic: Data security in clouds  (Read 1198 times)

shajahan

  • Green Belt
  • *****
  • Posts: 341
  • Karma: +0/-0
Data security in clouds
« on: June 08, 2015, 03:42:36 AM »
In the Open Systems Interconnection (OSI) communications model, the Network layer knows the address of the neighboring nodes in the network, packages output with the correct network address information, selects routes and quality of service, and recognizes and forwards to the Transport layer incoming messages for local host domains. Among existing protocol that generally map to the OSI network layer are the Internet Protocol (IP) part of TCP/IP and NetWare IPX/SPX. Both IP Version 4 and IP Version 6 (IPv6) map to the OSI network layer.n
« Last Edit: October 09, 2015, 11:41:22 AM by shajahan »

nidhinpereira

  • Green Belt
  • *****
  • Posts: 261
  • Karma: +0/-0
Re: Data security in clouds
« Reply #1 on: June 10, 2015, 11:42:11 AM »
Here are five data privacy protection tips to help you tackle the issue of cloud privacy:

1. Avoid storing sensitive information in the cloud.

Many recommendations across the 'Net sound like this: "Don't keep your information on the cloud." Fair enough, but it's the same as if you asked, "How not to get my house burned down?" and the answer would be, "Do not have a house." The logic is solid, but a better way to translate such advice is, "avoid storing sensitive information on the cloud." So if you have a choice you should opt for keeping your crucial information away from virtual world or use appropriate solutions.
state of cios
State of the CIO 2015

More than 500 top IT leaders responded to our online survey to help us gauge the state of the
Read Now

2. Read the user agreement to find out how your cloud service storage works.

If you are not sure what cloud storage to choose or if you have any questions as for how that or another cloud service works you can read the user agreement of the service you are planning to sign up for. There is no doubt it's hard and boring but you really need to face those text volumes. The document which traditionally suffers from insufficient attention may contain essential information you are looking for.

3. Be serious about passwords.

You must have heard this warning a hundred times already, but yet most people do not follow it. Did you know that 90 percent of all passwords can be cracked within seconds? Indeed, a great part of all the sad stories about someone's account getting broken is caused by an easy-to-create-and-remember password. Moreover, doubling your email password for other services you use (your Facebook account, your cloud storage account) is a real trap as all your login information and forgotten passwords always arrive to your email.

Here is an efficient method of creating a secure password:

    Choose a random word (preferably a long one) -- for example, "communication."
    Now let's say you are signing up for Gmail. What you should do is add a "Gmail" word to the word you have chosen. Thus your password for Gmail will be "communicationGmail." If you sign up for Skype, your password will be "communicationSkype", for example.

Therefore, you need to remember only your "core" word and the structure of your password. To strengthen it even more you can add a certain number before the name of the service, for example your birth date. In that case your password will look like "communication12111975Skype", etc.

You can invent any other way of memorizing your passwords, the one that appeals to you. But the main point doesn't change - such a method is really simple and effective.

4. Encrypt.

Encryption is, so far, the best way you can protect your data. Generally encryption works as follows: You have a file you want to move to a cloud, you use certain software with which you create a password for that file, you move that password-protected file to the cloud and no one is ever able to see the content of the file not knowing the password.

The most easy and handy way is to zip files and encrypt them with a password. To that end you can use B1 Free Archiver -- a free multiplatform compression tool. When creating the archive check the "Protect with a password" option, type in the password (keeping in mind the no. 3 rule) and only after that you can move it to the cloud. If you want to share it with someone just give the password to that person. Note that B1 Free Archiver zips files only in B1 format which makes the overall protection of your info more reliable.
Popular On CIO.com

    Challenges in IT hiring: Diana Bersohn, Accenture Strategy
    Galaxy S6 features not found on iPhone 6
    Up close with Samsung Galaxy S6 and S6 Edge

The only software that opens B1 files is B1 Free Archiver, therefore you won't be able to open any B1 archive, even one that isn't password-protected, without this utility. B1 encrypted archives appear to be more safe and secure than the usual zip files.

In case you have more time and energy or want to provide an even higher level of protection for your files you can use TrueCrypt encryption software. It's an open source encryption program with which you can create an encrypted file (the so called "virtual disk") and keep all of your private files protected with a password.

TrueCrypt is a bit harder to use than B1 Free Archiver, but it gives you the choice of encryption algorithms (in addition to AES it also offers Serpent, Twofish, etc) some of which deliver a higher level of reliability. But at the same time it also has its drawback as compared to encrypted zip files.

In TrueCrypt you preset a precise volume of your encrypted file from the very beginning so a lot of space may be wasted before you fill it with data. The size of an encrypted zip file depends only on the data volume contained in it.

5. Use an encrypted cloud service.

There are some cloud services that provide local encryption and decryption of your files in addition to storage and backup. It means that the service takes care of both encrypting your files on your own computer and storing them safely on the cloud. Therefore, there is a bigger chance that this time no one -- including service providers or server administrators -- will have access to your files (the so called "zero-knowledge" privacy). Among such services are Spideroak and Wuala.

Spideroak provides 2GB space for full featured backup, sync, share, access and storage for free. However, you'll have to upgrade to Plus Plan for $10/monthly if you need more space. Wuala offers 5GB for free and paid accounts with the price depending on the amount of space you need.
Cloud security

When choosing the best way of protecting your information keep in mind how valuable that information is to you and to what extent it is reasonable to protect it. Therefore, the first thing you should do is to define the level of privacy you need and thus a level of protection for it. If you do not actively use the Internet to work, even a two-step verification involving SMS with a code sent to your mobile phone may seem cumbersome, though most people who use email for sending business data appreciate this option.

siljy.datasoft

  • Green Belt
  • *****
  • Posts: 453
  • Karma: +0/-0
Re: Data security in clouds
« Reply #2 on: June 20, 2015, 12:29:32 AM »
hii

In the Open Systems Interconnection (OSI) communications model, the Network layer knows the address of the neighboring nodes in the network, packages output with the correct network address information, selects routes and quality of service, and recognizes and forwards to the Transport layer incoming messages for local host domains. Among existing protocol that generally map to the OSI network layer are the Internet Protocol (IP) part of TCP/IP and NetWare IPX/SPX. Both IP Version 4 and IP Version 6 (IPv6) map to the OSI network layer

Thankz

shajahan

  • Green Belt
  • *****
  • Posts: 341
  • Karma: +0/-0
Re: Data security in clouds
« Reply #3 on: September 10, 2015, 02:58:36 PM »
In the Open Systems Interconnection (OSI) communications model, the Network layer knows the address of the neighboring nodes in the network, packages output with the correct network address information, selects routes and quality of service, and recognizes and forwards to the Transport layer incoming messages for local host domains. Among existing protocol that generally map to the OSI network layer are the Internet Protocol (IP) part of TCP/IP and NetWare IPX/SPX. Both IP Version 4 and IP Version 6 (IPv6) map to the OSI network layer.

santhoshidatasoft

  • Brown belt
  • ******
  • Posts: 668
  • Karma: +0/-0
Re: Data security in clouds
« Reply #4 on: March 08, 2016, 08:01:14 PM »
In the Open Systems Interconnection (OSI) communications model, the Network layer knows the address of the neighboring nodes in the network, packages output with the correct network address information, selects routes and quality of service, and recognizes and forwards to the Transport layer incoming messages for local host domains. Among existing protocol that generally map to the OSI network layer are the Internet Protocol (IP) part of TCP/IP and NetWare IPX/SPX. Both IP Version 4 and IP Version 6 (IPv6) map to the OSI network layer
Avoid storing sensitive information in the cloud.
Read the user agreement to find out how your cloud service storage works.
Be serious about passwords.
Encrypt.
Use an encrypted cloud service.

siljy.datasoft

  • Green Belt
  • *****
  • Posts: 453
  • Karma: +0/-0
Re: Data security in clouds
« Reply #5 on: March 10, 2016, 02:11:17 AM »
hi


Presenting Enterprise Grade Next Generation Cloud Servers with RAIN Technology!!!

Our continued efforts to offer improved satisfaction to our customers helps us achieve milestones that flag the higher satisfaction levels of our customers. This coordinated endeavor with your consistent support and patronage has also helped us to offer the best in class Server offerings to you. In line with our previous announcements, we are now happy to inform you that all our Cloud and Dedicated servers* are backed with Impressive New generation Enterprise grade SSD (Solid State Drive) that comprises of Redundant Array of Independent NAND (RAIN) .

What Does this mean to you as a Datasoft Customer? - A. Better Performance B. Speed - Quicker Data Processing C. Improved Data Protection and Recovery D. Affordability - Lowest prices ever: 4 core 4 GB Cloud servers @ $8/Mo
Yes!!! You might even Re-consider having an extra layer of redundancy to ensure Data recovery.

Our Innovative approach to offer Enterprise grade Clouds servers at Low price : - Our Cloud and Dedicated servers* are now backed with New generation Enterprise grade Solid state Drives (SSD) that comprises of RAIN technology. RAIN Technology extends a solution to customers that do not require them to create datasets that need redundant safety drives and thus avoid additional data layers. SSDs are more robust than HDD solutions currently in use. SO.... We went ONE STEP AHEAD for our customers by backing our servers with SSDís with RAIN which is that next layer within the SSD that provides our customers the peace of mind to implement solutions with fewer SSDs, yet still have existing HDD RAID protection levels.

So, How do I start ? Can I test a Cloud Server with latest RAIN TECHNOLOGY ? - Simple! Take our 5 day Free Trial* available on our Cloud Servers- We understand that getting an opportunity to try before you use...... is certainly a blessing. We welcome our existing customers who seek to 'Test our servers and Try our other services' for a limited trial period. We are happy to extend 5 Days free trial on all our Server Offerings and Services. (Please note that add-ons and additional configuration options for existing accounts and additional accounts do not qualify for 5 days free Trial Offer)

Wishing you a very productive and worthy work time with our services. Donít hesitate to visit us and chat with our technical support or sales specialist 24*7 via chat line at www.datasoft.ws We are positive you will really make good use of our free trial offer.
thnkz

tasya12

  • White Belt
  • *
  • Posts: 3
  • Karma: +0/-0
Re: Data security in clouds
« Reply #6 on: September 13, 2016, 10:41:44 PM »
This is a good site! come on and join with us!

agen bola , bandar judi bola