In recent years, digital data storage has reached new heights through the introduction of "cloud" computing.
With this method, information is stored on various, inter-connected servers where it can be accessed via Internet.
The "cloud" is a symbol for the Internet, typically used in computer network diagrams, that represents the vast online infrastructure.
Cloud computing suggests a secure and easily accessible mode of data storage; however, there is reason to doubt the service.
Unlike flash drives safely guarded with USB encryption, cloud computing is intangible: users must rely on cloud computing service providers, external computer servers, and Internet capacity.
As cloud computing is quickly gaining prominence, it is important to fully understand the technology and its risks.
A recent password malfunction at Dropbox, a cloud storage site, emphasizes potential cloud computing hazards.
Three major dangers associated with cloud computing include: privacy, undefined data location, and reliance on Internet connection.
Absolutely no software or personal storage devices are required with cloud computing.
Individuals can access their cloud-stored data with any type of Internet based device, such as computers, netbooks, and smartphones.
Cloud computing is essentially as simple as registering with a cloud computing service, acquiring a password to an individual cloud account, and adding data to the cloud.
Unfortunately, its simplicity is also its weakness.
Privacy is the first major risk of cloud computing.
A significant amount of trust is placed into the cloud and those who operate it.
Since users are only left with a password and a promise of security, the rest is up in the air, literally.
Data bounces between multiple servers operated by cloud service providers who have access to customer information, encryption keys, and stored data.
This system makes privacy and the second major risk, data location, key points of concern.
Cloud providers store user data on numerous servers located around the world.
The exact storage location for data is not revealed to customers.
Location and security go hand in hand; not knowing where data is stored creates uncertainty about data security.
Lastly, cloud-stored data is only accessible through the Internet.
If the Internet were to fail for any reason, data would be completely unobtainable.
This is where personal drives serve as a more secure option: if data is stored on an encrypted drive, factors such as privacy, data location, and Internet malfunction will never hinder data retrieval.
With so many risks in the cloud equation, data is somewhat vulnerable to invasion.
During the week of June 20, 2011, a flaw in the system at Dropbox left the stored data of millions of clients completely exposed.
The system error enabled site visitors to access user accounts with any password, leaving each account completely open to attack.
Dropbox provides its customers with specific passwords to their accounts instead of using difficult encryption keys.
This may be easier for users; however, it exacerbates the level of liability.
In order for data to be securely stored within the cloud, Dropbox possesses all of the encryption keys.
Data is encrypted and protected by Dropbox, but customers lack complete control of their own information.
Cloud computing is a great tool for accessing data anywhere and anytime, provided that Internet connection is available.
However, relying completely on the "cloud" for storing information and data backups is not entirely dependable: control is not solely in the hands of the user.
When it comes to securing important information, questionability and doubt should not be associated factors.
Storing data on a personal drive that utilizes USB encryption, such as the LOK-IT Secure Flash Drive®, erases all unlikelihood.
Encrypted flash drives offer security and the assurance that data will always be in the hands of the individual, and not drifting through cyberspace.
With this method, information is stored on various, inter-connected servers where it can be accessed via Internet.
The "cloud" is a symbol for the Internet, typically used in computer network diagrams, that represents the vast online infrastructure.
Cloud computing suggests a secure and easily accessible mode of data storage; however, there is reason to doubt the service.
Unlike flash drives safely guarded with USB encryption, cloud computing is intangible: users must rely on cloud computing service providers, external computer servers, and Internet capacity.
As cloud computing is quickly gaining prominence, it is important to fully understand the technology and its risks.
A recent password malfunction at Dropbox, a cloud storage site, emphasizes potential cloud computing hazards.
Three major dangers associated with cloud computing include: privacy, undefined data location, and reliance on Internet connection.
Absolutely no software or personal storage devices are required with cloud computing.
Individuals can access their cloud-stored data with any type of Internet based device, such as computers, netbooks, and smartphones.
Cloud computing is essentially as simple as registering with a cloud computing service, acquiring a password to an individual cloud account, and adding data to the cloud.
Unfortunately, its simplicity is also its weakness.
Privacy is the first major risk of cloud computing.
A significant amount of trust is placed into the cloud and those who operate it.
Since users are only left with a password and a promise of security, the rest is up in the air, literally.
Data bounces between multiple servers operated by cloud service providers who have access to customer information, encryption keys, and stored data.
This system makes privacy and the second major risk, data location, key points of concern.
Cloud providers store user data on numerous servers located around the world.
The exact storage location for data is not revealed to customers.
Location and security go hand in hand; not knowing where data is stored creates uncertainty about data security.
Lastly, cloud-stored data is only accessible through the Internet.
If the Internet were to fail for any reason, data would be completely unobtainable.
This is where personal drives serve as a more secure option: if data is stored on an encrypted drive, factors such as privacy, data location, and Internet malfunction will never hinder data retrieval.
With so many risks in the cloud equation, data is somewhat vulnerable to invasion.
During the week of June 20, 2011, a flaw in the system at Dropbox left the stored data of millions of clients completely exposed.
The system error enabled site visitors to access user accounts with any password, leaving each account completely open to attack.
Dropbox provides its customers with specific passwords to their accounts instead of using difficult encryption keys.
This may be easier for users; however, it exacerbates the level of liability.
In order for data to be securely stored within the cloud, Dropbox possesses all of the encryption keys.
Data is encrypted and protected by Dropbox, but customers lack complete control of their own information.
Cloud computing is a great tool for accessing data anywhere and anytime, provided that Internet connection is available.
However, relying completely on the "cloud" for storing information and data backups is not entirely dependable: control is not solely in the hands of the user.
When it comes to securing important information, questionability and doubt should not be associated factors.
Storing data on a personal drive that utilizes USB encryption, such as the LOK-IT Secure Flash Drive®, erases all unlikelihood.
Encrypted flash drives offer security and the assurance that data will always be in the hands of the individual, and not drifting through cyberspace.
SHARE