Technology Computer & Networking security

3 Major Risks of Cloud Computing: Does USB Encryption Offer More Security?

In recent years, digital data storage has reached new heights through the introduction of "cloud" computing.
With this method, information is stored on various, inter-connected servers where it can be accessed via Internet.
The "cloud" is a symbol for the Internet, typically used in computer network diagrams, that represents the vast online infrastructure.
Cloud computing suggests a secure and easily accessible mode of data storage; however, there is reason to doubt the service.
Unlike flash drives safely guarded with USB encryption, cloud computing is intangible: users must rely on cloud computing service providers, external computer servers, and Internet capacity.
As cloud computing is quickly gaining prominence, it is important to fully understand the technology and its risks.
A recent password malfunction at Dropbox, a cloud storage site, emphasizes potential cloud computing hazards.
Three major dangers associated with cloud computing include: privacy, undefined data location, and reliance on Internet connection.
Absolutely no software or personal storage devices are required with cloud computing.
Individuals can access their cloud-stored data with any type of Internet based device, such as computers, netbooks, and smartphones.
Cloud computing is essentially as simple as registering with a cloud computing service, acquiring a password to an individual cloud account, and adding data to the cloud.
Unfortunately, its simplicity is also its weakness.
Privacy is the first major risk of cloud computing.
A significant amount of trust is placed into the cloud and those who operate it.
Since users are only left with a password and a promise of security, the rest is up in the air, literally.
Data bounces between multiple servers operated by cloud service providers who have access to customer information, encryption keys, and stored data.
This system makes privacy and the second major risk, data location, key points of concern.
Cloud providers store user data on numerous servers located around the world.
The exact storage location for data is not revealed to customers.
Location and security go hand in hand; not knowing where data is stored creates uncertainty about data security.
Lastly, cloud-stored data is only accessible through the Internet.
If the Internet were to fail for any reason, data would be completely unobtainable.
This is where personal drives serve as a more secure option: if data is stored on an encrypted drive, factors such as privacy, data location, and Internet malfunction will never hinder data retrieval.
With so many risks in the cloud equation, data is somewhat vulnerable to invasion.
During the week of June 20, 2011, a flaw in the system at Dropbox left the stored data of millions of clients completely exposed.
The system error enabled site visitors to access user accounts with any password, leaving each account completely open to attack.
Dropbox provides its customers with specific passwords to their accounts instead of using difficult encryption keys.
This may be easier for users; however, it exacerbates the level of liability.
In order for data to be securely stored within the cloud, Dropbox possesses all of the encryption keys.
Data is encrypted and protected by Dropbox, but customers lack complete control of their own information.
Cloud computing is a great tool for accessing data anywhere and anytime, provided that Internet connection is available.
However, relying completely on the "cloud" for storing information and data backups is not entirely dependable: control is not solely in the hands of the user.
When it comes to securing important information, questionability and doubt should not be associated factors.
Storing data on a personal drive that utilizes USB encryption, such as the LOK-IT Secure Flash Drive®, erases all unlikelihood.
Encrypted flash drives offer security and the assurance that data will always be in the hands of the individual, and not drifting through cyberspace.
SHARE
RELATED POSTS on "Technology"
Home Security Systems: Which One Should I Get For My Family
Home Security Systems: Which One Should I Get For My Family
How to Protect Yourself From Fake Antivirus Programs and Other Scamware/Scareware
How to Protect Yourself From Fake Antivirus Programs and Other Scamware/Scareware
Another Facebook Spam E-mail Again?
Another Facebook Spam E-mail Again?
Using Free Anti Adware and Spyware - Tips To Keep Your PC Safe
Using Free Anti Adware and Spyware - Tips To Keep Your PC Safe
Is Online Data Backup Part of Your Disaster Recovery Plan?
Is Online Data Backup Part of Your Disaster Recovery Plan?
How To Recover Deleted Emails From Outlook?
How To Recover Deleted Emails From Outlook?
AVGRsstx DLL Error Fix
AVGRsstx DLL Error Fix
Virtualized datacenter: Greatly in demand!
Virtualized datacenter: Greatly in demand!
Cybercrime In the Workplace
Cybercrime In the Workplace
Automatic Manual Virus and Spyware Removal
Automatic Manual Virus and Spyware Removal
Data Recovery Is Easy In Notebook Repairs
Data Recovery Is Easy In Notebook Repairs
What Is Windows Defence Unit - How to Fix Windows Defence Unit Automatically
What Is Windows Defence Unit - How to Fix Windows Defence Unit Automatically
What Are Students Spending Most Time On?
What Are Students Spending Most Time On?
Deleted Mp3 Recovery - How to Restore Deleted Mp3 Files Easily
Deleted Mp3 Recovery - How to Restore Deleted Mp3 Files Easily
How to Install & Adjust the Extractor on the M-1911
How to Install & Adjust the Extractor on the M-1911
Home Security Cameras Provide Additional Reassurance
Home Security Cameras Provide Additional Reassurance
How to Recover Digital Pictures and Raw Images: an Easy Way
How to Recover Digital Pictures and Raw Images: an Easy Way
Data Recovery Vendor Considerations
Data Recovery Vendor Considerations
Resolving “The Delegate page is not available” Exchange Server Error
Resolving “The Delegate page is not available” Exchange Server Error
Malware Software to Remove Spyware and Adware in Computer
Malware Software to Remove Spyware and Adware in Computer

Leave Your Reply

*