UIT Vice President: The development of the Internet makes cloud storage a reality

While we are still thinking about "cloud computing", "cloud storage" is being mentioned by more and more manufacturers. In the first quarter of this year, the report said the number of Chinese Internet users reached 233 million, which is certainly tempting, because this represents a huge cake for manufacturers, and the Internet is a vibrant industry, the application continues to be new. When the rise of blogs, wikis and MSN led to the transformation of Internet content providers, the Web2.0 era of user-created content came. The development of the Internet will also lead to the progress of its industrial chain, not only the view ...

Analyzing Personal Data Cloud storage: The responsibility of cloud service provider

For users who want to store their photos, music, and other files on the network, there are many storage services to choose from: Some offer free services, while others offer better security, statistical services, and other features. All cloud storage systems have one thing in common: they all have a burst of risk.     So when we talk about data management, we have to involve redundancy technology. The advantages and risks of putting commercial data into cloud storage are discussed in the previous section. This chapter focuses on personal use of cloud storage ...

MIT Super Encryption technology: protecting Cloud data security

The lack of data center security is often a big hurdle for companies that want to move data and services to the cloud.   But even that does not prevent more companies from moving to the cloud. But the current security method--that is, encryption--may not be cut.   (as a prime example of the NSA Prism Monitor crash), MIT researchers working on hardware for secure servers have found that software-based security is generally not trustworthy. Srini Devadas, professor of electrical engineering and computer science at MIT, said: "Recognize ...

Trend technology deep security escort Guangdong China Tobacco Group Cloud computing Platform

IT industry wind "cloud", cloud computing is brewing a new change, it has the tobacco industry's information construction has a significant impact. As the tobacco industry's first attempt to cloud computing applications group Enterprises, Guangdong China Tobacco Industry Co., Ltd. (hereinafter referred to as: Guangdong Tobacco) together with the global server security, virtualization and cloud computing security leadership-trend technology, through the deployment of trend technology to provide the cloud center dedicated security program Deepsecurity, Comprehensive upgrade of the cloud Center security level, in the protection of the rapid development of cloud business, but also the future promotion of cloud desktop lay ...

Cloud solution to solve the problem of "private cloud" security transition period

Cloud computing is able to provide a virtualized pool of resources, flexible service capabilities, self-service, etc., won the CIO's favor, in order to improve the utilization of IT equipment, improve the capacity of service disaster, improve the rapid response to business support, the majority of enterprises are beginning to try the private cloud construction. The embarrassing situation of private cloud security in general, the transition from the existing IT management system to the private cloud platform requires several steps: Large data centralization, business system integration, virtualization of IT resources, management platform cloud, and cloud service delivery. (many people think that private clouds ...

Radware: The five most urgent security problems in cloud computing

As companies continue to accelerate the pace of cloud technology, using new technologies such as infrastructure, Service (IaaS) or software as a service (SaaS), the need for solutions to secure access and reliable operations in the cloud architecture is becoming increasingly evident. It now appears that, as enterprise data is kept in different devices, which are provided by different providers or partners, the enterprise must monitor and protect the new "security boundaries". Similarly, carefully weighing how to protect cloud-based data should be incorporated into the enterprise's context as part of the overall security strategy for the enterprise. and protect ...

Security identity authentication of cloud computing based on OTP authentication method

Cloud computing security identity authentication based on OTP authentication Caoyang in view of the information security problem brought by cloud computing, this paper studies the identity authentication method under the cloud computing platform, and analyzes the loopholes in the authentication method of the first password (OTP). A secure identity authentication scheme based on OTP authentication is proposed in combination with elliptic curve cryptosystem. This scheme can realize two-way identity authentication between service and user, effectively prevent man-in-the-middle attack, reduce information leakage and realize secure communication. Security identity authentication of cloud computing based on OTP authentication method

Enterprise cloud computing should pay attention to safety precautions

Cloud computing is the further development of Grid computing, distributed computing and parallel computing, and has become the focus of all industries.   It is an internet-based Super computing model that establishes a mechanism for accessing configurable resources such as networks, servers, storage, applications, and services on demand, with powerful computing and storage capabilities. With the popularization of cloud computing, the security problem has gradually risen, which has become an important factor restricting its development. April 2011, Amazon Cloud Computing center crashes, causing Amazon cloud service interruption for four consecutive days, answering services, news services and location tracking services ...

Mixed cloud Security: H-P key split encryption

To be able to better enterprise data security, away from the growing number of experienced hacker attacks, HP's new capabilities help IT staff encrypt data from the points they create, regardless of whether the data is in the cloud or local.   HP Atalla Cloud Encryption protects a range of unstructured data, such as payment information, electronic health files, and core critical systems of financial institutions, and can run through their entire lifecycle. Because of the current Hacking Team collaboration, each of them has their own point of skill, able to penetrate the security central, extract key corporate assets, protect such information without ...

Cloud computing is a double-edged sword security problem can not be underestimated

The United States has secretly invaded Yahoo, Google's main communications network between national data centers and stolen hundreds of billions of users ' information, the Internet News Research Center said on May 26, the US global surveillance operation record.   This also shows that the rise of "cloud computing" in recent years has brought great convenience to people at the same time, there are not negligible security risks. "Cloud" era: cloud computing is a double-edged sword China-style breakthrough heavy responsibilities 1 cloud computing is a double-edged sword as industry experts pointed out, as a new internet model, cloud computing will be the next generation also ...

Mobile Internet Perspective Cloud security

Due to the unique advantages of cloud computing and the huge business prospects, the introduction of mobile Internet will make the system of mobile internet change, and will bring many new security problems, in order to solve the problem of mobile internet security in cloud computing mode, we must combine the mobile Internet technology's access mode to diversify,   The diversification of enterprise operation mode and the diversification of user security needs, according to the idea of security, namely service, integrated design of a multi-level, multi-level, flexible, cross-platform and unified user interface, mobile internet based general cloud computing security technology architecture. From the perspective of the service model, cloud security ...

China's breakthrough of network security in "cloud" era

The United States has secretly invaded Yahoo, Google's main communications network between national data centers and stolen hundreds of billions of users ' information, the Internet News Research Center said on May 26, the US global surveillance operation record.   This also shows that the rise of "cloud computing" in recent years has brought great convenience to people at the same time, there are not negligible security risks. 1 cloud computing is a double-edged sword as industry experts point out, as a new internet model, cloud computing will be the next generation is also the future ...

Public cloud Security: the first priority of landing

Public cloud, a hot word, a controversial technology, an immature market.   These three seemingly contradictory status quo, originated in Google's efforts in the field of technology, began in the market for Amazon to open up, presented in the competition among major manufacturers. As a model of providing free or low-cost information services via the Internet, the public cloud has sparked controversy from the outset. On each of its technical details, business operations and market prospects, the different positions, resulting in their respective judgments on it is also "public said that the right, the woman said that the woman is reasonable", but the core problem, ...

Cloud security: Personal cloud storage device he saved himself.

"Who can access my data?" Is my data secure? Where is my data stored?   Are you still fidgeting over these issues? Even if we know that the benefits of cloud computing are countless, people will still be worried about the cloud security, but the sitting ducks are not the choice of smart people, begging as much as to seek, he saved as a self-help. Get your own piece of cloud solution is to get your own personal cloud storage devices.   With its own cloud, you get all the convenience of the cloud, with File Protection and privacy maintenance capabilities. For those who may care about ...

Cloud definition: Why Cloud is important for IT security

At present, cloud computing has become an integral part of almost every enterprise IT strategy and organization structure, so the corresponding operating cost is being transferred to the third party, while the third party manages and maintains the internal service of the enterprise. Cloud computing service providers are also offering a wide range of services, including payroll, recruitment, performance management, training, and storage. As the average cost of computing continues to decrease, the demand for technical expertise and related resources is growing, mainly because of service consumers and service providers ...

Cloud security Service goes into small and medium-sized enterprises

Under the trend of globalization interconnection, unified integrated data security becomes a hotspot. This trend is driving information security into the era of application security.   China's security market will become the world's largest security market outside the US. With the rise of large data and cloud computing services in the 2014, security has become a key factor in determining the rapid development of the cloud services market.   With the strong demand of security-driven business, data security, mobile security and cloud security have become the biggest hotspots in the 2014. Modern network faces more and more application layer security threats, traditional security technology and equipment can not be independent ...

Cloud Computing Security Forum: From encryption, cloud security architecture to trusted computing

"Csdn Live Report" The Second China Cloud Computing Conference in May 2014 20-23rd at the Beijing National Convention Center opened the curtain. The Conference based on practice, with an international perspective, to help participants understand the global cloud computing technology trends, from the application of the transport, medical, education, finance, manufacturing, digital entertainment and other industries in the field of practical experience; and through technical sessions, product launches and training courses and other means,   A deep analysis of the core technology of cloud computing big data. Hunenghei, director and professor of Information Processing Center, China University of Science and Technology "cloud computing security ...

Scholar Security Cloud (Surdoc) breakthrough cloud storage Security bottleneck

With the popularization and widespread application of new technologies such as large data, cloud computing, mobile Internet, social network and so on, the industry has changed a lot, enterprises have sought to combine their business with new technology to promote their new development. Cloud computing, as one of the most popular technologies, has received extensive attention from the industry.   With the deepening of cloud computing research, a series of emerging concepts represented by cloud storage have emerged. Compared with traditional storage, cloud storage has some advantages that traditional storage does not have, Mr. Wang Donglin, founder of scholar Security Cloud, told reporters that cloud storage has infinite storage space, can ...

Blue Coat won the "SC" magazine's Best Cloud Security solution Award

May 27, 2014--blue Coat, a leading manufacturer of business security technology, recently announced that its products have been named "The Best Cloud computing security solution" and "the best Web Content management Solution" by SC Magazine.   These two products provide the hybrid cloud capabilities required by the enterprise, representing the highest level of the information security industry and the award for the best solution! "Security has never been more important to businesses, governments and consumers," says Dr Hugh Thompson, chief security strategist at Blue Coat.

Swords

Swords Li Yu-ai Cloud Security Alliance global chief Strategic Diplomat/China Regional Director Cloud Security Alliance Summary of the nine cloud security threats: Data breaches data loss account or service traffic hijacking (accounts hijacking or traffic hijacking insecure interfaces and APIs (unsafe interface/application interface) Denial of service (Denial-of-service attack) m.

Total Pages: 2156 1 .... 1377 1378 1379 1380 1381 .... 2156 Go to: GO

Contact Us

The content source of this page is from Internet, which doesn't represent Alibaba Cloud's opinion; products and services mentioned on that page don't have any relationship with Alibaba Cloud. If the content of the page makes you feel confusing, please write us an email, we will handle the problem within 5 days after receiving your email.

If you find any instances of plagiarism from the community, please send an email to: info-contact@alibabacloud.com and provide relevant evidence. A staff member will contact you within 5 working days.

A Free Trial That Lets You Build Big!

Start building with 50+ products and up to 12 months usage for Elastic Compute Service

  • Sales Support

    1 on 1 presale consultation

  • After-Sales Support

    24/7 Technical Support 6 Free Tickets per Quarter Faster Response

  • Alibaba Cloud offers highly flexible support services tailored to meet your exact needs.