Multi-engine detection mechanism in cloud defense system

Multi-engine detection mechanism in cloud defense system Qiang Wei Cheng Qin Yu Shideqing provides security for clients by building multiple types of detection engines in the cloud. To move the traditional antivirus engine installed on the client into the cloud, the client only retains lightweight host intrusion defense software, blocking local file access, and upload the file to the cloud for multiple engine scanning, cloud using a comprehensive decision algorithm to detect. In order to test the system detection rate, using 1789 malicious code samples for scanning, the system's comprehensive detection rate of 95.6%. Test results show that the use of multiple engine detection can be ...

Nude photo of female star to torture cloud security trend under how to protect privacy?

Hollywood has erupted in what is known as the worst "topless" storm in history, and it is reported that the leaked list includes Oscar-winning actress Jennifer and the famous singer Rihanna, which has a total of 101 stars "on the list". The star "Naked photo Storm" is to swing thousands of layers of waves, whether Apple or Android mobile phone users, all are panic, cloud storage security has been an unprecedented concern.   A few days ago, the road users and 360 mobile phone security experts to protect the privacy of netizens, and Apple also announced that the matter will be investigated. Figure: Smart phone to become a deposit ...

Cloud security risks at mobile end: A new challenge for cloud computing

As a new IT technology, the problem of security is that cloud computing cannot be bypassed. In order to scramble for the future information Society control, the cloud computing and mobile Internet infrastructure layout, access and control of the vast number of data, has become the world's strategic plan.   At the same time, the rapid development of mobile terminals such as smartphones brings new security risks to cloud computing industry. For cloud computing companies around the world, the security and privacy of data in the delivery of mobile devices is challenged. IBM recently registered a patent for a cloud computing security technology because its researchers found the application in a security protocol ...

icloud by hackers and leaks trigger "public cloud" panic

September 1, Jennifer Laurence and other Hollywood stars leaked on the internet, confirmed that hackers have attacked multiple icloud accounts, coupled with the first-half exposure of the iOS backdoor incident, so that Apple security again questioned.   But in the interview, many security vendors believe that the safety of iOS than Android relatively high, and this time the problem of cloud security, in fact, is incomprehensible. "From this point of view, the problem is not in the data center, but on the client side. Jinshan Network Private Cloud Products senior director Kai told reporters, "in the cloud security, human factors than technology ...

Cloud security control is critical in response to cloud attacks

As the needle cloud attacks more and more, business users must assess their cloud security controls ahead of time.     In this article, Dave Shackleford provides some best practices for defending against cloud attacks. Alert Logic recently released a 2014 cloud security report showing a significant increase in the number of attacks against the cloud recently.     But are corporate cloud infrastructures ready to fight cloud attacks? Given the increasing number of attacks against the cloud, all use ...

Three essential elements of cloud computing risk

The rapid development of cloud computing has also brought many benefits to companies trying to refocus on key business goals, such as increasing the speed of product listings, increasing the competitive edge of companies, and reducing capital and/or operational costs. In general, investing in cloud computing technologies such as software as a service (SaaS) or infrastructure as a service (IaaS) can reduce the demand for services in traditional information technology departments within the enterprise.   Services that are managed by enterprise business units (such as training, human resources, payroll, and healthcare management) will also be phased out as cloud computing is used. Although ...

Is cloud computing more secure or less secure?

Recently, the sensation of the world's Hollywood photos of the storm is spreading like a virus, many of the world's most popular actress photos in the network rumors. A total of 101 Hollywood actresses were involved in a serious leak of data from the iphone, foreign media reported. After the incident, the expert suspected that the Apple icloud cloud system vulnerabilities were exploited by hackers, Apple has always denied that icloud have security concerns. Even the security mechanisms that have been criticized by many security experts for the unlimited number of logons are denied by Apple. According to Apple, the hackers obtained these photos by means of widespread intrusion (c ...).

How does an enterprise correctly understand the risks of cloud computing?

Understanding the risks of cloud computing is the key to protecting cloud-centric businesses.   In this article, Ravila Helen White explains three essential elements of cloud computing risk.   The rapid development of cloud computing has also brought many benefits to companies trying to refocus on key business goals, such as increasing the speed of product listings, increasing the competitive edge of companies, and reducing capital and/or operational costs. In general, cloud computing technologies such as software as a service [note] (saas[note]) or infrastructure as a service [note] (iaas[Note) ...

Pepper Map Technology released "Cloud lock" cloud security No "lock" is not in

Pepper Map Technology Today (August 30) held in Beijing 2014 product launches, officially released based on the operating system kernel reinforcement technology free server, Web site security products-Yun Yu. Mr. Ni, a researcher of Chinese Academy of Sciences, academician of China Engineering Academy, Technical advisor of the National Security Bureau, director of the Information Security Technology Engineering Center of Chinese Academy of Sciences, Kinshan teacher, director of Network Security Laboratory of the Academy of Sciences, director of Zhongguancun Network Security laboratory Liu Baoxu, and well-known internet since media people Lou, Dingdao, Lou, Zhu Yi, Wang Jiwei and so on were invited and attended the hair ...

Security threats and countermeasures in the cloud era

Security threats in the cloud era and its response to Qihoo 360 Chen--A new security problem in the cloud era security threats and countermeasures in cloud era of "cloud + END + boundary" three-dimensional defense system--360

icloud was also invaded! How to realize the data leakage prevention in cloud era

Recently, some hackers use the Apple handset icloud cloud loophole, steals the Oscar-winning actress Lawrence and so on many movie stars, the singer and the supermodel's topless, and spreads in the network wantonly. In fact, this is not the first time Hollywood actress photos were leaked, in 2011, actress Johansson's "pornographic door" incident also caused a sensation.   From stars to icloud, the event not only "pits" the many Hollywood actresses, but also once again sounded the data crisis alert in the cloud services sector. In recent years, cloud services security incidents have emerged, but with the cloud ...

Security research on "infrastructure as service" mode in cloud Library

Research on the security of "infrastructure as service" mode in Cloud Library Guanqingjuan Yang Yanmei Liu The digital Library under cloud computing environment has the characteristics of supporting a large amount of resources sharing and powerful computing ability, but also because it supports multi-user sharing resources, it brings about such as storage data being restored tampering, information privacy leaking, Communication data eavesdropping and so on security issues. This is also true of the "infrastructure as a Service" (IaaS) model with virtualization technology as the key technology. In view of this, the paper from the service providers, leasing users, service providers and leasing users from the point of view of the relationship between the supply and demand, to explore ...

Increase safety factor and add a lock to cloud services

After "pornographic", ask you a question, do you use Apple products such as the iphone and their icloud cloud storage services, and often take photos and videos that are more private? If so, you are at risk of being exposed to personal privacy.   Over the weekend, Hollywood, including Jennifer, the more than 100 stars of large scale private photos and video leaked, for the cloud era of data security again sounded the alarm. Apple is in trouble, Android is not happy to say that "pornographic door" is because of hackers attacked the ping ...

Access control of mobile cloud service with privacy protection function

Mobile cloud service access control with privacy protection Jing Po Bai Guangwei Cade Zhang Yi for security and privacy protection issues in mobile cloud services, a mechanism for anonymous use of cloud storage services is proposed. In the Anonymous Identity Registration section, the 0 Knowledge verification and digital signature technology simplifies the key verification step of mobile cloud users, while the third party uses the user to bind with own ID card to prevent users from malicious use of mobile cloud services; In the data Sharing section, the system extracts the shared account parameters, Used to troubleshoot data security degradation caused by shared key loss. Combined with the method of theoretical analysis ...

How does an enterprise assess cloud service security?

As the popularity of cloud services increases, companies must work with it to decide what can be put on the cloud and how to ensure other security. Cloud computing has gained more and more attention from enterprises.    Does it mean that cloud services are safe enough for businesses? Although my answer is "appropriate," it is critical for security managers to understand that a generalized negative answer is not an acceptable answer. Executives and other business leaders are attracted to the benefits of cost and convenience provided by cloud-based vendors. However, in taking any ...

"Hollywood pornographic door" questioned Cloud security

"Hollywood photo door" More than 100 injured stars, Apple 3rd issued a statement that the "pornographic door" incident and Apple icloud of the program loopholes or the iphone's specific features have nothing to do. Apple has mobilized all available engineers and technicians to investigate.   Still, the security of cloud computing is once again the focus of public opinion. The "New York Times" 3rd, said the current cloud computing information "Access control Communications card" has many loopholes. For internet companies such as Apple, it is hard to find a good balance between the security and convenience of information. US Bloomberg ...

Nude photo of female star to torture cloud security trend under how to protect privacy?

Hollywood has erupted in what is known as the worst "topless" storm in history, and it is reported that the leaked list includes Oscar-winning actress Jennifer and the famous singer Rihanna, which has a total of 101 stars "on the list". The star "Naked photo Storm" is to swing thousands of layers of waves, whether Apple or Android mobile phone users, all are panic, cloud storage security has been an unprecedented concern.      A few days ago, the road users and 360 mobile phone security experts to protect the privacy of netizens, and Apple also announced that the matter will be investigated. Photo: Smart phone ...

Analyzing the five information security bottlenecks of cloud computing

With the development of cloud technology, cloud computing has become the gossip of most enterprise employees. What is cloud computing? There are many ways to define cloud computing. At least 100 explanations can be found for what cloud computing is. It is now widely accepted that the National Institute of Standards and Technology (NIST) defines: Cloud computing is a pay-as-you-go model that provides available, convenient, on-demand network access, into a configurable pool of computing resources (resources including networks, servers, storage, applications, services), which ...

How to protect the enterprise cloud storage data security?

"Our company was originally prepared to introduce an enterprise version of the cloud storage services, but heard that there are security risks, management is shaken." Mr. Mao in Beijing said in an interview with reporters. Mr Mao's "safety hazard" refers to the failure of the Microsoft Cloud Storage Service OneDrive, which was exposed by media earlier this month.   There is also a previous foreign cloud storage service provider Dropbox has also experienced similar problems. Mr. Mao runs a PR consulting firm of 70 people in Beijing, whose main business is to plan and carry out large-scale roadshow activities for clients. Daily work ...

Research on the security model of cloud computing based on trust

Research on the security model of cloud computing based on trust Shandong Normal University Zhang Yandong Cloud Security is always a cloud service provider cannot but face the soft rib, it and cloud computing development foreground is closely related. It can be said that, out of the security, cloud computing applications and promotion is not possible to talk about. Although the traditional security solution solves the security problem in cloud computing to some extent, it is absolutely not available to transplant this package to the cloud platform completely. New features such as the high level of virtualization of cloud computing, the complexity of deployment, and high scalability have prompted us to study the security mechanisms that apply to cloud computing. Where the trust problem is the cloud ...

Total Pages: 2156 1 .... 1379 1380 1381 1382 1383 .... 2156 Go to: GO

Contact Us

The content source of this page is from Internet, which doesn't represent Alibaba Cloud's opinion; products and services mentioned on that page don't have any relationship with Alibaba Cloud. If the content of the page makes you feel confusing, please write us an email, we will handle the problem within 5 days after receiving your email.

If you find any instances of plagiarism from the community, please send an email to: info-contact@alibabacloud.com and provide relevant evidence. A staff member will contact you within 5 working days.

A Free Trial That Lets You Build Big!

Start building with 50+ products and up to 12 months usage for Elastic Compute Service

  • Sales Support

    1 on 1 presale consultation

  • After-Sales Support

    24/7 Technical Support 6 Free Tickets per Quarter Faster Response

  • Alibaba Cloud offers highly flexible support services tailored to meet your exact needs.