As more people shift operations to the cloud, the demand for greater cloud data security will rise. There are already many companies who specialise in data security, but it is also important for users to know how to protect themselves. This is quite a detailed article on data security, and I think I would have to send it to my printers so that I can read it in my own time later. Thanks for the information!
Simon - http://www.idpro.co.uk
A very informative article on secure data access over cloud. I was just wondering if , in addition to all the data protection methods enlisted in this articles, is it also possible to have some kind of data chaining. By data chaining I mean the sequence in which the applications would access various data objects. For all authorized applications there will be a predefined chain or sequence to access the data.
If an out of sequence data request comes then we could suspect that it is from a spurious application trying to break-in.
Good article, it explains the issues involved with trying secure information through the Cloud where you never know precisely where all of the copies and backups of the data may reside. Clearly, the simple file management techniques currently in use are inadequate to ensure the level of safety required for important data.
What are the engineering and design challenges in creating successful IoT devices? These devices are usually small, resource-constrained electronics designed to sense, collect, send, and/or interpret data. Some of the devices need to be smart enough to act upon data in real time, 24/7. Specifically the guests will discuss sensors, security, and lessons from IoT deployments.