Cloud Storage Security
|
|
|
- Roger Rodgers
- 9 years ago
- Views:
Transcription
1 Cloud Storage Security Sven Vowé Fraunhofer Institute for Secure Information Technology (SIT) Darmstadt, Germany SIT is a member of CASED (Center for Advanced Security Research Darmstadt)
2 Cloud Storage Security Outline 1. Introduction and overview 2. Features 3. Security requirements 4. Security issues 5. Trust issues 6. Drawbacks 7. Choice 2
3 Introduction: Basic Cloud Storage Services Simple online data storage Independent of physical location Provides rudimentary REST API Several mature service providers Very low costs pay- per- use model Use- Cases data sink for (online) applications data sink for virtual machines online backup for arbitrary data online access to arbitrary data Example: Amazon S3 Pricing (August 2012) Standard Storage (up to 1TB) Each GB = $0.125 PUT, COPY, POST, LIST 1,000 Requests = $0.01 GET 10,000 Requests = $0.01 Transfer IN $0 Transfer OUT (up to 10TB) Example: 100GB, Files, one Month Each GB = $0.12 Initial Upload $0.10 Storage $12.50 Download $12.01 Total $
4 Introduction: Basic Cloud Storage Services Service includes Multiple redundancy % availability REST / Browser interfaces Vs. data center operational costs Physical location Staff Power consumption Uplink Bandwidth etc Example: Amazon S3 Pricing (August 2012) Storage <= 1TB Each GB = $0.125 Storage 1TB 50TB Each GB = $0.110 Storage 50TB 500TB Each GB = $0.095 PUT, COPY, POST, LIST 1,000 Requests = $0.01 GET 10,000 Requests = $0.01 IN $0 OUT <= 10TB Each GB = $0.12 OUT 10TB 50TB Each GB = $0.09 Example: 100TB, 1,000,000 Files, one Month Initial Upload $10.00 Storage $10, Download $ Total $15,
5 Introduction: Basic Cloud Storage Services Why doesn t everybody use it? Costs/Data ratio scaled to massive data amounts Cumbersome data handling End- User clearly not targeted 5
6 Introduction: Advanced Cloud Storage Services Simple online data storage independent of physical location Very easy to use Several plans with fixed costs Many providers Great demand Summer 2011: Dropbox reached 25 Million users Use- Cases data backup, synchronization, transfer, accessibility mobile data access, co- operation 6
7 Introduction: Advanced Cloud Storage Services Payment models Basic variant free Provides a bit of space Expanded variants with monthly costs More storage space Multiple user functionality i.e. Team collaboration Professional Support i.e. Telephone Tool Support i.e. ActiveDirectory Example: Dropbox Pricing (August 2012) FREE: 2GB Storage $0 PRO: 100GB PRO: 200GB PRO: 500GB TEAM: 1000GB (5 Users) PRO 200: 200GB / account (5 users) $9.99 / month $19.99 / month $49.99 / month $ / year $ / year 7
8 Interlude: Technical Report by Fraunhofer SIT 2011 Analysis of several Advanced Cloud Storage Services Functionality Security 2012 Published Study / Technical Report On the Security of Cloud Storage Services freely available Download here: 8
9 Cloud Storage Security Outline 1. Introduction and overview 2. Features 3. Security requirements 4. Security issues 5. Trust issues 6. Drawbacks 7. Choice 9
10 Features for End- Users Simple Features Copy files to online storage Backup files to online storage Usually with versioning 10
11 Features for End- Users Advanced Features Synchronize files with multiple linked devices Pull synchronization: manual updates (git, subversion work like that) Push synchronization: automatic updates by client software 11
12 Features for End- Users Advanced Features Share data with others Sharing: exchange data with other users of the service Publishing: Generate public URL and distribute to other users 12
13 Features for End- Users Advanced Features can be combined Push Synchronization and Sharing Cross- User Synchronization Files changed by others automatically downloaded to linked devices 13
14 Features for End- Users Several Services specialize in subset Supported Features Service Copy Backup Synchronization Sharing CloudMe Crashplan Dropbox Mozy TeamDrive Ubuntu One Wuala 14
15 Features: Deduplication Service providers pay traffic and storage Many use internal minimization technique: Deduplication Server- side deduplication incoming file already exists à only save link Client- side deduplication Client sends file information to server File already exists à do not upload, only save link Providers claim storage reduction of 70% - 90%!!! 15
16 Cloud Storage Security Outline 1. Introduction and overview 2. Features 3. Security requirements 4. Security issues 5. Trust issues 6. Drawbacks 7. Choice 16
17 Security Requirements Registration and Login Strong passwords Protection against username/ enumeration Transport Server authentication & Hostname Verification Suitable cryptography Encryption Client- side encryption of data and filenames Non- deterministic key generation Suitable cryptography 17
18 Security Requirements File sharing Obfuscated public URLs No indexing by external search engines Reversible sharing Disinvited users excluded by cryptographic means Deduplication Deduplication threshold OR single- account deduplication 18
19 Security Requirements Synchronization List of registered devices Manual device activation Manual device deactivation Client software updates Integrated periodic update check User- initiated or silent update Server location Storage location information 19
20 Cloud Storage Security Outline 1. Introduction and overview 2. Features 3. Security requirements 4. Security issues 5. Trust issues 6. Drawbacks 7. Choice 20
21 Security Issues: Careless Publication 21
22 Security Issues: Careless Publication Allows download of all public files Iterate through UserID Iterate through FileID Some allowed search engine indexation Public files found by URL- based search File contents indexed Eases search for sensitive data 22
23 Security Issues: Careless Publication Mitigation Strategies Use obfuscated URL + HASH(FILE))> Disallow search engine indexations I.e. robot.txt: User- agent: * Disallow: / 23
24 Security Issues: Deduplication Client- side Deduplication 24
25 Security Issues: Deduplication Benny Pinkas, 2010: Client- side Deduplication Allows to test for file existence If no upload occurs, document is already there 25
26 Security Issues: Deduplication Benny Pinkas, 2010: Client- side Deduplication Allows espionage attack 1. Bob uploads salary sheet 26
27 Security Issues: Deduplication Benny Pinkas, 2010: Client- side Deduplication Allows espionage attack 1. Bob uploads salary sheet 2. Attacker knows document outline and creates possible documents 27
28 Security Issues: Deduplication Benny Pinkas, 2010: Client- side Deduplication Allows espionage attack 1. Bob uploads salary sheet 2. Attacker knows document outline 3. Attacker uploads possible salaries until no upload occurs 28
29 Security Issues: Deduplication Benny Pinkas, 2010: Client- side Deduplication Allows document takeover 1. Attacker knows the hash of a file Hash(SherlockCD) 29
30 Security Issues: Deduplication Benny Pinkas, 2010: Client- side Deduplication Allows document takeover 1. Attacker knows the hash of a file 2. Attacker manipulates communication to server and injects hash Hash(SherlockCD) 30
31 Security Issues: Deduplication Benny Pinkas, 2010: Client- side Deduplication Allows document takeover 1. Attacker knows the hash of a file 2. Attacker manipulates communication to server and injects hash 3. Server sets a link to the file, registers attacker as owner Hash(SherlockCD) 31
32 Security Issues: Deduplication Benny Pinkas, 2010: Client- side Deduplication Allows document takeover 1. Attacker knows the hash of a file 2. Attacker manipulates communication to server and injects hash 3. Server sets a link to the file, registers attacker as owner 4. Attacker downloads file Hash(SherlockCD) 32
33 Security Issues: Deduplication Client- side Deduplication 2011: Dropship ( Open source software exploited the flaw in Dropbox Insertion of hash à File appears in Dropbox folder Dropbox tried to shut down the project Finally, Dropbox disabled client- side deduplication à No Cloud Storage Service use Client- Side Deduplication today! Hash(SherlockCD) 33
34 Security Issues: Encryption Server- side encryption Data encrypted after transmission No protection against internal attacker at provider No protection against US PATRIOT Act 34
35 Security Issues: Encryption Server- side key management Client encrypts data before transmission Key is transferred No protection against internal attacker at provider No protection against US PATRIOT Act (Note: Mozy does also allow client to manage key) 35
36 Security Issues: Encryption Client- side encryption Client generates key Client encrypts data before transmission Protection against external access 36
37 Security Issues: Encryption Why not always client- side encryption? Lost key = no data access! Not all data needs encryption?!? Client- side encryption vs. Deduplication! Copies not detectable Client- side encryption vs. Sharing and Publication! Additional key exchange methods needed Client- side encryption vs. Usability! Browser access difficult Synchronization difficult 37
38 Security Issues: Wuala s convergent encryption Wuala employs special method convergent encryption On the Security of Cloud Storage Services 111!"#$%& '$()$(!"#$ %&'% (!"#$%&'$()%(*$+,$+- %&'%+$)* ( +!"#$,, $)*/012!"#$(.)%/$%/- $)* ( +!"#$, $)* ( +!"#$, %&'%!)&-$. 0$1(!)+(2$.+13/")%- $)* ' +(,!"#$%&'$()%(4*$+5*(2"*0- $)* ' +!)&-$, allows use of deduplication Figure 36. Encryption scheme of Wuala (simplified). allows use of sharing and publication (3) enc s (k) the encrypted key that has been used for file encryption (4) enc s (fname) the encrypted version of the real filename The most important properties of convergent encryption are: (1) Identical clear texts are encrypted to identical crypto texts, independent of the user, (2) the server 38 can not decrypt the crypto texts without having a copy of the clear text. The first property enables deduplication on encrypted data. The second property protects
39 Security Issues: Wuala s convergent encryption Wuala employs special method convergent encryption No protection against internal attacker at provider Example: Leaking a sensitive Document 1. Politician makes backup 2. Politician transfers file to Journalist 3. Journalist makes backup Wuala knows: Politician and Journalist share same file 39
40 Security Issues: Unverified addresses Dropbox Registration 40
41 Security Issues: Unverified addresses 41
42 Security Issues: Unverified addresses Service registration allowed without verification Many services analyzed Identified as vulnerable: 42
43 Security Issues: Unverified addresses Several services allow registration without verification Incrimination attack 1. Attacker registers using of victim 43
44 Security Issues: Unverified addresses Several services allow registration without verification Incrimination attack 1. Attacker registers using of victim 2. Attacker uploads incriminating data 44
45 Security Issues: Unverified addresses Several services allow registration without verification Incrimination attack 1. Attacker registers using of victim 2. Attacker uploads incriminating data 3. Attacker reports to third party 45
46 Security Issues: Unverified addresses Several services allow registration without verification Malware attack 1. Attacker registers using of impersonated 46
47 Security Issues: Unverified addresses Several services allow registration without verification Malware attack 1. Attacker registers using of impersonated 2. Attacker uploads malware 47
48 Security Issues: Unverified addresses Several services allow registration without verification Malware attack 1. Attacker registers using of impersonated 2. Attacker uploads malware 3. Attacker uses sharing to offer data to victim (friend of impersonated) 48
49 Security Issues: Unverified addresses Several services allow registration without verification Malware attack 1. Attacker registers using of impersonated 2. Attacker uploads malware 3. Attacker uses sharing to offer data to victim (friend of impersonated) 4. Victim downloads data 49
50 Security Issues: Unverified addresses Several services allow registration without verification Espionage attack 1. Attacker registers using of impersonated 50
51 Security Issues: Unverified addresses Several services allow registration without verification Espionage attack 1. Attacker registers using of impersonated 2. Attacker uses sharing to request data from victim (friend of impersonated) 51
52 Security Issues: Unverified addresses Several services allow registration without verification Espionage attack 1. Attacker registers using of impersonated 2. Attacker uses sharing to request data from victim (friend of impersonated) 3. Victim uploads requested data 52
53 Security Issues: Unverified addresses Several services allow registration without verification Espionage attack 1. Attacker registers using of impersonated 2. Attacker uses sharing to request data from victim (friend of impersonated) 3. Victim uploads requested data 4. Attacker downloads data 53
54 Security Issues: Unverified addresses Several services allow registration without verification How could this happen? Most popular service introduced flaw Other services followed Security at the cost of Usability Streamlined registration process Subsequent introduction of sharing functionality allowed attacks Mitigation strategy Verify address by sending activation link 54
55 Code of Conduct: Handling security issues What did we do with our findings? Responsible disclosure Inform service provider Offer to discuss possible solutions Announce date of publication (3-6 months in the future) Findings throughout 2011 à May 2012: Published technical report à June 2012: Published Paper at IEEE TrustCom 2012 Vulnerabilities through Usability Pitfalls in Cloud Services: Security Problems due to Unverified Addresses 55
56 Cloud Storage Security Outline 1. Introduction and overview 2. Features 3. Security requirements 4. Security issues 5. Trust issues 6. Drawbacks 7. Choice 56
57 Trust Issues Cloud Storage Services are highly attractive attack targets employ multiple data redundancy and backup schemes Where is my data? Attack surface operate internationally No specialized SLAs for most customers Legal issues Sensitive data in off- shore data- centers à Server- side encryption acceptable? à Client- side encryption still needs trust! 57
58 Trust Issues Using the Cloud means Replace on- premise security with trust in provider s ability Replace internal security policy with Service Level Agreement (SLA) But with whom do I effectively deal? 58
59 Trust Issues Using the Cloud means Replace on- premise security with trust in provider s ability Replace internal security policy with Service Level Agreement (SLA) But with whom do I effectively deal? 59
60 Cloud Storage Security Outline 1. Introduction and overview 2. Features 3. Security requirements 4. Security issues 5. Trust issues 6. Drawbacks 7. Choice 60
61 Drawbacks of Cloud Storage Provider down! Can I cope? Recovery time acceptable? Data transmission time Assume 500GB data, download ~1MB/s, upload ~0.25MB/s (DSL ) Upload time estimated: 23.7 days Download time estimated: 5.9 days Service provider may go out of business Easy migration possible? Migration time acceptable? 61
62 Cloud Storage Security Outline 1. Introduction and overview 2. Features 3. Security requirements 4. Security issues 5. Trust issues 6. Drawbacks 7. Choice 62
63 Choice Overview of analysis results 63
64 Choice Choice depends on requirements Data does not need to be encrypted i.e. CloudMe, Ubuntu One Data examination by third parties may be acceptable i.e. Dropbox I want client- side encryption and trust my provider i.e. CrashPlan, Mozy, TeamDrive, (Wuala) I want everything No service meets all of our security requirements 64
65 Choice Cloud Storage Service providers are aware of privacy and confidentiality needs... have taken steps to provide high security level... actively try to improve their services... have mostly upgraded their systems to address security issues Users need to evaluate security level of own data... necessary service functionality 65
66 Thank You for your attention J Questions? 66
Side channels in cloud services, the case of deduplication in cloud storage
Side channels in cloud services, the case of deduplication in cloud storage Danny Harnik, Benny Pinkas, Alexandra Shulman-Peleg Presented by Yair Yona Yair Yona (TAU) Side channels in cloud services Advanced
Security of Cloud Storage: - Deduplication vs. Privacy
Security of Cloud Storage: - Deduplication vs. Privacy Benny Pinkas - Bar Ilan University Shai Halevi, Danny Harnik, Alexandra Shulman-Peleg - IBM Research Haifa 1 Remote storage and security Easy to encrypt
On the Security of Cloud Storage Services
FRAUNHOFER INSTITUTe FoR secure INFORMATION TECHNOLOGy SIT Technical reports On THE Security of Cloud Storage Services 03/2012 Fraunhofer Verlag On the Security of Cloud Storage Services Moritz Borgmann,
FINAL DoIT 11.03.2015 - v.4 PAYMENT CARD INDUSTRY DATA SECURITY STANDARDS APPLICATION DEVELOPMENT AND MAINTENANCE PROCEDURES
Purpose: The Department of Information Technology (DoIT) is committed to developing secure applications. DoIT s System Development Methodology (SDM) and Application Development requirements ensure that
ISSN: 2321-7782 (Online) Volume 2, Issue 1, January 2014 International Journal of Advance Research in Computer Science and Management Studies
ISSN: 2321-7782 (Online) Volume 2, Issue 1, January 2014 International Journal of Advance Research in Computer Science and Management Studies Research Paper Available online at: www.ijarcsms.com New Challenges
Is Drupal secure? A high-level perspective on web vulnerabilities, Drupal s solutions, and how to maintain site security
Is Drupal secure? A high-level perspective on web vulnerabilities, Drupal s solutions, and how to maintain site security Presented 2009-05-29 by David Strauss Thinking Securely Security is a process, not
WildFire Overview. WildFire Administrator s Guide 1. Copyright 2007-2015 Palo Alto Networks
WildFire Overview WildFire provides detection and prevention of zero-day malware using a combination of malware sandboxing and signature-based detection and blocking of malware. WildFire extends the capabilities
Application Design and Development
C H A P T E R9 Application Design and Development Practice Exercises 9.1 What is the main reason why servlets give better performance than programs that use the common gateway interface (CGI), even though
Problem. Solution. Quatrix is professional, secure and easy to use file sharing.
Quatrix Data Sheet Problem Consumer file sharing services such as Hightail, WeTransfer and Dropbox are causing a massive headache for enterprise IT as BYOFT (bring your own file transfer) opens up vulnerabilities
SENSE Security overview 2014
SENSE Security overview 2014 Abstract... 3 Overview... 4 Installation... 6 Device Control... 7 Enrolment Process... 8 Authentication... 9 Network Protection... 12 Local Storage... 13 Conclusion... 15 2
12 Key File Sync and Share Advantages of Transporter Over Box for Enterprise
WHITE PAPER 12 Key File Sync and Share Advantages of Transporter Over Box for Enterprise Cloud storage companies invented a better way to manage information that allows files to be automatically synced
High-speed cryptography and DNSCurve. D. J. Bernstein University of Illinois at Chicago
High-speed cryptography and DNSCurve D. J. Bernstein University of Illinois at Chicago Stealing Internet mail: easy! Given a mail message: Your mail software sends a DNS request, receives a server address,
Data In The Cloud: Who Owns It, and How Do You Get it Back?
Data In The Cloud: Who Owns It, and How Do You Get it Back? Presented by Dave Millier, Soban Bhatti, and Oleg Sotnikov 2013 Sentry Metrics Inc. Agenda Reasons for Cloud Adoption How Did My Data Get There?
How Security Testing can ensure Your Mobile Application Security. Yohannes, CEHv8, ECSAv8, ISE, OSCP(PWK) Information Security Consultant
How Security Testing can ensure Your Mobile Application Security Yohannes, CEHv8, ECSAv8, ISE, OSCP(PWK) Information Security Consultant Once More Consulting & Advisory Services IT Governance IT Strategic
Information Security Basic Concepts
Information Security Basic Concepts 1 What is security in general Security is about protecting assets from damage or harm Focuses on all types of assets Example: your body, possessions, the environment,
Web Application Security
Web Application Security John Zaharopoulos ITS - Security 10/9/2012 1 Web App Security Trends Web 2.0 Dynamic Webpages Growth of Ajax / Client side Javascript Hardening of OSes Secure by default Auto-patching
ICOM 5018 Network Security and Cryptography
ICOM 5018 Network Security and Cryptography Description This course introduces and provides practical experience in network security issues and cryptographic techniques. Cryptographic algorithms and protocols
CipherShare Features and Benefits
CipherShare s and CipherShare s and Security End-to-end Encryption Need-to-Know: Challenge / Response Authentication Transitive Trust Consistent Security Password and Key Recovery Temporary Application
Performance Analysis of Client Side Encryption Tools
Performance Analysis of Client Side Encryption Tools Subrata Kumar Das 1, Md. Alam Hossain 2, Md. Arifuzzaman Sardar 3, Ramen Kumar Biswas 4, Prolath Dev Nath 5 Abstract Client side encryption tools are
Cloud Security:Threats & Mitgations
Cloud Security:Threats & Mitgations Vineet Mago Naresh Khalasi Vayana 1 What are we gonna talk about? What we need to know to get started Its your responsibility Threats and Remediations: Hacker v/s Developer
Instructions on TLS/SSL Certificates on Yealink Phones
Instructions on TLS/SSL Certificates on Yealink Phones 1. Summary... 1 2. Encryption, decryption and the keys... 1 3. SSL connection flow... 1 4. The instructions to a certificate... 2 4.1 Phone acts as
U.S. Cellular Mobile Data Security. User Guide Version 00.01
U.S. Cellular Mobile Data Security User Guide Version 00.01 Table of Contents Install U.S. Cellular Mobile Data Security...3 Activate U.S. Cellular Mobile Data Security...3 Main Interface...3 Checkup...4
HIPAA CRITICAL AREAS TECHNICAL SECURITY FOCUS FOR CLOUD DEPLOYMENT
HIPAA CRITICAL AREAS TECHNICAL SECURITY FOCUS FOR CLOUD DEPLOYMENT A Review List This paper was put together with Security in mind, ISO, and HIPAA, for guidance as you move into a cloud deployment Dr.
SECURING SELF-SERVICE PASSWORD RESET
SECURING SELF-SERVICE PASSWORD RESET FUNCTIONALITY IN WEB APPLICATIONS David A. Shpritz July, 2010 INTRODUCTION Many web applications requiring user authentication also provide self-service password reset
LDA, the new family of Lortu Data Appliances
LDA, the new family of Lortu Data Appliances Based on Lortu Byte-Level Deduplication Technology February, 2011 Copyright Lortu Software, S.L. 2011 1 Index Executive Summary 3 Lortu deduplication technology
Manual for Android 1.5
Manual for Android 1.5 1 Table of Content 1. Scope of Service... 3 1.1 About Boxcryptor Classic... 3 1.2 About this manual... 3 2. Installation... 4 3. Basic functionality... 5 3.1. Setting up Boxcryptor
CPSC 467: Cryptography and Computer Security
CPSC 467: Cryptography and Computer Security Michael J. Fischer Lecture 1 September 2, 2015 CPSC 467, Lecture 1 1/13 Protecting Information Information security Security principles Crypto as a security
Where every interaction matters.
Where every interaction matters. Peer 1 Vigilant Web Application Firewall Powered by Alert Logic The Open Web Application Security Project (OWASP) Top Ten Web Security Risks and Countermeasures White Paper
Using Drobo Storage with CrashPlan Pro for On-Site & Cloud Backup
Drobo How-To Guide Protecting critical data is key to ensuring business continuity. Drobo storage systems excel as backup- to- disk target as they provide high throughput and random access for near instantaneous
Secure Data transfer in Cloud Storage Systems using Dynamic Tokens.
Secure Data transfer in Cloud Storage Systems using Dynamic Tokens. P.Srinivas *,K. Rajesh Kumar # M.Tech Student (CSE), Assoc. Professor *Department of Computer Science (CSE), Swarnandhra College of Engineering
Thick Client Application Security
Thick Client Application Security Arindam Mandal ([email protected]) (http://www.paladion.net) January 2005 This paper discusses the critical vulnerabilities and corresponding risks in a two
Side channels in cloud services, the case of deduplication in cloud storage
Side channels in cloud services, the case of deduplication in cloud storage Danny Harnik IBM Haifa Research Lab [email protected] Benny Pinkas Bar Ilan University [email protected] Alexandra Shulman-Peleg
APPLICATION SECURITY: FROM WEB TO MOBILE. DIFFERENT VECTORS AND NEW ATTACK
APPLICATION SECURITY: FROM WEB TO MOBILE. DIFFERENT VECTORS AND NEW ATTACK John T Lounsbury Vice President Professional Services, Asia Pacific INTEGRALIS Session ID: MBS-W01 Session Classification: Advanced
Analyzing the Security Schemes of Various Cloud Storage Services
Analyzing the Security Schemes of Various Cloud Storage Services ECE 646 Project Presentation Fall 2014 12/09/2014 Team Members Ankita Pandey Gagandeep Singh Bamrah Pros and Cons of Cloud Storage Services
RightFax Internet Connector Frequently Asked Questions
RightFax Internet Connector Frequently Asked Questions What is the RightFax Internet Connector? The RightFax Internet Connector is a connector within RightFax 10.5 which provides an Internet connection
CLOUD COMPUTING SECURITY ARCHITECTURE - IMPLEMENTING DES ALGORITHM IN CLOUD FOR DATA SECURITY
CLOUD COMPUTING SECURITY ARCHITECTURE - IMPLEMENTING DES ALGORITHM IN CLOUD FOR DATA SECURITY Varun Gandhi 1 Department of Computer Science and Engineering, Dronacharya College of Engineering, Khentawas,
Dropbox for Business. Secure file sharing, collaboration and cloud storage. G-Cloud Service Description
Dropbox for Business Secure file sharing, collaboration and cloud storage G-Cloud Service Description Table of contents Introduction to Dropbox for Business 3 Security 7 Infrastructure 7 Getting Started
CrashPlan Security SECURITY CONTEXT TECHNOLOGY
TECHNICAL SPECIFICATIONS CrashPlan Security CrashPlan is a continuous, multi-destination solution engineered to back up mission-critical data whenever and wherever it is created. Because mobile laptops
!!!! Memeo C1 Security !!!!!!!!!!! Bret Savage, CTO. October 2013. 2013 Memeo Inc. All rights reserved. 2013 Memeo Inc. All rights reserved.
Memeo C1 Security Bret Savage, CTO October 2013 2013 Memeo Inc. All rights reserved. 2013 Memeo Inc. All rights reserved. Guiding Principles Memeo C1 was scratch-built from the ground up to be the ultimate
A8.1 Asset Management Responsibility for assets: To identify organisational assets and define appropriate protection responsibilities.
A8.1 Asset Management Responsibility for assets: To identify organisational assets and define appropriate protection responsibilities. 8.1.1 Inventory of assets. Tripwire IP360 provides comprehensive host
Transporter from Connected Data Date: February 2015 Author: Kerry Dolan, Lab Analyst and Vinny Choinski, Sr. Lab Analyst
ESG Lab Test Drive Transporter from Connected Data Date: February 2015 Author: Kerry Dolan, Lab Analyst and Vinny Choinski, Sr. Lab Analyst Abstract: This report documents the results of an ESG Lab Test
APPENDIX G ASP/SaaS SECURITY ASSESSMENT CHECKLIST
APPENDIX G ASP/SaaS SECURITY ASSESSMENT CHECKLIST Application Name: Vendor Name: Briefly describe the purpose of the application. Include an overview of the application architecture, and identify the data
ECE 646, CRYPTOGRAPHY PROJECT SPECIFICATION GEORGE MASON UNIVERSITY FALL, 2013
ECE 646, CRYPTOGRAPHY PROJECT SPECIFICATION GEORGE MASON UNIVERSITY FALL, 2013 v Team members: Kunal Pillai Asrat Dea Ravi Chandra Reddy Kambalapally v Cryptographic Security for Cloud Storage Cloud storage
SECURITY ANALYSIS OF A SINGLE SIGN-ON MECHANISM FOR DISTRIBUTED COMPUTER NETWORKS
SECURITY ANALYSIS OF A SINGLE SIGN-ON MECHANISM FOR DISTRIBUTED COMPUTER NETWORKS Abstract: The Single sign-on (SSO) is a new authentication mechanism that enables a legal user with a single credential
The purpose of this report is to educate our prospective clients about capabilities of Hackers Locked.
This sample report is published with prior consent of our client in view of the fact that the current release of this web application is three major releases ahead in its life cycle. Issues pointed out
WEB APPLICATION FIREWALLS: DO WE NEED THEM?
DISTRIBUTING EMERGING TECHNOLOGIES, REGION-WIDE WEB APPLICATION FIREWALLS: DO WE NEED THEM? SHAIKH SURMED Sr. Solutions Engineer [email protected] www.fvc.com HAVE YOU BEEN HACKED????? WHAT IS THE PROBLEM?
Drobo How-To Guide Drobo Apps - Configuring ElephantDrive
The Drobo 5N provides simple and affordable network attached storage for the connected home or small office. ElephantDrive is a cloud-based service that provides real-time protection of all, or a subset
Cloud Identity Management Tool Quick Start Guide
Cloud Identity Management Tool Quick Start Guide Software version 2.0.0 October 2013 General Information: [email protected] Online Support: [email protected] Copyright 2013 CionSystems Inc., All
Data Storage Security in Cloud Computing
Data Storage Security in Cloud Computing Prashant M. Patil Asst. Professor. ASM s, Institute of Management & Computer Studies (IMCOST), Thane (w), India E_mail: [email protected] ABSTRACT
Online databackup solution combined comparisons
Online databackup solution combined comparisons There are plenty of comparison articles about online backup solution. We have tried to gather the best ones for you in order to facilitate your online databackup
Optimized And Secure Data Backup Solution For Cloud Using Data Deduplication
RESEARCH ARTICLE OPEN ACCESS Optimized And Secure Data Backup Solution For Cloud Using Data Deduplication Siva Ramakrishnan S( M.Tech ) 1,Vinoth Kumar P (M.E) 2 1 ( Department Of Computer Science Engineering,
Intunex Oy Skillhive Service Description 1 / 6
Intunex Oy Skillhive Service Description 1 / 6 About Skillhive Skillhive is a social business application designed for connecting and sharing expertise within organizations. Skillhive enables employees
DarkFS - An Encrypted File System
1 DarkFS - An Encrypted File System Team: Arjun Narayanan, Yuta 1. Motivation In many software applications, we want to store files in a remote, untrusted file server. With an untrusted file server, we
Harvesting Developer Credentials in Android Apps
8 th ACM Conference on Security and Privacy in Wireless and Mobile Networks, New York City, Jun 24-26 Harvesting Developer Credentials in Android Apps Yajin Zhou, Lei Wu, Zhi Wang, Xuxian Jiang Florida
Is your data safe out there? -A white Paper on Online Security
Is your data safe out there? -A white Paper on Online Security Introduction: People should be concerned of sending critical data over the internet, because the internet is a whole new world that connects
Data Protection: From PKI to Virtualization & Cloud
Data Protection: From PKI to Virtualization & Cloud Raymond Yeung CISSP, CISA Senior Regional Director, HK/TW, ASEAN & A/NZ SafeNet Inc. Agenda What is PKI? And Value? Traditional PKI Usage Cloud Security
Introweb Remote Backup Client for Mac OS X User Manual. Version 3.20
Introweb Remote Backup Client for Mac OS X User Manual Version 3.20 1. Contents 1. Contents...2 2. Product Information...4 3. Benefits...4 4. Features...5 5. System Requirements...6 6. Setup...7 6.1. Setup
Sage Nonprofit Online and Sage Virtual Services. Frequently Asked Questions
Sage Nonprofit Online and Sage Virtual Services Frequently Asked Questions General What is Sage Nonprofit Online? Sage Nonprofit Online provides access to Sage 100 Fund Accounting, Sage Grant Management,
Intrusion detection for web applications
Intrusion detection for web applications Intrusion detection for web applications Łukasz Pilorz Application Security Team, Allegro.pl Reasons for using IDS solutions known weaknesses and vulnerabilities
Chapter 1: Introduction
Chapter 1 Introduction 1 Chapter 1: Introduction 1.1 Inspiration Cloud Computing Inspired by the cloud computing characteristics like pay per use, rapid elasticity, scalable, on demand self service, secure
Async: Secure File Synchronization
Async: Secure File Synchronization Vera Schaaber, Alois Schuette University of Applied Sciences Darmstadt, Department of Computer Science, Schoefferstr. 8a, 64295 Darmstadt, Germany [email protected]
Windows Phone 8 Security Overview
Windows Phone 8 Security Overview This white paper is part of a series of technical papers designed to help IT professionals evaluate Windows Phone 8 and understand how it can play a role in their organizations.
Data Integrity by Aes Algorithm ISSN 2319-9725
Data Integrity by Aes Algorithm ISSN 2319-9725 Alpha Vijayan Nidhiya Krishna Sreelakshmi T N Jyotsna Shukla Abstract: In the cloud computing, data is moved to a remotely located cloud server. Cloud will
DATA SECURITY IN CLOUD USING ADVANCED SECURE DE-DUPLICATION
DATA SECURITY IN CLOUD USING ADVANCED SECURE DE-DUPLICATION Hasna.R 1, S.Sangeetha 2 1 PG Scholar, Dhanalakshmi Srinivasan College of Engineering, Coimbatore. 2 Assistant Professor, Dhanalakshmi Srinivasan
WHITE PAPER NEXSAN TRANSPORTER PRODUCT SECURITY AN IN-DEPTH REVIEW
NEXSAN TRANSPORTER PRODUCT SECURITY AN IN-DEPTH REVIEW INTRODUCTION As businesses adopt new technologies that touch or leverage critical company data, maintaining the highest level of security is their
Managing for the Long Term: Keys to Securing, Troubleshooting and Monitoring a Private Cloud
Deploying and Managing Private Clouds The Essentials Series Managing for the Long Term: Keys to Securing, Troubleshooting and Monitoring a Private Cloud sponsored by Managing for the Long Term: Keys to
Securing your Microsoft Internet Information Services (MS IIS) Web Server with a thawte Digital Certificate thawte thawte thawte thawte thawte 10.
Securing your Microsoft Internet Information Services (MS IIS) Web Server with a thawte Digital Certificate A STEP-BY-STEP GUIDE to test, install and use a thawte Digital Certificate on your MS IIS Web
Back2Cloud: A highly Scalable and Available Remote Backup Service
Department of Computer Science Georgia Institute of Technology FINAL REPORT Back2Cloud: A highly Scalable and Available Remote Backup Service Professor Ling Liu CS 8803 Advanced Internet Application Development
Secure cloud access system using JAR ABSTRACT:
Secure cloud access system using JAR ABSTRACT: Cloud computing enables highly scalable services to be easily consumed over the Internet on an as-needed basis. A major feature of the cloud services is that
MIGRATIONWIZ SECURITY OVERVIEW
MIGRATIONWIZ SECURITY OVERVIEW Table of Contents Introduction... 2 Shared Security Approach... 2 Customer Best Practices... 2 Application Security... 4 Database Level Security... 4 Network Security...
Cloud-Security: Show-Stopper or Enabling Technology?
Cloud-Security: Show-Stopper or Enabling Technology? Fraunhofer Institute for Secure Information Technology (SIT) Technische Universität München Open Grid Forum, 16.3,. 2010, Munich Overview 1. Cloud Characteristics
Security Digital Certificate Manager
System i Security Digital Certificate Manager Version 5 Release 4 System i Security Digital Certificate Manager Version 5 Release 4 Note Before using this information and the product it supports, be sure
The Top Web Application Attacks: Are you vulnerable?
QM07 The Top Web Application Attacks: Are you vulnerable? John Burroughs, CISSP Sr Security Architect, Watchfire Solutions [email protected] Agenda Current State of Web Application Security Understanding
Efficient Framework for Deploying Information in Cloud Virtual Datacenters with Cryptography Algorithms
Efficient Framework for Deploying Information in Cloud Virtual Datacenters with Cryptography Algorithms Radhika G #1, K.V.V. Satyanarayana *2, Tejaswi A #3 1,2,3 Dept of CSE, K L University, Vaddeswaram-522502,
Authentication. Authorization. Access Control. Cloud Security Concerns. Trust. Data Integrity. Unsecure Communication
Volume 4, Issue 6, June 2014 ISSN: 2277 128X International Journal of Advanced Research in Computer Science and Software Engineering Research Paper Available online at: www.ijarcsse.com A Three Layered
Application Intrusion Detection
Application Intrusion Detection Drew Miller Black Hat Consulting Application Intrusion Detection Introduction Mitigating Exposures Monitoring Exposures Response Times Proactive Risk Analysis Summary Introduction
Introduction to Information Security
Introduction to Information Security Chapter 1 Information Security Basics Winter 2015/2016 Stefan Mangard, www.iaik.tugraz.at What is Information Security? 2 Security vs. Safety The German word Sicherheit
2013 USER GROUP CONFERENCE
2013 USER GROUP CONFERENCE The Cloud This session will touch anything and everything cloud based that is important to districts today. We will compare and contrast Google Apps and Office 365, Cloud storage
