1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
marusya05 [52]
3 years ago
14

Read the Security Guide about From Anthem to Anathema on pages 238-239 of the textbook. Then answer the following questions in t

he format on an essay. Create a heading for each question. Questions: Think about all of the cloud services you use. How vulnerable are you right now to having your data stolen
Computers and Technology
1 answer:
Tems11 [23]3 years ago
8 0

Answer:

Answer explained below

Explanation:

Think about all of the cloud services you use. How vulnerable are you right now to having your data stolen?

At its most basic level, “the cloud” is just fancy talk for a network of connected servers. (And a server is simply a computer that provides data or services to other computers). When you save files to the cloud, they can be accessed from any computer connected to that cloud’s network.

The cloud is not just a few servers strung together with Cat5 chords. Instead, it’s a system comprised of thousands of servers typically stored in a spaceship-sized warehouse—or several hundred spaceship-sized warehouses. These warehouses are guarded and managed by companies capable of housing massive loads of data, including the likes of Google (Google Docs), Apple (iCloud), and Dropbox.

So, it’s not just some nebulous concept. It’s physical, tangible, real.

When you save files to the cloud, you can access them on any computer, provided it’s connected to the Internet and you’re signed into your cloud services platform. Take Google Drive. If you use any mail, you can access Drive anywhere you can access your email. Sign in for one service and find your entire library of documents and photos in another.

Why are people concerned with cloud security?

It’s physically out of your hands.

You aren’t saving files to a hard drive at your house. You are sending your data to another company, which could be saving your data thousands of miles away, so keeping that information safe is now dependent on them. “Whether data is being sent automatically (think apps that sync to the cloud) or driven by users uploading photos to social media, the end result is that it’s all there somewhere being logged and stored,” says Jérôme Segura, Senior Security Researcher at Malwarebytes.

And that somewhere is a place that’s not in your direct control.

Risks of cloud storage

Cloud security is tight, but it’s not infallible. Cyber gurus can get into those files, whether by guessing security questions or bypassing passwords. That’s what happened in The Great iCloud Hack of 2014, where unwanted pictures of celebrities were accessed and published online.

But the bigger risk with cloud storage is privacy. Even if data isn’t stolen or published, it can still be viewed. Governments can legally request information stored in the cloud, and it’s up to the cloud services provider to deny access.

You might be interested in
What is the program that searches through data bases?
german
If i'm right its call: Algorithm
5 0
3 years ago
Do you think lossy compression formats will be popular in 20 years? Why or why not?
stealth61 [152]

Answer:

I think it will be not popular

Explanation:

We are living in a information era and future data will be more important than now so we will need every detail of information and we will need data. Lossy compression is faster but computers are getting powerful so lossless compression will be faster so lossless compression will be popular.

4 0
3 years ago
Which storage device is not recommended as a permanent storage solution?
Brut [27]

Answer:

In comparison to permanent storage, non-permanent storage, also called volatile memory, is a storage device whose data is lost when its power source is disconnected. Examples of non-permanent storage include CPU cache and RAM.

Explanation:

i just know

8 0
2 years ago
If the pc­doctor software is installed on a computer's hard drive, what two different ways can the program be started?
xeze [42]
<span> The PC-doctor software is system information tool used to diagnose and  test the computer and determine its configuration.</span>
If the PC-­doctor software is installed on a computer's hard drive, you should start the program in two different ways:<span>
1. Press function key during startup sequence
2. Start menu shortcut</span>


8 0
3 years ago
Rags or wipes are considered non-hazardous waste when they are
nalin [4]
Under the Solvent-Contaminated Wipes Rule (also known as the “Wipes Rule”), solvent-contaminated wipes sent for cleaning or disposal are conditionally excluded from hazardous waste regulation. As long as the solvent-contaminated wipes meet those conditions mentioned above, they are not considered hazardous waste Under the Resource Conservation and Recovery Act (RCRA),
4 0
3 years ago
Read 2 more answers
Other questions:
  • How could a system be designed to allow a choice of operating systems from which to boot? What would the bootstrap program need
    14·1 answer
  • An enterprise system is a packaged software application that helps integrate various ___________ in a company.
    15·2 answers
  • When using a file name you have to use only lower case letters<br>true or false
    11·1 answer
  • Select the antonym for given word freedom
    7·2 answers
  • Jane is creating a slide that will have a large heading and number of bullet points below it. What slide format should she use?
    12·1 answer
  • Which of these is not the correct method for moving text in a document in Word 2016?
    5·1 answer
  • What is obamams last name
    9·2 answers
  • This provides an easy method for workers to use their computers. FAT FAT RAM RAM DOS DOS GUI
    12·1 answer
  • Which of the following statements is correct? User data cannot be combined and shared among authorized users. In a nondatabase,
    6·1 answer
  • Think about all the different ways you communicate with other people throughout your day. • What makes this communication succes
    15·1 answer
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!