1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
marusya05 [52]
3 years ago
14

Read the Security Guide about From Anthem to Anathema on pages 238-239 of the textbook. Then answer the following questions in t

he format on an essay. Create a heading for each question. Questions: Think about all of the cloud services you use. How vulnerable are you right now to having your data stolen
Computers and Technology
1 answer:
Tems11 [23]3 years ago
8 0

Answer:

Answer explained below

Explanation:

Think about all of the cloud services you use. How vulnerable are you right now to having your data stolen?

At its most basic level, “the cloud” is just fancy talk for a network of connected servers. (And a server is simply a computer that provides data or services to other computers). When you save files to the cloud, they can be accessed from any computer connected to that cloud’s network.

The cloud is not just a few servers strung together with Cat5 chords. Instead, it’s a system comprised of thousands of servers typically stored in a spaceship-sized warehouse—or several hundred spaceship-sized warehouses. These warehouses are guarded and managed by companies capable of housing massive loads of data, including the likes of Google (Google Docs), Apple (iCloud), and Dropbox.

So, it’s not just some nebulous concept. It’s physical, tangible, real.

When you save files to the cloud, you can access them on any computer, provided it’s connected to the Internet and you’re signed into your cloud services platform. Take Google Drive. If you use any mail, you can access Drive anywhere you can access your email. Sign in for one service and find your entire library of documents and photos in another.

Why are people concerned with cloud security?

It’s physically out of your hands.

You aren’t saving files to a hard drive at your house. You are sending your data to another company, which could be saving your data thousands of miles away, so keeping that information safe is now dependent on them. “Whether data is being sent automatically (think apps that sync to the cloud) or driven by users uploading photos to social media, the end result is that it’s all there somewhere being logged and stored,” says Jérôme Segura, Senior Security Researcher at Malwarebytes.

And that somewhere is a place that’s not in your direct control.

Risks of cloud storage

Cloud security is tight, but it’s not infallible. Cyber gurus can get into those files, whether by guessing security questions or bypassing passwords. That’s what happened in The Great iCloud Hack of 2014, where unwanted pictures of celebrities were accessed and published online.

But the bigger risk with cloud storage is privacy. Even if data isn’t stolen or published, it can still be viewed. Governments can legally request information stored in the cloud, and it’s up to the cloud services provider to deny access.

You might be interested in
Write an algorithm to find the average of three numbers: 10, 20, 30
STALIN [3.7K]

Language: JavaScript

Answer:

let num = [10,20,30];

average(num);  

function average(num) {

 let sum = 0;

 for(let i in num) {

   sum += num[i];

 }  

 return console.log(sum/num.length);

}

3 0
3 years ago
Describe what skills are required by the helpdesk technician for each step in a typical incident process.
LuckyWell [14K]
Not sure if this is whqat you are refering to. But here goes:<span>Typical steps in an incident process.</span>
Recieving--Incident is reported
Validating--incident verified as valid for the help desk to address
Logging--ticket entered into an incident application
Screening--determine symptoms
Prioritizing--determine importance of incident
Assigning--handle or escalate
Escalating--refering to higher level tier
Resolving--problem resolved
Closing--logging resolution and changing ticket status
Hope this helped.

4 0
3 years ago
What contains programming statement written in VB?​
Alla [95]

Answer:

A statement in Visual Basic is a complete instruction. It can contain keywords, operators, variables, constants, and expressions. Each statement belongs to one of the following three categories: Declaration statements, which name a variable, constant, or procedure and can also specify a data type.

6 0
3 years ago
Please choose odd one out please tell fast​
nikdorinn [45]

Answer: arrow key

Explanation:

3 0
3 years ago
List four types of ic packages​
Pani-rosa [81]

Answer:

C-DIP: Ceramic Dual In-line Package.

CERDIP: Ceramic DIP, which is the same as C-DIP.

CPGA: Ceramic Pin Grid Array.

DIL: Dual In-Line; see note below.

DIP: Dual In-line Package; DIP Socket Styles.

TBD: Dual In-line Zig-Zag Package; Zig-Zag Package.

HDIP: Hermetic DIP.

PDIP: Plastic DIP [P-DIP]

Explanation:

6 0
3 years ago
Other questions:
  • What is output with the statement System.out.println(x+y); if x and y are int values where x=10 and y=5? Group of answer choices
    10·1 answer
  • Which of the following statements is TRUE?
    11·2 answers
  • Select the answers that best describe showing respect for confidential data. Check all of the boxes that
    10·1 answer
  • A DNS server on your client's network is receiving a large number of DNS queries from what appears to be a workstation on their
    14·1 answer
  • Which of the following résumés would most likely get thrown in the garbage?
    15·2 answers
  • अस्स्मन्चचरे ------------------- दृश्यते |
    8·1 answer
  • The acronym "HTTP' stands for​
    11·2 answers
  • What icons in the toolbar change the look of the presentation text? It’s either Drawing, Formatting,Presentation, or Standard
    9·2 answers
  • Im lonnnelllly........................who want to date
    11·1 answer
  • What are the actions performed by copy cells?​
    12·1 answer
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!