Solved

Security of backing up to the cloud

Posted on 2013-10-29
2
382 Views
Last Modified: 2013-10-29
How secure is backing up to the cloud?  Given the NSA "cracking all codes", should I consider that a backup to the cloud can be cracked?  I am asking for expert opinions here, not a guarantee.
0
Comment
Question by:mdxilate
2 Comments
 
LVL 7

Assisted Solution

by:SterlingMcClung
SterlingMcClung earned 250 total points
ID: 39609422
I don't think that recent news about NSA cracking all codes changes much in the way we look at online transactions.  There has always been a chance that someone is watching the secure communications that we have.  The mathematical procedures on which cryptography is built do not guarantee that no one can access your encrypted data, just that the difficulty to do so will be much greater.  I believe that the safety of your data in the cloud has much more to do with the credibility of your cloud provider and of all the networks that you use to access the cloud.  It doesn't matter how easy it is for the NSA to crack into your data if the Cloud provider is willing to simply give your data to them, or if the Cloud provider goes belly up.
0
 
LVL 18

Accepted Solution

by:
Steven Harris earned 250 total points
ID: 39609481
I agree with Sterling,

Cloud backups are useful for non-proprietary, non-sensitive data in my mind.  DropBox and Box have both been hacked using reverse algorithms.  In my eye, it comes down to:

What is the impact if your data is destroyed or improperly transmitted through means outside of your controls?
0

Featured Post

Enterprise Mobility and BYOD For Dummies

Like “For Dummies” books, you can read this in whatever order you choose and learn about mobility and BYOD; and how to put a competitive mobile infrastructure in place. Developed for SMBs and large enterprises alike, you will find helpful use cases, planning, and implementation.

Question has a verified solution.

If you are experiencing a similar issue, please ask a related question

Suggested Solutions

Title # Comments Views Activity
forensics tools for file amendments/associations 2 80
Unknown security group 2 63
Outlook 2010 Security Alert when opening Outlook 4 61
exchange, email gateway 2 30
How do we balance the user experience (UX) with reasonable security measures? It can be done, if you keep these fundamentals in mind.
February 24, 2017 — On February 23, Travis Ormandy, a vulnerability researcher at Google, reported on Twitter (https://twitter.com/taviso/status/834900838837411840) that massive stores of data have been leaked by CloudFlare, a company that provide…
Email security requires an ever evolving service that stays up to date with counter-evolving threats. The Email Laundry perform Research and Development to ensure their email security service evolves faster than cyber criminals. We apply our Threat…
The Email Laundry PDF encryption service allows companies to send confidential encrypted  emails to anybody. The PDF document can also contain attachments that are embedded in the encrypted PDF. The password is randomly generated by The Email Laundr…

778 members asked questions and received personalized solutions in the past 7 days.

Join the community of 500,000 technology professionals and ask your questions.

Join & Ask a Question