Solved

Security of backing up to the cloud

Posted on 2013-10-29
2
383 Views
Last Modified: 2013-10-29
How secure is backing up to the cloud?  Given the NSA "cracking all codes", should I consider that a backup to the cloud can be cracked?  I am asking for expert opinions here, not a guarantee.
0
Comment
Question by:mdxilate
2 Comments
 
LVL 7

Assisted Solution

by:SterlingMcClung
SterlingMcClung earned 250 total points
ID: 39609422
I don't think that recent news about NSA cracking all codes changes much in the way we look at online transactions.  There has always been a chance that someone is watching the secure communications that we have.  The mathematical procedures on which cryptography is built do not guarantee that no one can access your encrypted data, just that the difficulty to do so will be much greater.  I believe that the safety of your data in the cloud has much more to do with the credibility of your cloud provider and of all the networks that you use to access the cloud.  It doesn't matter how easy it is for the NSA to crack into your data if the Cloud provider is willing to simply give your data to them, or if the Cloud provider goes belly up.
0
 
LVL 18

Accepted Solution

by:
Steven Harris earned 250 total points
ID: 39609481
I agree with Sterling,

Cloud backups are useful for non-proprietary, non-sensitive data in my mind.  DropBox and Box have both been hacked using reverse algorithms.  In my eye, it comes down to:

What is the impact if your data is destroyed or improperly transmitted through means outside of your controls?
0

Featured Post

Active Directory Webinar

We all know we need to protect and secure our privileges, but where to start? Join Experts Exchange and ManageEngine on Tuesday, April 11, 2017 10:00 AM PDT to learn how to track and secure privileged users in Active Directory.

Question has a verified solution.

If you are experiencing a similar issue, please ask a related question

In this increasingly digital world, security hacks are no longer just a threat, but a reality. As we've witnessed with Target's big identity hack 2013, Heartbleed in 2015, and now Cloudbleed, companies and their leaders need to prepare for the unthi…
This article describes my battle tested process for setting up delegation. I use this process anywhere that I need to setup delegation. In the article I will show how it applies to Active Directory
Email security requires an ever evolving service that stays up to date with counter-evolving threats. The Email Laundry perform Research and Development to ensure their email security service evolves faster than cyber criminals. We apply our Threat…
With Secure Portal Encryption, the recipient is sent a link to their email address directing them to the email laundry delivery page. From there, the recipient will be required to enter a user name and password to enter the page. Once the recipient …

828 members asked questions and received personalized solutions in the past 7 days.

Join the community of 500,000 technology professionals and ask your questions.

Join & Ask a Question