Cloud computing is about hardware-based services involving computing, network and storage capacities. These services are provided on-demand, hosted by the cloud provider and can easily scale up and down.
Questions tagged [cloud-computing]
306 questions
0
votes
1 answer
A term for a policy that forbids employees storing intellectualy property (e.g. Source Code) on hosted third parties services
To be honest, I was not sure if this belongs to this board or Law Stack Exchange.
I am searching for a specific term that describes a policy that a company does not allow itself to share its intellectual property with third parties.
A example for…
![](../../users/profiles/136491.webp)
Bruder Lustig
- 123
- 1
- 6
0
votes
2 answers
The difference between DDoS attacks in the cloud computing and the traditional network infrastructure
Is there any difference between the DDoS attack in the cloud computing and traditional network in infrastructure?
What are the important features for detection these types of attack in cloud computing environment?
My Ph.D research is about building…
![](../../users/profiles/158229.webp)
Roja
- 11
- 1
0
votes
2 answers
Email SPF record integrity
I have been reviewing my company's SPF record with a number of our SAAS providers.
One service advised me to use 'include:amazonses.com' in my record to allow emails to be validated.
I am rather hesitant in allowing Amazon's service API to be…
0
votes
1 answer
Do we need to include SIEM hosted in the cloud in CDE scope for PCI DSS requirement..? where no CD or transacation logs are being process or managed
We have our cardholder data environment (CDE) hosted in on-premise model (private datacenter), except SIEM solution is implemented for logging and monitoring in private cloud. where we are forwarding only security logs and not forwarding any logs…
![](../../users/profiles/132792.webp)
bharathidasann
- 1
- 1
0
votes
1 answer
What is the best way for securing data transportation between sites
If I have number of computational nodes (over cloud for instance) and I would like to transfer data between them. The data over the network has to pass through as fast as possible and the encryption and decryption should be minimized. What is the…
![](../../users/profiles/95113.webp)
Avi
- 563
- 1
- 5
- 13
0
votes
4 answers
Is it okay to store this health data in a public cloud?
Is it okay to store relative health data in the public cloud, accessible by all users of my mobile app? Put another way, is this not considered PHI?
For example:
Bob has a resting heart rate of 40 BPM. When he did a plank for 3 minutes, his heart…
![](../../users/profiles/122043.webp)
tktsubota
- 103
- 5
0
votes
1 answer
What is estiamted risk of corrupt public officials accessing survivelance and cloud data in UK?
If company Trade Inc setups cloud email and cloud server and also uses mobiles and business broadband, if the owner of the competing company let's say RougeTrade Inc. has friends in UK police, he may get to know what Trade Inc is doing for…
![](../../users/profiles/117212.webp)
Aria
- 2,706
- 11
- 19
0
votes
1 answer
How should I detect and respond to bad actors who perform SQL injections?
SQL Azure has a logic component called Threat Detection. I assume it looks for SQL Injection, but also evidence of dangerous commands like sp_exec.
I would like to expand that scope, and also inspect the following aspects of user traffic for SQL…
![](../../users/profiles/396.webp)
makerofthings7
- 50,090
- 54
- 250
- 536
0
votes
2 answers
Personal Cloud Storage vs. File Sharing Services
In terms of maintaining Confidentiality, Integrity, and Availability, what are the risks and benefits associated with setting up a personal cloud storage device on your home network versus using a file sharing service (Dropbox, for example).
If one…
![](../../users/profiles/95334.webp)
Lutefisk
- 372
- 1
- 3
- 12
0
votes
2 answers
Sophos Safeguard detecting content of zip files being uploaded
Is it possible to use Sophos safeguard to detect when computers in the network upload certain files online when they are compressed in a zip file? (or 7z or similar).
I've seen it is possible with Sophos Safeguard to detect the upload of certain…
![](../../users/profiles/93891.webp)
Alvaro
- 103
- 4
-1
votes
1 answer
Privacy: why do I have to delete an account instead of simply no longer using it?
I try to avoid big internet companies (big tech) and try to find decentralized and/or open source alternatives.
I use a password manager with unique usernames and generated, complex passwords.
A lot of accounts have accumulated in the last 10+ years…
![](../../users/profiles/16066.webp)
Sybil
- 1,435
- 2
- 15
- 29
-1
votes
1 answer
How can I protect my cloud processing from everyone ... even those with root access?
How can I run my top secret code and data on any cloud hosting provider such that everyone even the hosting vendor with root is denied access ? ... a research proposal
What is the current state of either userspace or OS architecture such that only…
![](../../users/profiles/31033.webp)
Scott Stensland
- 241
- 1
- 10
-1
votes
1 answer
Reasons to limit password length
We are currently using a third party software for SSO Login in a hybrid landscape with SAP, ADFS, etc.
The users have to change their password in the client software, which is then sent to a central server in the third party's cloud and used for a…
![](../../users/profiles/110981.webp)
licklake
- 1,032
- 1
- 9
- 22
-1
votes
1 answer
How to implement security with Azure Mobile Services Back-end?
I have a mobile application which relies on a Windows Azure Mobile Services Back-end. I want to tie down some security vulnerabilities. For example, someone can currently access all my records, modify or delete them. Not Ideal...
I have the option…
-1
votes
2 answers
Secure protocol for a backup server?
I want to make a back up system in my home, but I don't know I should use a FTP server or a TPC-based cloud server or a SSH-based server. Which method is best in security?
I just want to upload and download files to a pc in my home from…
![](../../users/profiles/88005.webp)
mohammads
- 107
- 5