Questions tagged [cloud-computing]

Cloud computing is about hardware-based services involving computing, network and storage capacities. These services are provided on-demand, hosted by the cloud provider and can easily scale up and down.

306 questions
0
votes
1 answer

A term for a policy that forbids employees storing intellectualy property (e.g. Source Code) on hosted third parties services

To be honest, I was not sure if this belongs to this board or Law Stack Exchange. I am searching for a specific term that describes a policy that a company does not allow itself to share its intellectual property with third parties. A example for…
0
votes
2 answers

The difference between DDoS attacks in the cloud computing and the traditional network infrastructure

Is there any difference between the DDoS attack in the cloud computing and traditional network in infrastructure? What are the important features for detection these types of attack in cloud computing environment? My Ph.D research is about building…
Roja
  • 11
  • 1
0
votes
2 answers

Email SPF record integrity

I have been reviewing my company's SPF record with a number of our SAAS providers. One service advised me to use 'include:amazonses.com' in my record to allow emails to be validated. I am rather hesitant in allowing Amazon's service API to be…
0
votes
1 answer

Do we need to include SIEM hosted in the cloud in CDE scope for PCI DSS requirement..? where no CD or transacation logs are being process or managed

We have our cardholder data environment (CDE) hosted in on-premise model (private datacenter), except SIEM solution is implemented for logging and monitoring in private cloud. where we are forwarding only security logs and not forwarding any logs…
0
votes
1 answer

What is the best way for securing data transportation between sites

If I have number of computational nodes (over cloud for instance) and I would like to transfer data between them. The data over the network has to pass through as fast as possible and the encryption and decryption should be minimized. What is the…
Avi
  • 563
  • 1
  • 5
  • 13
0
votes
4 answers

Is it okay to store this health data in a public cloud?

Is it okay to store relative health data in the public cloud, accessible by all users of my mobile app? Put another way, is this not considered PHI? For example: Bob has a resting heart rate of 40 BPM. When he did a plank for 3 minutes, his heart…
tktsubota
  • 103
  • 5
0
votes
1 answer

What is estiamted risk of corrupt public officials accessing survivelance and cloud data in UK?

If company Trade Inc setups cloud email and cloud server and also uses mobiles and business broadband, if the owner of the competing company let's say RougeTrade Inc. has friends in UK police, he may get to know what Trade Inc is doing for…
Aria
  • 2,706
  • 11
  • 19
0
votes
1 answer

How should I detect and respond to bad actors who perform SQL injections?

SQL Azure has a logic component called Threat Detection. I assume it looks for SQL Injection, but also evidence of dangerous commands like sp_exec. I would like to expand that scope, and also inspect the following aspects of user traffic for SQL…
0
votes
2 answers

Personal Cloud Storage vs. File Sharing Services

In terms of maintaining Confidentiality, Integrity, and Availability, what are the risks and benefits associated with setting up a personal cloud storage device on your home network versus using a file sharing service (Dropbox, for example). If one…
Lutefisk
  • 372
  • 1
  • 3
  • 12
0
votes
2 answers

Sophos Safeguard detecting content of zip files being uploaded

Is it possible to use Sophos safeguard to detect when computers in the network upload certain files online when they are compressed in a zip file? (or 7z or similar). I've seen it is possible with Sophos Safeguard to detect the upload of certain…
Alvaro
  • 103
  • 4
-1
votes
1 answer

Privacy: why do I have to delete an account instead of simply no longer using it?

I try to avoid big internet companies (big tech) and try to find decentralized and/or open source alternatives. I use a password manager with unique usernames and generated, complex passwords. A lot of accounts have accumulated in the last 10+ years…
Sybil
  • 1,435
  • 2
  • 15
  • 29
-1
votes
1 answer

How can I protect my cloud processing from everyone ... even those with root access?

How can I run my top secret code and data on any cloud hosting provider such that everyone even the hosting vendor with root is denied access ? ... a research proposal What is the current state of either userspace or OS architecture such that only…
-1
votes
1 answer

Reasons to limit password length

We are currently using a third party software for SSO Login in a hybrid landscape with SAP, ADFS, etc. The users have to change their password in the client software, which is then sent to a central server in the third party's cloud and used for a…
licklake
  • 1,032
  • 1
  • 9
  • 22
-1
votes
1 answer

How to implement security with Azure Mobile Services Back-end?

I have a mobile application which relies on a Windows Azure Mobile Services Back-end. I want to tie down some security vulnerabilities. For example, someone can currently access all my records, modify or delete them. Not Ideal... I have the option…
-1
votes
2 answers

Secure protocol for a backup server?

I want to make a back up system in my home, but I don't know I should use a FTP server or a TPC-based cloud server or a SSH-based server. Which method is best in security? I just want to upload and download files to a pc in my home from…
mohammads
  • 107
  • 5
1 2 3
20
21