Keeping our online identity private and secure is an ongoing high interest matter as we want the ability to control how much information we disclose to others.
Although protection of our privacy and security rules increased in the last years, we know that sharing information, updates, images etc. doesn’t always give us the privacy that we may desire.
All our information gets stored in the cloud where is may stay available, forever. With the right applied tools is retrievable by whoever has interest gaining the data – even out of context.
However, there is recent development to change the way private data can be stored in the cloud environment that could advance privacy and security of users, e.g. in the medical/health documentation, financial applications and social media. Continue reading “Online Data That Vanish – Increased Privacy? Loss of Communication?” »
Computer data storage technology involves computer technology and recording media to maintain digital information and has become one of the core function and fundamental components of today’s computers and electronic devices.
“Memory” in computer science is generally referring to semiconductor storage read-write random-access memory, characteristically DRAM (Dynamic-RAM) or comparable fast but temporary storage methods.
“Storage” is referring to storage devices such as hard disk drives, optical disc drives etc. and their media not directly accessible by the central processing unit (CPU).
Information and computer technology keep developing exponentially. Currently, tape libraries are widely used for data storage, Continue reading “Ultra-Long-Term Storage Technologies” »
The openness and interconnectedness of the internet is advantageous but also bears risks for commerce and consumers, private information exchange and sensitive data management. Using the web makes shopping, sharing information and using financial and medical apps extremely fast and suitable but it also opens door for information misuse while transferring data, such as credit card numbers, addresses and shopping preferences.
To reduce the threats of data theft, different encryption technologies have developed that make sure that only authorized persons or organizations are able to decipher sensitive information.
Encryption is defined as the translation of data into a secret code to create and maintain most operative data security. Encryption has it foundation in cryptography, which is the science of codes and ciphers to guard secret information. Continue reading “Encryption Technology – Securing your Information” »
Spam is defined as the abuse of electronic messaging systems to send unwanted bulk messages to many people typically for advertising or marketing on the internet.
Sending spam messages is called spamming. People who send spam are called spammers collecting email addresses from numerous sources but, furthermore, buy them from email addresses selling companies. Continue reading “Cyber Security Threats VIII- SPAM” »
The cloud can be a very unsafe place when data and data transfer isn’t sufficiently protected. Online commerce transactions, web registrations, search engine submissions, Web polls, e-mail service registration and other automated services may be ‘attacked’ by malicious software programs or bots that mimic humans behavior having the intent of identity theft, spam, data manipulation and harm to businesses etc.
There are several approaches that make registrations and data transfers more secure such as CAPTCHAs. Continue reading “CAPTCHAs – Are you A Person?” »
Security of digital data is critical.
Data needs to be managed correctly and must be flexibly stored, moved and provisioned while it needs to be easily accessible and securely protected from data theft and malware etc.
Besides local storage, the most common and favorable from of data storage is in a data center also known as Infrastructure as a Service (IaaS) since for most companies, it is not rational to invest into hardware that may be out-dated within 6 months. Continue reading “Data Center Design” »
Critical systems of the government, businesses, health system and financial institutions etc. are continuously challenged by cyber-attacks.
Conventional tactics frequently fail to prevent and fight those attacks because the classic systems are usually run in static environments that easily permit hackers to target and damage system resources.
Traditionally, network parameters such as addresses, names, software applications, networks and numerous configuration parameters remain fairly static over long periods of time. Hackers assume these enterprise networks use these static configurations, which gives hackers opportunities to research the environment and plan attacks against the system. Continue reading “Moving Target Defense Systems: Self-Adapting Computer Networks” »
Worms are malware that spread motivated by curiosity, criminal gain, complaint/protest and terrorism and potentially threatens businesses, national security and privacy issues of each user. Continue reading “Cybersecurity Threats V – Worms” »
Cyberspace is the electronic medium where digital communication takes place and where data are stored as a three-dimensional model through which a virtual-reality user gets the “feeling” of moving through a space.
Although Cyberspace is a concept that is independent from the internet, the web is currently the biggest network for linking computers and digital communication.
Have you ever asked yourself who is the other person in Cyberspace Continue reading “Who are you today? – Identity in Cyberspace” »
Malicious software, or malware, means hostile, intrusive or annoying software, script or code that is designed to alter or damage computer operation, collect private and sensitive information and gain unauthorized access to computer systems. Continue reading “Cyber Security Threats III – Malware” »