首页> 外文期刊>Managing Information >Cloud Busting: Why Cloud Computing Requires A New Approach To Data Privacy And Security
【24h】

Cloud Busting: Why Cloud Computing Requires A New Approach To Data Privacy And Security

机译:云破坏:为什么云计算需要一种新的数据隐私和安全方法

获取原文
获取原文并翻译 | 示例
       

摘要

Last July it was reported that a hacker had broken into the email account of an employee of social networking site Twitter, giving the hacker indirect access to Twitter's documents through Google Apps. Twitter uses Google Apps for a range of web-basedservices such as email, word processing and spreadsheets, and to store its company data "in the cloud". As a result of the breach, the hacker was able to expose Twitter's business information as well as personal data relating to the company's employees(and even their family members). Luckily for Twitter and its employees, apparently the hacker just wanted to make the point that no one's data are safe on the Internet, which is why he sent some of the hacked data to a couple of technology news blogs. The Twitter case is yet another illustration of the growing concern about data privacy and security in the context of what is now often referred to as "cloud computing".
机译:据报道,去年7月,黑客入侵了社交网站Twitter员工的电子邮件帐户,从而使该黑客可以通过Google Apps间接访问Twitter的文档。 Twitter将Google Apps用于一系列基于Web的服务,例如电子邮件,文字处理和电子表格,并将其公司数据“存储在云中”。由于违规,黑客能够公开Twitter的商业信息以及与公司员工(甚至他们的家庭成员)有关的个人数据。幸运的是,对于Twitter及其员工来说,黑客显然只是想指出一点,即互联网上没有人的数据是安全的,这就是为什么他向一些技术新闻博客发送了一些被黑客入侵的数据的原因。 Twitter案件再次说明了在如今通常被称为“云计算”的情况下对数据隐私和安全性日益增长的关注。

著录项

相似文献

  • 外文文献
  • 中文文献
  • 专利
获取原文

客服邮箱:kefu@zhangqiaokeyan.com

京公网安备:11010802029741号 ICP备案号:京ICP备15016152号-6 六维联合信息科技 (北京) 有限公司©版权所有
  • 客服微信

  • 服务号