Featured Research

from universities, journals, and other organizations

Threats to cloud data storage, mobile devices

Date:
November 6, 2013
Source:
Georgia Institute of Technology
Summary:
As more businesses find their way into the cloud, few engage in security measures beyond those provided by the associated cloud storage firm, a new report notes. Even fewer seek heightened data protection because of concerns that usability and access to remote data would be significantly reduced.

As more businesses find their way into the cloud, few engage in security measures beyond those provided by the associated cloud storage firm, a new report from Georgia Tech notes. Even fewer seek heightened data protection because of concerns that usability and access to remote data would be significantly reduced.

These concerns are among findings made by the Georgia Tech Information Security Center (GTISC) and the Georgia Tech Research Institute (GTRI) in today's release of the Georgia Tech Emerging Cyber Threats Report for 2014. The report was released at the annual Georgia Tech Cyber Security Summit, a gathering of industry and academic leaders who have distinguished themselves in the field of cyber security.

"With recent revelations of data collection by the federal government, we will continue to see a focus on cloud security," said Wenke Lee, director of GTISC. "But encryption in the cloud often impacts data accessibility and processing speed. So we are likely to see increased debate about the tradeoffs between security, functionality and efficiency."

Encryption challenges were a focus at this year's summit, which featured some of the nation's top information security experts. These included keynote speaker Martin Hellman, professor emeritus at Stanford University and one of the inventors of public key cryptography, a way of securing communications without relying on pre-shared secrets.

In related findings, the report reveals security issues involving the "Internet of Things," referring to the notion that the increase of Internet-capable devices could create opportunities remote hacking and data leakage. With everything from home automation to smartphones and other personal devices becoming connected to the Internet, these devices will capture more real-world information and could permit outside parties, companies, and governments to misuse that information.

In the mobile space, even though designers of mobile devices and tablets have developed a robust ecosystem to prevent large-scale device compromises, the report finds that the threat of malicious and potentially targeted use remains. Earlier this year, researchers at Georgia Tech reported that they found ways to bypass the vetting process of Apple's App Store and subsequently showed how malicious USB chargers can be used to infect Apple iOS devices.

"No matter how successful we have been, black hat operatives will continue to attack infrastructure at every angle possible, making cyber security a global issue for years to come," said Bo Rotoloni, director of GTRI's Cyber Technology and Information Security Laboratory (CTISL). "We must remain vigilant. The purpose of this Summit and Report is to raise awareness, create educational opportunities and maintain an ongoing dialogue among industry, academia and government."

The Georgia Tech Cyber Security Summit is a forum for the IT security ecosystem to gather together, discuss and debate the evolving nature of cyber threats, and to chart the course for creating collaborative solutions.

In addition to Hellman's keynote address, the 2013 Summit included a panel of security experts from Microsoft, Splunk, Dell Secureworks, Solera Networks and Georgia Tech.

The report will be available for download at gtsecuritysummit.com.


Story Source:

The above story is based on materials provided by Georgia Institute of Technology. Note: Materials may be edited for content and length.


Cite This Page:

Georgia Institute of Technology. "Threats to cloud data storage, mobile devices." ScienceDaily. ScienceDaily, 6 November 2013. <www.sciencedaily.com/releases/2013/11/131106152228.htm>.
Georgia Institute of Technology. (2013, November 6). Threats to cloud data storage, mobile devices. ScienceDaily. Retrieved April 24, 2014 from www.sciencedaily.com/releases/2013/11/131106152228.htm
Georgia Institute of Technology. "Threats to cloud data storage, mobile devices." ScienceDaily. www.sciencedaily.com/releases/2013/11/131106152228.htm (accessed April 24, 2014).

Share This



More Computers & Math News

Thursday, April 24, 2014

Featured Research

from universities, journals, and other organizations


Featured Videos

from AP, Reuters, AFP, and other news services

Monkeys Are Better At Math Than We Thought, Study Shows

Monkeys Are Better At Math Than We Thought, Study Shows

Newsy (Apr. 23, 2014) A Harvard University study suggests monkeys can use symbols to perform basic math calculations. Video provided by Newsy
Powered by NewsLook.com
High Court to Hear Dispute of TV Over Internet

High Court to Hear Dispute of TV Over Internet

AP (Apr. 22, 2014) The future of Aereo, an online service that provides over-the-air TV channels, hinges on a battle with broadcasters that goes before the U.S. Supreme Court on Tuesday. (April 22) Video provided by AP
Powered by NewsLook.com
Aereo Takes on Broadcast TV Titans in Supreme Court Today

Aereo Takes on Broadcast TV Titans in Supreme Court Today

TheStreet (Apr. 22, 2014) Aereo heads to the Supreme Court today to fight for its right to stream broadcast TV over the Internet -- against broadcasters who say the start-up infringes upon copyright law. TheStreet Deputy Managing Editor Leon Lazaroff explains the importance of the case in the TV industry and details what the outcome of it could mean for broadcasters and for cloud storage services -- as Aereo allows its subscribers to not just watch live TV shows but also store content to a DVR in the cloud. Video provided by TheStreet
Powered by NewsLook.com
Lytro Introduces 'Illum,' A Professional Light-Field Camera

Lytro Introduces 'Illum,' A Professional Light-Field Camera

Newsy (Apr. 22, 2014) The light-field photography engineers at Lytro unveiled their next innovation: a professional DSLR-like camera called "Illum." Video provided by Newsy
Powered by NewsLook.com

Search ScienceDaily

Number of stories in archives: 140,361

Find with keyword(s):
Enter a keyword or phrase to search ScienceDaily for related topics and research stories.

Save/Print:
Share:

Breaking News:
from the past week

In Other News

... from NewsDaily.com

Science News

Health News

Environment News

Technology News



Save/Print:
Share:

Free Subscriptions


Get the latest science news with ScienceDaily's free email newsletters, updated daily and weekly. Or view hourly updated newsfeeds in your RSS reader:

Get Social & Mobile


Keep up to date with the latest news from ScienceDaily via social networks and mobile apps:

Have Feedback?


Tell us what you think of ScienceDaily -- we welcome both positive and negative comments. Have any problems using the site? Questions?
Mobile: iPhone Android Web
Follow: Facebook Twitter Google+
Subscribe: RSS Feeds Email Newsletters
Latest Headlines Health & Medicine Mind & Brain Space & Time Matter & Energy Computers & Math Plants & Animals Earth & Climate Fossils & Ruins