Time
56 minutes
Difficulty
Beginner
CEU/CPE
3

Video Description

Data Security Now that we've discussed the importance of data security, we move on to explore Data Security in a Cloud environment. This lesson takes a rich look at what cloud storage is, how it works, the varied types of storage capabilities an access types and what you can do to effectively manage data security in a cloud environment. [toggle_content title="Transcript"] Today we will talk about cloud technology. Storing your data on computers across the internet on some other computers across the internet. Basically users are interested in doing clouds, organizations or individuals are interested in cloud storage because it gives us the flexibility of being mobile and our data is readily available from a computer or any device that has internet connectivity. Organizations could have public clouds or private clouds. That is public means anyone in the general public has access to a specific portion of the servers. If its private only that individual or the users within the company have access to do data storage on these computers. Some examples of cloud storage: there is drop box, Amazon also has cloud storage, Apple has cloud storage, Google has cloud storage. So individuals could create accounts on these servers and store their data on there, such that wherever they are they have access to this data as long as they have internet connectivity to their media devices. Next we talk about storage area networks. These are networks devoted to storage and are useful often during disaster recovery situations. These are basically attached devices...they are devices that appear to be as drives within the operating system environment. We use storage area networks for data recovery in networks so that users have access to these drives. Then there is handling big data. Handling big data as its name implies is data that is very large. It could be network blogs, within any network environment it is possible to generate tons and tons of data that we have them in terabytes. It becomes very difficult for individuals to go through these. So we need solutions that could go to these data for us. Some organizations now employ security incidents events managers. These are solutions that go through all the data you have and put data that is of concern on one management interface. Thereby you can prioritize what you are looking at. It allows you to refer to collections of data that are so large they cannot be managed using traditional database management tools. [/toggle_content]

Video Transcription

00:04
Today we talk about
00:05
cloud technology,
00:07
storing your data on computers across the Internet,
00:12
on some other computers across the Internet. Basically users I interested in doing scouts, organizations or individuals. I interested in cloud storage because it gives us the flexibility or being mobile
00:27
on our data is readily available from a computer or any device that has Internet connectivity.
00:35
Um, organizations could have
00:38
public clouds or private cloud.
00:41
Um, that is public means anyone in the general public has access to a specific portion off the
00:49
service or if it's private, only that individual or
00:55
the
00:56
users within the company have access to do that. Our storage on these computers. Some examples off cloud storage. No, there's Dropbox. A Mazon also has cloud storage
01:10
on dhe. It's they allow a poo as cloud storage. Google has cloud storage so individuals could create a count on these servers on store their data on their such that wherever they are, they have access to these data as long as they have Internet connectivity, tow their media devices.
01:30
Next we talk about storage area networks. These are networks devoted to a storage and a useful often
01:37
during disaster recovery situations.
01:38
These are basically a touch device is no their devices that they appear to be as drives within the operating system environment.
01:49
So we use storage area networks for
01:53
data recovery in network so that users have access to these drives.
02:00
Then that is 100 big daughter
02:04
hunting big data, as the name implies, is data does is very large.
02:08
Um, it could be network blog's,
02:12
um we need any network environment. It is possible to generate tons and tons of data. That, you know we have them in terabytes becomes very difficult for individuals. Togo through this. So we need solutions that will go through this data for us. Some organizations now employ
02:30
security incidents, events, managers.
02:31
These are solutions that go through all the data you have on. Put that that that is off concern on one management interface, thereby you can prioritize what you're looking at. It allows you to refer to collections of data that are so large they cannot be managed
02:50
using traditional database management tools.

Up Next

Fundamental System Security

Commonly referred to as INFOSEC, refers to the processes and methodologies required to keep information confidential.

Instructed By

Instructor Profile Image
John Oyeleke
Lead IT Security Instructor
Instructor