56 minutes

Video Description

Data Security Now that we've discussed the importance of data security, we move on to explore Data Security in a Cloud environment. This lesson takes a rich look at what cloud storage is, how it works, the varied types of storage capabilities an access types and what you can do to effectively manage data security in a cloud environment. [toggle_content title="Transcript"] Today we will talk about cloud technology. Storing your data on computers across the internet on some other computers across the internet. Basically users are interested in doing clouds, organizations or individuals are interested in cloud storage because it gives us the flexibility of being mobile and our data is readily available from a computer or any device that has internet connectivity. Organizations could have public clouds or private clouds. That is public means anyone in the general public has access to a specific portion of the servers. If its private only that individual or the users within the company have access to do data storage on these computers. Some examples of cloud storage: there is drop box, Amazon also has cloud storage, Apple has cloud storage, Google has cloud storage. So individuals could create accounts on these servers and store their data on there, such that wherever they are they have access to this data as long as they have internet connectivity to their media devices. Next we talk about storage area networks. These are networks devoted to storage and are useful often during disaster recovery situations. These are basically attached devices...they are devices that appear to be as drives within the operating system environment. We use storage area networks for data recovery in networks so that users have access to these drives. Then there is handling big data. Handling big data as its name implies is data that is very large. It could be network blogs, within any network environment it is possible to generate tons and tons of data that we have them in terabytes. It becomes very difficult for individuals to go through these. So we need solutions that could go to these data for us. Some organizations now employ security incidents events managers. These are solutions that go through all the data you have and put data that is of concern on one management interface. Thereby you can prioritize what you are looking at. It allows you to refer to collections of data that are so large they cannot be managed using traditional database management tools. [/toggle_content]

Up Next

Fundamental System Security

Commonly referred to as INFOSEC, refers to the processes and methodologies required to keep information confidential

Instructed By

Instructor Profile Image
John Oyeleke
Lead IT Security Instructor