• Home
  • Archive
  • Tools
  • Contact Us

The Customize Windows

Technology Journal

  • Cloud Computing
  • Computer
  • Digital Photography
  • Windows 7
  • Archive
  • Cloud Computing
  • Virtualization
  • Computer and Internet
  • Digital Photography
  • Android
  • Sysadmin
  • Electronics
  • Big Data
  • Virtualization
  • Downloads
  • Web Development
  • Apple
  • Android
Advertisement
You are here:Home » Security, Privacy Fear in the Cloud in Post Spyware Era

By Abhishek Ghosh November 6, 2014 7:37 am Updated on November 6, 2014

Security, Privacy Fear in the Cloud in Post Spyware Era

Advertisement

Security and privacy aspects of cloud computing solutions have become public issues even more critical and difficult to address, especially after the revelations made ‹‹by Snowden on espionage activities conducted by government agencies NSA. These confessions has given rise to a named scandal, which resulted in a strong backlash at the international level for all cloud providers in the US. Furthermore, Third important individual Country, India’s Governmental spyware activities added another chapter.

 

Security, Privacy Fear in the Cloud in Post Spyware Era

 

Public has begun to look at what was actually protected of the users at the time of beginning of Internet and how sensitive data were being respected as now. These concerns have now turned into judgment out of public opinion and the content of is the advice not to use the cloud.

In addition, India’s recent spyware activities under the hood of searching for “Black Money” gave more support to what had long been listed as one of the serious problems in the United States, that the gap between the legislation of privacy protection than native in force in other countries more advanced in this respect of view. The issue of privacy in the United States was a source of concern even before the Snowden reveals and the unequal importance of protecting sensitive data has further damaged in the foreign countries. It has been quite clear that – even Swiss Cloud possibly can not protect privacy, in the context of India. Although, the concern about latest Spyware activities by India is mostly related to Banking, it actually faced the right criticism :

Advertisement

---

Vim
1
http://www.bbc.com/news/world-asia-india-29828581

It is quite difficult to guess, whether this new Spyware activity has any relationship with our old observed spyware activities ran by NSA, but the fact is quite clear – No Government Cares the Court. It is not unusual to have the old PRISM package in a new bottle, which is more palatable to the ordinary citizen. If so, he impact of breech of privacy in India will more than that of US.

None Asked to Divide the World and Rule

What we are facing Worldwide is the effect of an unknown, unnamed effect in post-colonial era, in the context of data theft.

Security, Privacy Fear in the Cloud in Post Spyware Era

 

Security, Privacy Fear in the Cloud in Post Spyware Era : Conclusion

 

All topics are related to privacy and security protection of sensitive data in the cloud. While illegal activities, terrorism are not entertain-able, from the discussion of important issues, such as, the legal value of sensitive data, encryption and VPN technologies and their validity to data protection has added the importance of the responsibility of the users themselves in order to protect the privacy of the users.
India, thankfully lacks “Patriotic Act”, which eventually can offer an additional layer in the context of identifiable data theft.

Facebook Twitter Pinterest

Abhishek Ghosh

About Abhishek Ghosh

Abhishek Ghosh is a Businessman, Surgeon, Author and Blogger. You can keep touch with him on Twitter - @AbhishekCTRL.

Here’s what we’ve got for you which might like :

Articles Related to Security, Privacy Fear in the Cloud in Post Spyware Era

  • Nginx WordPress Installation Guide (All Steps)

    This is a Full Nginx WordPress Installation Guide With All the Steps, Including Some Optimization and Setup Which is Compatible With WordPress DOT ORG Example Settings For Nginx.

  • Glossary of dangerous dll files of Windows operating system

    We have gathered information about some well known dangerous dll files of Windows 7 and other operating system. It will work as reference to delete them easily if someone faces such dll file.

  • WordPress & PHP : Different AdSense Units on Mobile Devices

    Here is How To Serve Different AdSense Units on Mobile Devices on WordPress With PHP. WordPress Has Function Which Can Be Used In Free Way.

  • Changing Data With cURL for OpenStack Swift (HP Cloud CDN)

    Changing Data With cURL For Object is Quite Easy in OpenStack Swift. Here Are Examples With HP Cloud CDN To Make it Clear. Official Examples Are Bad.

performing a search on this website can help you. Also, we have YouTube Videos.

Take The Conversation Further ...

We'd love to know your thoughts on this article.
Meet the Author over on Twitter to join the conversation right now!

If you want to Advertise on our Article or want a Sponsored Article, you are invited to Contact us.

Contact Us

Subscribe To Our Free Newsletter

Get new posts by email:

Please Confirm the Subscription When Approval Email Will Arrive in Your Email Inbox as Second Step.

Search this website…

 

Popular Articles

Our Homepage is best place to find popular articles!

Here Are Some Good to Read Articles :

  • Cloud Computing Service Models
  • What is Cloud Computing?
  • Cloud Computing and Social Networks in Mobile Space
  • ARM Processor Architecture
  • What Camera Mode to Choose
  • Indispensable MySQL queries for custom fields in WordPress
  • Windows 7 Speech Recognition Scripting Related Tutorials

Social Networks

  • Pinterest (24.3K Followers)
  • Twitter (5.8k Followers)
  • Facebook (5.7k Followers)
  • LinkedIn (3.7k Followers)
  • YouTube (1.3k Followers)
  • GitHub (Repository)
  • GitHub (Gists)
Looking to publish sponsored article on our website?

Contact us

Recent Posts

  • Hybrid Multi-Cloud Environments Are Becoming UbiquitousJuly 12, 2023
  • Data Protection on the InternetJuly 12, 2023
  • Basics of BJT TransistorJuly 11, 2023
  • What is Confidential Computing?July 11, 2023
  • How a MOSFET WorksJuly 10, 2023
PC users can consult Corrine Chorney for Security.

Want to know more about us?

Read Notability and Mentions & Our Setup.

Copyright © 2023 - The Customize Windows | dESIGNed by The Customize Windows

Copyright  · Privacy Policy  · Advertising Policy  · Terms of Service  · Refund Policy