acm-header
Sign In

Communications of the ACM

ACM Opinion

Where Should Information Go to Be Safe?


View as: Print Mobile App Share:
photo of man working at data center

Virtually all responses to ransomware attacks to date have been reactive. The central challenge now is to think through how to defend against these forms of cyberattacks.

Crafting an ability to thwart determined efforts to intrude into and/or lock up critical information systems is the only way to reduce cyberattacks. Doing so may require commercial enterprises, social and governmental institutions, and even militaries to take a very surprising action: move sensitive information out from their own hardened, firewalled systems.

Where should information go to be safe? The best places are in the cloud and "the fog." Cloud computing stores data on someone else's system, while the fog is a form of edge computing that consists of the structures between systems that produce data and the cloud. Because it is outside the servers in one's own data center, the fog offers yet another hiding and storage space that hackers will find hard to access.

From Fortune
View Full Article


 

No entries found

Sign In for Full Access
» Forgot Password? » Create an ACM Web Account