{"id":757,"date":"2009-02-06T19:51:52","date_gmt":"2009-02-07T03:51:52","guid":{"rendered":"http:\/\/cubist.cs.washington.edu\/Security\/?p=757"},"modified":"2009-02-06T19:51:52","modified_gmt":"2009-02-07T03:51:52","slug":"security-review-online-backup","status":"publish","type":"post","link":"https:\/\/secblog.cs.washington.edu\/Security\/2009\/02\/06\/security-review-online-backup\/","title":{"rendered":"Security Review: Online Backup"},"content":{"rendered":"<p>Every day there are more online backup options: Mosy.com, Xdrive, Adrive.\u00a0 This is a significant security concern that should be more respected.\u00a0 These online backup solutions offer encrypted data transmission and strong firewalls.\u00a0 Although companies may say they are 100% secure, this is not a guarantee any organization can reasonable make.\u00a0 A system can never be completely secure.\u00a0 A system can only be free of known exploits.\u00a0 Commonly, large companies have their servers hacked and data stolen.\u00a0 This happens to companies as large as Comcast, Novell, Citibank, and\u00a0 Microsoft.\u00a0 Even if certain online backup solutions are 100% secure, this would not ensure that all other are and will be in the future.\u00a0 An attacker who gains access to an online backup server would have access to varied and immense data.<\/p>\n<p>Assets &amp;Security Goals:<br \/>\n&#8211;Online backups should be as removed from corporate external networks by multiple levels of protection once stored.<br \/>\n&#8211;Companies should seriously consider whether it would be okay if their data leaked, and what would be the consequences for customers.<\/p>\n<p>Adversaries and threats:<br \/>\n&#8211;Enemies: Any rival to a company or person who uses online backup.<br \/>\n&#8211;Experienced Adverseries: Hackers with unreleased exploits to access servers owned by Mozy and other backup solutions.<\/p>\n<p>Potential weaknesses:<br \/>\n&#8211;A port scan of all online backup company servers would likely reveal a vulnerability somewhere.<br \/>\n&#8211;A dictionary attack could be conducted on Mozy log-ins.<\/p>\n<p>Defenses:<br \/>\n&#8211;The provider should remove the data from network access once backed-up.<br \/>\n&#8211;Do not use online backup if you require the data to be confidential or it could be used to the advantage of a rival.<\/p>\n<p>Likely online backup will become more ubiquitous as all emerging technologies.\u00a0 When it becomes more prevalent, this issue will become a strong privacy concern.<\/p>\n","protected":false},"excerpt":{"rendered":"<p>A system can never be completely secure.  A system can only be free of known exploits. <a href=\"https:\/\/secblog.cs.washington.edu\/Security\/2009\/02\/06\/security-review-online-backup\/\">Continue reading <span class=\"meta-nav\">&rarr;<\/span><\/a><\/p>\n","protected":false},"author":98,"featured_media":0,"comment_status":"open","ping_status":"open","sticky":false,"template":"","format":"standard","meta":{"footnotes":""},"categories":[5],"tags":[],"class_list":["post-757","post","type-post","status-publish","format-standard","hentry","category-security-reviews"],"_links":{"self":[{"href":"https:\/\/secblog.cs.washington.edu\/Security\/wp-json\/wp\/v2\/posts\/757","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/secblog.cs.washington.edu\/Security\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/secblog.cs.washington.edu\/Security\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/secblog.cs.washington.edu\/Security\/wp-json\/wp\/v2\/users\/98"}],"replies":[{"embeddable":true,"href":"https:\/\/secblog.cs.washington.edu\/Security\/wp-json\/wp\/v2\/comments?post=757"}],"version-history":[{"count":2,"href":"https:\/\/secblog.cs.washington.edu\/Security\/wp-json\/wp\/v2\/posts\/757\/revisions"}],"predecessor-version":[{"id":760,"href":"https:\/\/secblog.cs.washington.edu\/Security\/wp-json\/wp\/v2\/posts\/757\/revisions\/760"}],"wp:attachment":[{"href":"https:\/\/secblog.cs.washington.edu\/Security\/wp-json\/wp\/v2\/media?parent=757"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/secblog.cs.washington.edu\/Security\/wp-json\/wp\/v2\/categories?post=757"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/secblog.cs.washington.edu\/Security\/wp-json\/wp\/v2\/tags?post=757"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}