Episode 5

File Sharing

In this episode we uncover another security enemyā€¯: File Sharing. When you exchange documents between two or more computers not connected through the same network environment, you are doing File Sharing. In case you work on the same network, for example your Lan network, you are able to modify concurrently a file with other users. Otherwise you have to find another way to exchange files, for instance emails although have limits to send large files.

The characters of the story

The story

vignetta
vignetta
vignetta
vignetta
vignetta
vignetta
vignetta
vignetta
vignetta
vignetta
vignetta
vignetta
vignetta
vignetta
vignetta
vignetta
vignetta
vignetta
vignetta

Glossary

File Sharing
Cloud

What is the cloud? Someone would say : "Someone else's computer!". In reality we have to imagine the cloud as a set of many computers that are connected together so tightly, to appear a single large processing center, of which each user uses only a small part. It has different variations, private, hybrid and public, but its nature does not change : shared resources logically divided between different users.

File Sharing
Online document sharing

The systems of "Online Document Sharing" or better of "Document Management", are systems that allow multiple users to access the same data through the cloud. Often they also allow you to work directly online, but generally they are used for the exchange of large documents, when you want to give access to multiple or very large documents.

File Sharing
End-to-end encryption

It's an ecnryption system that allows you to encrypt/decrypt data or messages only from authorized sender or receiver. It's extremely important if you want your data to remain secure and out of sight.

File Sharing
MFA Multifactor authentication

this system allows a user to get on in a system after doing several checks (two or more). For example in addition to username and password, we will be asked for another identity information. This may be a PIN number sent on your smartphone or randomly generated like a soft-token (for instance the system that you use to enter in your online bank account), or a smartcard. Furthermore, this requested information can be a physical characteristic of a user like fingerprint, hand scan, iris scan, etc...

Today's lesson

Important

Free stuff is awesome, you can save a lot of money and time. But not always they are secure. The risk of spreading sensitive data to unauthorized users is around the corner. Before using a File Sharing service found surfing on the Internet, ask your organization if it has already tested and accepted and certified. Otherwise, verify with you IT supervisor if your file sharing is applicable and remember, encrypt data before sending them!

What should I do?

tips