Skip to main content

Currently Skimming:

1 Security in the Cloud
Pages 1-5

The Chapter Skim interface presents what we've algorithmically identified as the most significant single chunk of text within every page in the chapter.
Select key terms on the right to highlight them within pages of the chapter.


From page 1...
... It has eight applications with more than one billion users -- these include Google Search and Gmail -- and it checks more than 400 million Android devices daily for problems. Every minute it filters out 10 million spam and malicious emails, scans about 700,000 webpages for malintent, and stops 7,000 URLs, executables, browser extensions with viruses, or phishing attempts.
From page 2...
... As an example, she cited recent efforts to fool surveillance cameras by wearing glasses that cause surveillance algorithms to identify someone as a different person. NEW PROTECTIONS Google has continually adopted new security procedures that make its systems more secure.
From page 3...
... Google uses artificial intelligence to build models, automate In a centralized computing detection, and counter threats. And model like the cloud, data because cloud computing centralizes can be curated internally to mitigate the risk of external the data, the cloud enables compa manipulation.
From page 4...
... But this problem is easier to solve in a centralized computing model like the cloud, Greene observed, since data can be curated internally to mitigate the risk of external manipulation. REGULATING SECURITY The regulations governing data privacy are highly related to security in the cloud, Greene noted.
From page 5...
... How can the data for machine learning be made secure? How can security systems be automated so that problems can be detected and fixed?


This material may be derived from roughly machine-read images, and so is provided only to facilitate research.
More information on Chapter Skim is available.