Blog

2.4.2. Cloud Access Security

If we want to know what digital identity really is, we must take a journey. Watch the video, think, and do the self-reflection bellow. This is the first lesson in row.

Lesson goals and objectives

In this lesson you will learn:

  • that our data is accessible on The Cloud for our use but also for the onlookers.
  • Public wifi networks can be a security hole for our data.
  • that the eID allows us to identify and authenticate ourselves safely and unambiguously in a digital environment.

Currently, most of the data we work with on a daily basis is not stored on our devices and laptops, but these are the tools to be able to reach, treat, modify, store and share that data available on multiple and different corporate and institutional platforms.

Access to them has been simplified to such an extent that if we do not pay the utmost attention, this data may end up in the hands of unauthorised third parties. While corporations must guarantee this inviolability, we users have a very significant amount of responsibility in this regard.

1.4.2.1. Public WiFi. Safe access policy

Would you trust the access details to your bank account, medical records or social networks, written on a postcard for a stranger to take to your destination?

Then, why aren’t we more careful when we connect to the Internet, to transmit those same data, through an unknown wifi?

1.4.2.2. VPN / Tunnel

Following the example of the postcard with our personal data, if we put it inside a closed envelope, the reading of the data is out of the reach of onlookers and curious people.

1.4.2.3. eID Card

The secure and unequivocal identification of individuals is one of the concerns of countries. This task becomes more difficult as administrative and business procedures are transferred from face-to-face to digital distance environments.

How can we guarantee Authentication or that the person is really who they say they are and not an impostor? How can we avoid Non-Repudiation or Non-Disclosure because we can prove the participation of the parties in the conversation/relationship? How can we guarantee the Integrity of the data and that nobody has manipulated the original message? or Confidentiality so that the message cannot be “understood” by someone for whom it is not intended.

1.4.2.4. Sharing information

In addition to all those times when we voluntarily want to share information with our co-workers, family and friends, just as in Charles Perrault’s tale of Hop-o’-My-Thumb (French: Le Petit Poucet, Spanish: “Pulgarcito”), who left breadcrumbs on his way home, we leave a trail of digital data in most of the activities we do.