Is Cloud Computing The Perfect Medium For Big Brother?

Is Cloud Computing The Perfect Medium For Big Brother?

Information has always been the most powerful weapon anyone could wield. It allowed Alexander the Great to conquer nations and allowed the U.S. to drive home crippling blows to the enemy during the Second World War on two fronts –in Europe against Germany and in the Pacific against Japan. I am talking about the two preemptive strikes that sank the two most powerful and biggest battleships during that period, Germany’s Bismarck and later Japan’s Yamato. Move forward some five to six decades and the threat has changed; now we not only have to deal with physical threats but cyber ones as well.

The times have changed and threats to national security are no longer as black and white or as defined as nations and groups. Information and data are worth millions and are the new unspoken currency. Now anyone can be a threat and with the emphasis on the World Wide Web and Big Data, anyone can be a possible threat. Cloud Computing is the newest battlefield and the targets could be anyone, the attacker anybody. This new battlefield has given birth to Big Brother and all the good and bad associated with him.

Cloud Computing is the perfect environment for a Big Brother sort of system to thrive because of its public nature. The government can demand the information from these publicly registered companies when circumstances are right and at the extremes. It also makes it easier for a system like that to tap into these public Cloud systems even without the permission or knowledge of the service provider, assuming the technology is there, and we all know it is. Because unlike in a data center environment where no one has a physical connection to the system except the owner, everyone may be able to connect to a public system; sure there are locked doors preventing access, but there are always ways to open doors. The very nature of Cloud Computing makes it one big soup of information trading and espionage that is why a lot of people are still apprehensive of it. But like how the Cold War has sparked fictional stories like that of 007 and Mission Impossible, maybe this time around we would get proper cyber spies.

By Abdul Salam

Sorry, comments are closed for this post.

Do Not Rely On Passwords To Protect Your Online Information

Do Not Rely On Passwords To Protect Your Online Information

Password Challenges  Simple passwords are no longer safe to use online. John Barco, vice president of Global Product Marketing at ForgeRock, explains why it’s time the industry embraced more advanced identity-centric solutions that improve the customer experience while also providing stronger security. Since the beginning of logins, consumers have used a simple username and password to…

How Formal Verification Can Thwart Change-Induced Network Outages and Breaches

How Formal Verification Can Thwart Change-Induced Network Outages and Breaches

How Formal Verification Can Thwart  Breaches Formal verification is not a new concept. In a nutshell, the process uses sophisticated math to prove or disprove whether a system achieves its desired functional specifications. It is employed by organizations that build products that absolutely cannot fail. One of the reasons NASA rovers are still roaming Mars…

Four Recurring Revenue Imperatives

Four Recurring Revenue Imperatives

Revenue Imperatives “Follow the money” is always a good piece of advice, but in today’s recurring revenue-driven market, “follow the customer” may be more powerful. Two recurring revenue imperatives highlight the importance of responding to, and cherishing customer interactions. Technology and competitive advantage influence the final two. If you’re part of the movement towards recurring…

7 Common Cloud Security Missteps

7 Common Cloud Security Missteps

Cloud Security Missteps Cloud computing remains shrouded in mystery for the average American. The most common sentiment is, “It’s not secure.” Few realize how many cloud applications they access every day: Facebook, Gmail, Uber, Evernote, Venmo, and the list goes on and on… People flock to cloud services for convenient solutions to everyday tasks. They…

What the Dyn DDoS Attacks Taught Us About Cloud-Only EFSS

What the Dyn DDoS Attacks Taught Us About Cloud-Only EFSS

DDoS Attacks October 21st, 2016 went into the annals of Internet history for the large scale Distributed Denial of Service (DDoS) attacks that made popular Internet properties like Twitter, SoundCloud, Spotify and Box inaccessible to many users in the US. The DDoS attack happened in three waves targeting DNS service provider Dyn, resulting in a total of about…

Cloud-Based Services vs. On-Premises: It’s About More Than Just Dollars

Cloud-Based Services vs. On-Premises: It’s About More Than Just Dollars

Cloud-Based Services vs. On-Premises The surface costs might give you pause, but the cost of diminishing your differentiators is far greater. Will a shift to the cloud save you money? Potential savings are historically the main business driver cited when companies move to the cloud, but it shouldn’t be viewed as a cost-saving exercise. There…

The Cloud Is Not Enough! Why Businesses Need Hybrid Solutions

The Cloud Is Not Enough! Why Businesses Need Hybrid Solutions

Why Businesses Need Hybrid Solutions Running a cloud server is no longer the novel trend it once was. Now, the cloud is a necessary data tier that allows employees to access vital company data and maintain productivity from anywhere in the world. But it isn’t a perfect system — security and performance issues can quickly…

Beacons Flopped, But They’re About to Flourish in the Future

Beacons Flopped, But They’re About to Flourish in the Future

Cloud Beacons Flying High When Apple debuted cloud beacons in 2013, analysts predicted 250 million devices capable of serving as iBeacons would be found in the wild within weeks. A few months later, estimates put the figure at just 64,000, with 15 percent confined to Apple stores. Beacons didn’t proliferate as expected, but a few…

Don’t Be Intimidated By Data Governance

Don’t Be Intimidated By Data Governance

Data Governance Data governance, the understanding of the raw data of an organization is an area IT departments have historically viewed as a lose-lose proposition. Not doing anything means organizations run the risk of data loss, data breaches and data anarchy – no control, no oversight – the Wild West with IT is just hoping…