Is Cloud Computing The Perfect Medium For Big Brother?

Is Cloud Computing The Perfect Medium For Big Brother?

Information has always been the most powerful weapon anyone could wield. It allowed Alexander the Great to conquer nations and allowed the U.S. to drive home crippling blows to the enemy during the Second World War on two fronts –in Europe against Germany and in the Pacific against Japan. I am talking about the two preemptive strikes that sank the two most powerful and biggest battleships during that period, Germany’s Bismarck and later Japan’s Yamato. Move forward some five to six decades and the threat has changed; now we not only have to deal with physical threats but cyber ones as well.

The times have changed and threats to national security are no longer as black and white or as defined as nations and groups. Information and data are worth millions and are the new unspoken currency. Now anyone can be a threat and with the emphasis on the World Wide Web and Big Data, anyone can be a possible threat. Cloud Computing is the newest battlefield and the targets could be anyone, the attacker anybody. This new battlefield has given birth to Big Brother and all the good and bad associated with him.

Cloud Computing is the perfect environment for a Big Brother sort of system to thrive because of its public nature. The government can demand the information from these publicly registered companies when circumstances are right and at the extremes. It also makes it easier for a system like that to tap into these public Cloud systems even without the permission or knowledge of the service provider, assuming the technology is there, and we all know it is. Because unlike in a data center environment where no one has a physical connection to the system except the owner, everyone may be able to connect to a public system; sure there are locked doors preventing access, but there are always ways to open doors. The very nature of Cloud Computing makes it one big soup of information trading and espionage that is why a lot of people are still apprehensive of it. But like how the Cold War has sparked fictional stories like that of 007 and Mission Impossible, maybe this time around we would get proper cyber spies.

By Abdul Salam

About Abdul

Abdul is a senior consultant with Energy Services, and author of numerous blogs, books, white papers, and tutorials on cloud computing and accomplished technical writer with CloudTweaks. He earned his bachelor’s degree in Information Technology, followed by an MBA-IT degree and certifications by Cisco and Juniper Networks.

He has recently co-authored: Deploying and Managing a Cloud Infrastructure: Real-World Skills for the CompTIA Cloud+ Certification (Wiley).

View All Articles

Sorry, comments are closed for this post.

How Will The Internet of Things Affect The Business World?

How Will The Internet of Things Affect The Business World?

Internet of Things and the Business World? Experts predict that by 2020, the Internet of Things will have a market greater than $1 Trillion, yet despite it being the new buzzword, many people have no idea how this predicted revolution will shape the business world. We’ve all heard predictions of various appliances with sensors, wearable…

Does Slack Live Up To The Hype?

Does Slack Live Up To The Hype?

Does Slack Live Up to the Hype? Slack’s the definition of a business success story. In just a couple years, it’s evolved from a gaming company’s internal communication tool to a globally used platform that was last valued at $2.8 billion. The popular collaboration tool, dubbed “social media for business,” first made an appearance on…

OpenStack Interoperability – Dawn Of A New Era?

OpenStack Interoperability – Dawn Of A New Era?

The Interoperability Challenge! OpenStack has always had interoperability as one of its unique selling points. Simply put – you can use OpenStack on-premise and what you develop will also work with other OpenStack environments. Open APIs and open source is the common denominator. However until now, it has been an elusive feature or really dream…

What Forecasts Of Data Breaches Should Spell To Cloud Security Practitioners

What Forecasts Of Data Breaches Should Spell To Cloud Security Practitioners

Cloud Security Practitioners And Auditors Today we have seen relatively few data breaches in the cloud despite its growing use for mission-critical workloads. However, as cloud increasingly becomes the backend for our mobile devices, for the Internet of Things (IoT) and for other daily life functions, we can safely predict that hackers will set their…

Securing A Mid-Sized Enterprise: When A Little Assistance Goes A Long Way

Securing A Mid-Sized Enterprise: When A Little Assistance Goes A Long Way

Securing A Mid-Sized Enterprise There is no longer any subjectivity in this statement: security is at the top of list for all CIOs. Every meeting I’ve attended over the last three months has been dominated by the topic of security and when it’s injected into the conversation, it’s not necessarily by my team, but the…

Protecting Devices From Data Breach: Identity of Things (IDoT)

Protecting Devices From Data Breach: Identity of Things (IDoT)

How to Identify and Authenticate in the Expanding IoT Ecosystem It is a necessity to protect IoT devices and their associated data. As the IoT ecosystem continues to expand, the need to create an identity to newly-connected things is becoming increasingly crucial. These ‘things’ can include anything from basic sensors and gateways to industrial controls…

The Global Impact of the USA Freedom Act on Cloud Adoption

The Global Impact of the USA Freedom Act on Cloud Adoption

The Global Impact On Cloud Adoption It’s hard to believe it has been a little over 18 months since Edward Snowden first revealed information about the NSA’s secret surveillance programs to the world. Since that day in June 2013 data privacy and security, specifically in the cloud, have taken on a whole new level of…

CloudTweaks is recognized as one of the leading influencers in cloud computing, infosec, big data and the internet of things (IoT) information. Our goal is to continue to build our growing information portal by providing the best in-depth articles, interviews, event listings, whitepapers, infographics and much more.

Advertising