Can Cloud Computing Effectively Help Prevent Cybercrime?

Can Cloud Computing Effectively Help Prevent Cybercrime?

Can Cloud Computing Effectively Help Prevent Cybercrime?

cloud-security-infographic

We stand on the edge of the digital age, where technology moves quickly, and our lives have been transformed by modern computing. Digitization has resulted in a staggering amount of information flowing through cyberspace. Processing that data has led to a revolution in how we store and access information.

The idea of the cloud is nothing new. Considered as far back as the 1960s, it was the principle on which the internet was developed. The term “cloud” was coined in the 1990s with the advent of virtual private networks.

Initially used for simplifying business processes, the application of cloud computing quickly gained popularity among scientific and gaming communities as well.

Today the cloud has transcended some of its earlier models and is now widely accepted as a secure means of data storage and shared processing power. Its application in science is vastly accelerating research and has been used with particular success in astronomy.

Despite this, online security remains a hot topic and the internet presents ongoing security concerns. The UK government has stated that cybercrime is a bigger threat than nuclear weapons, with an estimated £27 billion cost a year.

Cybercrime is often the result of poor security protocols and unaffordable IT support for many businesses and individuals. Weak wireless passwords and unencrypted, solid-state storage are often cited as the biggest threats to online security. The advancement of cloud computing offers a reliable solution to these vulnerabilities.

Clouds are not single point servers. They rely on a network of encrypted servers configured to spread information across a wide area. With larger companies and professional web-networks such as Google and Cisco, this methodology ensures a strong architecture and reduces the threat posed by hackers.

The obvious benefit of this system is to remove information from fixed points such as localised networks and individual machines. It effectively eliminates vulnerable access points to data storage and protects against unapproved software installation.

The nature of information spreading does, however, open cloud networks to prolonged attacks designed to identify weak points in security. If one server has weakened defences it provides easy access to other localities in the network.

Many governments consider internet regulation the answer to online security issues. The industry stands firm against it, suggesting regulation will throw up compromises to data ownership, access and security protocols depending on the location of servers.

The answer proposed by the industry is for a self-regulatory body dedicated to research and development of stronger cloud security systems. The idea is of a conglomerate effect as the more people who use the cloud, the stronger it becomes.

The implementation of standardised protocols would further enhance security for weaker systems while providing regulatory standards and anticipating future threats.

So, can cloud computing prevent cybercrime? Certainly by limiting solid state access points, there is a mathematical probability that the security web is stronger. Many are still reluctant to trust third party storage, but the evidence does seem to support the idea that dedicated cloud based security is a step in the right direction.

By Akash Valand,

Akash has worked on behalf of several clients offering marketing, research and insight. Most recently security firm  http://www.wickhill.com

Follow Us!

CloudTweaks

Established in 2009, CloudTweaks.com is recognized as one of the leading authorities in cloud computing information. Most of the excellent CloudTweaks articles are provided by our own paid writers, with a small percentage provided by guest authors from around the globe, including CEOs, CIOs, Technology bloggers and Cloud enthusiasts. Our goal is to continue to build a growing community offering the best in-depth articles, interviews, event listings, whitepapers, infographics and much more...
Follow Us!

2 Responses to Can Cloud Computing Effectively Help Prevent Cybercrime?

  1. I agree that “Many governments consider internet
    regulation the answer to online security issues”. We have to live with
    many current regulations. It is also interesting to see how organizations are
    desperately looking for effective ways to comply to new stringent privacy regulations
    when offshoring data.
    I reviewed an interesting offshoring project in Europe that
    addressed the challenge to protect sensitive information about individuals in a
    way that will satisfy European Cross Border Data Security requirements. This
    included incoming source data from various European banking entities, and
    existing data within those systems, which would be consolidated in one European
    country.
    The project achieved targeted compliance with EU Cross
    Border Data Security laws, Datenschutzgesetz 2000 – DSG 2000 in Austria, and Bundesdatenschutzgesetz
    in Germany by using a data tokenization approach, protecting the data before
    sending and storing it in the cloud.
    I recently read an interesting report from the Aberdeen
    Group that revealed that “Over the last 12 months, tokenization users had
    50% fewer security-related incidents(e.g., unauthorized access, data loss or
    data exposure than tokenization non-users”. Nearly half of the respondents
    (47%) are currently using tokenization for something other than cardholder data
    The name of the study, released a few months ago, is “Tokenization Gets
    Traction”. Aberdeen has also seen “a steady increase in enterprise
    use of tokenization as an alternative to encryption for protecting sensitive
    data”.
    Below are a few words of guidance from the payment card
    industry, PCI SSC. The guidance is applicable for all sensitive data that is
    sent to the cloud. If you outsource to a public-cloud provider, they often have
    multiple data storage systems located in multiple data centers, which may often
    be in multiple countries or regions. Consequently, the client may not know the
    location of their data, or the data may exist in one or more of several
    locations at any particular time.
    Additionally, a client may have little or no visibility into
    the controls protecting their stored data. This can make validation of data security
    and access controls for a specific data set particularly challenging.
    In a public-cloud environment, one client’s data is
    typically stored with data belonging to multiple other clients. This makes a
    public cloud an attractive target for attackers, as the potential gain may be
    greater than that to be attained from attacking a number of organizations
    individually.
    Ulf Mattsson, CTO Protegrity


CloudTweaks Sponsors - Find out more!


Popular

Top Viral Impact

Cloud Infographic – Monetizing Internet Of Things

Cloud Infographic – Monetizing Internet Of Things

Cloud Infographic – Monetizing Internet Of Things There are many interesting ways in which companies are looking to connect devices to the cloud. From the vehicles to kitchen appliances the internet of things is already a $1.9 trillion dollar market based on research estimates from IDC. Included is a fascinating infographic provided by AriaSystems which shows us some…

The Future Of Work: What Cloud Technology Has Allowed Us To Do Better

The Future Of Work: What Cloud Technology Has Allowed Us To Do Better

The Future of Work: What Cloud Technology Has Allowed Us to Do Better The cloud has made our working lives easier, with everything from virtually unlimited email storage to access-from-anywhere enterprise resource planning (ERP) systems. It’s no wonder the 2013 cloud computing research IDG survey revealed at least 84 percent of the companies surveyed run at…

Are Cloud Servers The Right Choice For Your Business?

Are Cloud Servers The Right Choice For Your Business?

Cloud servers offer power, flexibility, reliability, and client friendly hosting for small and medium businesses that have outgrown shared hosting. New business hosting clients are bombarded with an incredible diversity of different choices for their site’s hosting. It can be a challenge to negotiate the range of platforms and the marketing hype that many hosting…

Cloud Infographic – Cloud Fast Facts

Cloud Infographic – Cloud Fast Facts

Cloud Infographic – Cloud Fast Facts It’s no secret that Cloud Computing is more than just a buzz term as that ship has sailed off a long time ago. More and more companies are adopting the uses and benefits of cloud computing while aggressively factoring cloud services spending into their budget. Included is an excellent…

Cloud Infographic: Disaster Recovery

Cloud Infographic: Disaster Recovery

Cloud Infographic: Disaster Recovery  Business downtime can be detrimental without a proper disaster recovery plan in place. Only 6% of businesses that experience downtime without a plan will survive long term. Less than half of all businesses that experience a disaster are likely to reopen their doors. There are many causes of data loss and…


Established in 2009, CloudTweaks is recognized as one of the leading influencers in cloud computing, big data and internet of things (IoT) information. Our goal is to continue to build our growing information portal, by providing the best in-depth articles, interviews, event listings, whitepapers, infographics and much more.

You can help continue to support our community by social sharing, sponsoring, partnering or contributing to this great educational resource.

Contact

CloudTweaks Media
Phone: 1 (212) 763-0021
contact@cloudtweaks.com

Join our newsletter