Can Cloud Computing Effectively Help Prevent Cybercrime?

Can Cloud Computing Effectively Help Prevent Cybercrime?

Can Cloud Computing Effectively Help Prevent Cybercrime?

cloud-security-infographic

We stand on the edge of the digital age, where technology moves quickly, and our lives have been transformed by modern computing. Digitization has resulted in a staggering amount of information flowing through cyberspace. Processing that data has led to a revolution in how we store and access information.

The idea of the cloud is nothing new. Considered as far back as the 1960s, it was the principle on which the internet was developed. The term “cloud” was coined in the 1990s with the advent of virtual private networks.

Initially used for simplifying business processes, the application of cloud computing quickly gained popularity among scientific and gaming communities as well.

Today the cloud has transcended some of its earlier models and is now widely accepted as a secure means of data storage and shared processing power. Its application in science is vastly accelerating research and has been used with particular success in astronomy.

Despite this, online security remains a hot topic and the internet presents ongoing security concerns. The UK government has stated that cybercrime is a bigger threat than nuclear weapons, with an estimated £27 billion cost a year.

Cybercrime is often the result of poor security protocols and unaffordable IT support for many businesses and individuals. Weak wireless passwords and unencrypted, solid-state storage are often cited as the biggest threats to online security. The advancement of cloud computing offers a reliable solution to these vulnerabilities.

Clouds are not single point servers. They rely on a network of encrypted servers configured to spread information across a wide area. With larger companies and professional web-networks such as Google and Cisco, this methodology ensures a strong architecture and reduces the threat posed by hackers.

The obvious benefit of this system is to remove information from fixed points such as localised networks and individual machines. It effectively eliminates vulnerable access points to data storage and protects against unapproved software installation.

The nature of information spreading does, however, open cloud networks to prolonged attacks designed to identify weak points in security. If one server has weakened defences it provides easy access to other localities in the network.

Many governments consider internet regulation the answer to online security issues. The industry stands firm against it, suggesting regulation will throw up compromises to data ownership, access and security protocols depending on the location of servers.

The answer proposed by the industry is for a self-regulatory body dedicated to research and development of stronger cloud security systems. The idea is of a conglomerate effect as the more people who use the cloud, the stronger it becomes.

The implementation of standardised protocols would further enhance security for weaker systems while providing regulatory standards and anticipating future threats.

So, can cloud computing prevent cybercrime? Certainly by limiting solid state access points, there is a mathematical probability that the security web is stronger. Many are still reluctant to trust third party storage, but the evidence does seem to support the idea that dedicated cloud based security is a step in the right direction.

By Akash Valand,

Akash has worked on behalf of several clients offering marketing, research and insight. Most recently security firm  http://www.wickhill.com

Follow Us!

CloudTweaks

Established in 2009, CloudTweaks.com is recognized as one of the leading authorities in cloud computing information. Most of the excellent CloudTweaks articles are provided by our own paid writers, with a small percentage provided by guest authors from around the globe, including CEOs, CIOs, Technology bloggers and Cloud enthusiasts. Our goal is to continue to build a growing community offering the best in-depth articles, interviews, event listings, whitepapers, infographics and much more...
Follow Us!

2 Responses to Can Cloud Computing Effectively Help Prevent Cybercrime?

  1. I agree that “Many governments consider internet
    regulation the answer to online security issues”. We have to live with
    many current regulations. It is also interesting to see how organizations are
    desperately looking for effective ways to comply to new stringent privacy regulations
    when offshoring data.
    I reviewed an interesting offshoring project in Europe that
    addressed the challenge to protect sensitive information about individuals in a
    way that will satisfy European Cross Border Data Security requirements. This
    included incoming source data from various European banking entities, and
    existing data within those systems, which would be consolidated in one European
    country.
    The project achieved targeted compliance with EU Cross
    Border Data Security laws, Datenschutzgesetz 2000 – DSG 2000 in Austria, and Bundesdatenschutzgesetz
    in Germany by using a data tokenization approach, protecting the data before
    sending and storing it in the cloud.
    I recently read an interesting report from the Aberdeen
    Group that revealed that “Over the last 12 months, tokenization users had
    50% fewer security-related incidents(e.g., unauthorized access, data loss or
    data exposure than tokenization non-users”. Nearly half of the respondents
    (47%) are currently using tokenization for something other than cardholder data
    The name of the study, released a few months ago, is “Tokenization Gets
    Traction”. Aberdeen has also seen “a steady increase in enterprise
    use of tokenization as an alternative to encryption for protecting sensitive
    data”.
    Below are a few words of guidance from the payment card
    industry, PCI SSC. The guidance is applicable for all sensitive data that is
    sent to the cloud. If you outsource to a public-cloud provider, they often have
    multiple data storage systems located in multiple data centers, which may often
    be in multiple countries or regions. Consequently, the client may not know the
    location of their data, or the data may exist in one or more of several
    locations at any particular time.
    Additionally, a client may have little or no visibility into
    the controls protecting their stored data. This can make validation of data security
    and access controls for a specific data set particularly challenging.
    In a public-cloud environment, one client’s data is
    typically stored with data belonging to multiple other clients. This makes a
    public cloud an attractive target for attackers, as the potential gain may be
    greater than that to be attained from attacking a number of organizations
    individually.
    Ulf Mattsson, CTO Protegrity

Join Our Newsletter

Receive updates each week on news, tips, events, comics and much more...

Can I Contribute To CloudTweaks?

Yes, much of our focus in 2015 will be on working with other influencers in a collaborative manner. If you're a technology influencer looking to collaborate with CloudTweaks – a globally recognized leader in cloud computing information – drop us an email with “tech influencer” in the subject line.

What is the 12/12 Program?

This program is designed to better handle the thousands of requests we receive from people looking to submit articles. The 12/12 program is the commitment of 12 articles delivered over a 12-month period.  

Wait! What if I just want to submit one article?

Our popular pay as you go sponsorship program provides the flexibility to submit as you wish and is designed for all budgets.

Contributors

Cloud Infographic – Wearable Tech And Preventative Healthcare

Cloud Infographic – Wearable Tech And Preventative Healthcare

Wearable Tech And Preventative Healthcare There are so many exciting new opportunities available to utilize wearable technology in the future.  Areas such as nanotechnology disease monitoring, crowdfunding to wearable accessories are some excellent examples of the potential. Estimates vary, but appear to suggest that the market will produce between $14-50 Billion over the next few years. Included below

Ten Tips For Successful Business Intelligence Implementation

Ten Tips For Successful Business Intelligence Implementation

Ten Tips for Successful Business Intelligence Implementation The cost of Business Intelligence (BI) software goes far beyond the purchase price. Time spent researching, implementing, and maintaining your BI investment can snowball quickly and mistakes are often expensive. Your time is valuable – save it by learning from other businesses’ experiences. We’ve compiled the top ten

Knots And Cloud Service Providers

Knots And Cloud Service Providers

How Do These Two Compare? In Boy Scouts, I learned how to tie knots. The quickest knot you can tie is the slipknot. It’s very effective for connecting one thing to another via the rope you have. It was used in setting up tents, mooring boats to docks temporarily and lifting your food up into

Big Data

To Have and Have Not: Big Data Initiatives In Developing Countries

To Have and Have Not: Big Data Initiatives In Developing Countries

Big Data Initiatives In Developing Countries The poor of the developing countries are becoming increasingly connected, to the point where they too are part of the Big Data revolution that’s happening across the globe. It didn’t come with laptops, though, as some supposed it would. Whereas it costs a fortune to connect broadband to a

Big Data In Your Garden: Initiatives For Better Understanding Nature

Big Data In Your Garden: Initiatives For Better Understanding Nature

Big Data in Your Garden Big Data and IoT initiatives are springing up all across the globe, making cities, protesters–and just about everything else–smarter. However, thus far there’s been little attention paid to the interactions between these bizarre technologies and living things other than humans. Biology, that is, human biology is one field where Big

Who Holds the Key to the City: Big Data and City Management

Who Holds the Key to the City: Big Data and City Management

Big Data and City Management Cities like New York, Madrid, and especially Rio de Janeiro are augmented with Big Data-powered initiatives that range from combating crime with predictive analytics (New York & Madrid) to providing real-time data for improved management. Although Big Data is no panacea and is mainly used in conjunction with a greater

Internet of Things

Where’s the Capital of the Internet of Things?

Where’s the Capital of the Internet of Things?

Where’s the Capital? We all know the capitals of fashion are London, New York and Paris, while the capital of film is Hollywood (or Bollywood!) – but what’s the new capital of the internet? Specifically, the internet of things? The answer – according to new research by Ozy – might surprise you. It’s not Tokyo, Seoul,

Smart Cities – How Big Data Is Changing The Power Grid

Smart Cities – How Big Data Is Changing The Power Grid

Smart Cities And Big Data As Anthony Townsend argues in his SMART CITIES, even though the communications industry has changed beyond recognition since its inception, the way we consume power has remained stubbornly anachronistic. The rules of physics are, of course, partially to blame, for making grid networks harder to decentralize, as opposed to communication

Aggregated News

Popular News Sources

Why Microsoft CEO Satya Nadella Loves What Steve Ballmer Once Despised

Why Microsoft CEO Satya Nadella Loves What Steve Ballmer Once Despised

“I don’t want to fight old battles,” says Microsoft CEO Satya Nadella. “I want to fight new ones.” It’s Sunday evening, and Nadella is sitting in a glass-enclosed room at the back of a Japanese restaurant in San Francisco’s North Beach neighborhood, eating sushi with a few reporters. The post Why Microsoft CEO Satya Nadella Loves

Apple sales soar after record-breaking iPhone 6 and 6 Plus launch

Apple sales soar after record-breaking iPhone 6 and 6 Plus launch

The US tech giant reported a 16 per cent jump in iPhone sales between July and September, and the strongest growth in Mac computer shipments in years. Read the source article at dailymail.co.uk About Latest Posts Follow Us!CloudTweaksEstablished in 2009, CloudTweaks.com is recognized as one of the leading authorities in cloud computing information. Most of

Q&A: Intel’s Take on Chinese Startups, Innovation

Q&A: Intel’s Take on Chinese Startups, Innovation

Intel’s venture-capital arm on Tuesday said it would be investing $28 million in five Chinese startups that work on new technologies ranging from wearable devices to iris detection. It is Intel Capital’s first infusion from a $100 million China fund launched in April … Read the source article at WSJ Blogs About Latest Posts Follow Us!CloudTweaksEstablished in 2009, CloudTweaks.com is recognized