×
  • Share
  • Email
  • Embed
  • Like
  • Save
  • Private Content
 

Super secure clouds

by CEO & Chairman at Cochrane Associates on Jun 27, 2012

  • 2,911 views

Cloud Computing could be the biggest single opportunity for a significant improvement in our network and information security for decades. Multiple operators and suppliers offering multiple access ...

Cloud Computing could be the biggest single opportunity for a significant improvement in our network and information security for decades. Multiple operators and suppliers offering multiple access points, services and applications that we can tap at the same time will give us a diversity of new protection mechanisms way beyond those we enjoy today.

For sure we need to improve our log-on processes, firewalls and malware protection, but thin clients change the name of the game. A lack of memory and processing power leverage down any malware sophistication, whilst access and utilisation will be harder to compromise when we choose different devices and servers at random. If we also sign up for applications and services from multiple players, and disperse our information in parsed and scattered locations that are never connected in the same manner more than once, then infiltration will be orders of magnitude more difficult.

All clouds are not the same, and their will be large numbers of them spanning corporates, governments, social and personal applications. Some will last, others will be sporadic and last for seconds. Connections too will be continually varying and sporadic. A moving target is harder to hit, and The Cloud might be the ultimate target!

Statistics

Views

Total Views
2,911
Views on SlideShare
2,848
Embed Views
63

Actions

Likes
4
Downloads
89
Comments
4

2 Embeds 63

http://www.linkedin.com 60
http://us-w1.rockmelt.com 3

Accessibility

Categories

Upload Details

Uploaded via SlideShare as Adobe PDF

Usage Rights

© All Rights Reserved

Report content

Flagged as inappropriate Flag as inappropriate
Flag as inappropriate

Select your reason for flagging this presentation as inappropriate.

Cancel

14 of 4 previous next Post a comment

  • michaelvmeyerstein Michael Meyerstein, Consultant/Director at Meyerstein Consulting Ltd ah yes, but when I use a cloud-based service provider, how do I know that they have set it up properly or if they are as leaky as a sieve? Recent attacks on iPhones, Android phones, gonvernment servers, bank servers and WiFi hotspots show that providers of services and infrastructure are not worthy of trust. Perhaps some kind of internationally recognised accreditation for cloud-storage systems is required. 1 year ago
    Are you sure you want to
    Your message goes here
    Processing…
  • PeterCochrane Peter Cochrane, CEO & Chairman at Cochrane Associates People are always the problem and not the machines! If they choose to dumb things then nothing and non one can help them. It is a matter of choice. BUT we do know how to make very reliable, and very secure systems, using unreliable and insecure components.

    Thus we have an engineering problem - how to engineer people out and security in!

    In this presentation I have given some pretty strong hints and suggestions just how that is to be done :-)
    1 year ago
    Are you sure you want to
    Your message goes here
    Processing…
  • michaelvmeyerstein Michael Meyerstein, Consultant/Director at Meyerstein Consulting Ltd Just another quick comment, regarding the cyber-terrorism and cyber-crime mentioned in the slide presentation. This will become much more of a threat when we adopt wide-scale machine-to-machine technology for essential services such as smart power grids. O brave new world. 1 year ago
    Are you sure you want to
    Your message goes here
    Processing…
  • michaelvmeyerstein Michael Meyerstein, Consultant/Director at Meyerstein Consulting Ltd hmm....I tend to see it as the biggest opportunity for a security cock-up in decades. My bank offered to provide a cloud-based service to back up all my business data but refused to provide any indemnity against my clients' data being stolen by hackers. Can we really rely on some Tom, Dick or Harry entity in a cloud to adequately configure their security? Even the Pentagon didn't adequately protect themselves against bedroom-hobbyist hackers. And do we know that everyone is using thin-client devices to access it? We have to assume that hackers will be using state-of-the-art equipment. On the bright side, IETF has a working group (DECADE) specifying how cloud security should work and they have a very active security WG. But in the end, it comes down to trusting some cloud service provider (who may subcontract the job) to have adequate security controls and to configure them correctly. I am not a trusting person at heart, which is perhaps why I work in the field of information security and why I am an atheist :-) 1 year ago
    Are you sure you want to
    Your message goes here
    Processing…
Post Comment
Edit your comment

Super secure clouds Super secure clouds Presentation Transcript