Does Cloud Computing Hurt or Help Hackers?


Published on

Published in: Technology, Business
  • Be the first to comment

  • Be the first to like this

No Downloads
Total views
On SlideShare
From Embeds
Number of Embeds
Embeds 0
No embeds

No notes for slide

Does Cloud Computing Hurt or Help Hackers?

  1. 1. Does Cloud Computing Hurt or Help Hackers? Focus Research ©2012 All Rights Reserved
  2. 2. Does Cloud Computing Hurt or Help Hackers?From your personal banking records to your company’s intellectual property and confidential information,data security was easier to oversee before so much of our world moved online and into The Cloud. Butthe convenience of cloud computing is intoxicating, and we’re all living in the cloud more and more everyday, both at work and at play. Unfortunately, with convenience comes exposure. The headlines are rifewith cautionary tales of personal identity theft and corporate data breaches, and hackers show no signsof slowing their efforts to get their hands on sensitive information. So, just how dangerous is the cloud?Is cloud computing enabling cybercrooks, making it easier for them to practice their nefarious trade?, folks tackled the topic of cybercrime in the cloud when answering the question “Does theaccessibility of cloud computing make hacking easier?”Industry analyst James McGovern goes “out on a limb” (albeit a strong limb on an old-growth trunk), andsays yes. He is of a mind that the cloud makes hacking easier “on several fronts”—not the least of whichsaves ne’er-do-wells a good deal of time and trouble. Cybercrooks, it seems, enjoy the convenience ofone-stop online shopping when laying the groundwork for an assault. McGovern asserts: “The ability fora hacker to spin up a couple of thousand instances using a stolen credit card to do a brute force attack iscertainly easier than finding a thousand PCs to turn into zombies via writing custom viruses.”Glen Marshall, principal at Grok-A-Lot, sees the situation differently. He believes cloud computingdoesn’t make hacking easier, it “just introduces new risks that proper risk management would identify.”Phil Wainewright, CEO of Procullux Ventures, seconds Marshall’s no vote, but for a different reason.Wainewright proffers that the sheer accessibility of cloud computing increases the likelihood of hackingattempts, yet also notes that “the operators of cloud computing assets [are] more wary and alert againsthacking attempts.” The net effect, then, is that it’s “harder to hack cloud computing—unless you’re hackinga cloud computing operator that doesn’t have a clue what it’s doing.”Not quite fitting into the straightforward ‘yes/no’ camps, BrainWave Consulting’s Andrew S. Baker steeredthe conversation in another direction. As he sees it, cloud computing doesn’t make hacking easier perse, but it does make for a more desirable target. “Internet-accessible systems can be attacked remotely,”he explains. “What they contain, or the purpose they serve, won’t necessarily make them easier to hack,but might make it more desirable to attack them, due to the greater potential payoff.” Baker notes thatwe’re seeing more attacks on cloud computing because attacks in general are on the rise: “Even if wenever moved beyond basic web hosting and collocation services, we’d be seeing a lot more cyberattacks,because there is still money to be made by doing it, and it’s still relatively difficult to catch the attackers.”Does Cloud Computing Hurt or Help Hackers? Focus Research ©2012 2
  3. 3. OK, so the jury’s out—but one message is clear: When it comes to keeping data safe, as Baker says,“Ongoing vigilance is required, whether or not one embraces the cloud.” Marshall agrees, and puts theonus of responsibility squarely at the cloud provider’s doorstep: “It is still up to a cloud-based serviceprovider to protect itself based on identified risks, just as the same service provider would need to doin a non-cloud environment. The tooling may be different, but the business risk management obligationsremain the same.” Finally, FiveCubits’ Jeff Gullang reminds us that, as is the case with most technology,end-users are often the weakest link. “Everyone knows someone who keeps their password on a stickynote in the third drawer, or wherever else, and half have ‘password12345’ as their log-on,” he says. “Thesystem is strong except for its weakest part: users.” Alec Wagner is a writer, editor, custom content specialist, and content marketing professional. A former managing editor of, he has trained his eye on the enterprise technology space for more than a dozen years. A longtime digital nomad, he divides his time between San Francisco and the South of France. He remembers to thank The Cloud daily for enabling his globetrotting ways. Mr. Wagner also enjoys lively debates about how warring tribes (be it business vs. IT, dev vs. ops, or sales vs. marketing) can find ways to work together better. He is of the opinion that the old chestnut, “There’s no ‘I’ in ‘team,’ ” is quite hackneyed, yet altogether true.Does Cloud Computing Hurt or Help Hackers? Focus Research ©2012 3