Description: My second SecurityTube SpeakUp Video, and it's about Cloud Computing
Feel free to leave your opinion and feedback behind...
Contact Me:
Email: ringneckparrot@hotmail.com
Facebook: http://www.facebook.com/ringneckparrot
Twitter ID: pp4rr0t
SecurityTube SpeakUp: Cloud Computing
Tags: securitytube , speak-up , cloud , computing , cloud computing ,
Disclaimer: We are a infosec video aggregator and this video is linked from an external website. The original author may be different from the user re-posting/linking it here. Please do not assume the authors to be same without verifying.
Link to the article on background:
http://cloudaccountinginstitute.org/shared-services-future/
Well let me start.
I'll put aside for now any concerns about security/privacy.
With that in mind the cloud can unlock a lot of possibilities. Today, wireless networks offer internet in a lot of places. Therefore you theoritically have access to this enormous network of resources anywhere you go. It is a no brainer to understand its power. You could edit your code you saved in dropbox back home, you can modify your google documents from your phone or you can brute force all the wpa2 keys from the nearby networks with the cluster you borrowed from amazon.
And with this I would like to step in to security concerns. For us, security enthusiasts the cloud is a very god damn powerful tool. Now from an average user's aspect securiy problems do exist (you upload files to dropbox which is a trustworthy program, but someone could be sniffing your network and dropbox can't help with that). I mean that with the cloud you use some services you can't control. Sure it's nice to send your friend a song you find with shazam in the local restaraunt, but can you trust the restaurants network? Definately not.
Now if you are targeted by a hacker because you work in a very cool company, things get ugly. The last thing you want as a company is a clueless guy about securiy using the cloud.
So yea, cloud computing unlocks for enthusiasts a paradise of resources for testing. It also unlocks a paradise of resources for blackhats. Security risks must be pointed out to people.