Cloud services and information security
Cloud services are "in" in the data processing and ICT-technology. The cloud- or network-based systems allow making files straight in the network, and then the files are stored safely in the network. They are easy to find and re-open in different locations, so the worker would make the same file at the workplace and home, and this makes the solution ultimate because the person must not care about the USB sticks or something like them. The base-independent solution would make it possible to modify the files by using every computer, in every location where is internet access.
But this kind of tool can make the worst information security problem in history. If the user of cloud service doesn't care about the data security and stores passwords without protection, that thing can cause that the hackers would get access in every database and files, what the users are stored in the cloud services. And if all data is stored in the cloud behind the week passwords that means that hackers can get access to all data, what is stored in the system.
The data like identities and home addresses of the leaders of the company can be interest criminals. They can attack those people by using the traditional hostage-taking, and that means that the criminals can force the leader to transfer the money to their bank accounts.
So in modern computer crimes, criminal actors can use hybrid tactics like hostage-taking for forcing their targets to transfer money to their bank accounts, so the physical threats are also part of the security. And the same methods can be used to target the military actions against the military leaders or other key persons in the defense.
When the cyber defense is called as "useless", I wonder sometimes what kind of purposes is that kind of writer thinks that cyber warfare is meant? Even if the computers of the tactical systems like bombs or fighter aircraft are not infected and the databases, what involves the strike profiles and another kind of thing, the hackers can steal the identities of the military operators, who have the key role in the defense.
And then the special forces operators can target those persons. So this is one of the key elements for preparing the conflicts. That means that the conflicts can start as a series of assassinations. And if that kind of action is also very dangerous, if it is targeted to the fighter pilots or some other people, who are acting vital roles in the military systems.
No comments:
Post a Comment
Note: Only a member of this blog may post a comment.