SlideShare a Scribd company logo
Are there criminals hiding in the cloud?
              By Alex Hudson
              BBC Click




Task 1:       Following the exposure of the Sony
Is this the   PlayStation 3 security flaws - and with
underlined    so much of our data stored online - are
Text          we making it too easy for criminals to
              get hold of our information?
              When over 100 million people's details were
              garnered illegally from Sony recently, users
              were up in arms about their prized             Sony's shares have fallen significantly
              information being leaked.                      in the aftermath of the security breach
                                                                                                       Task 2:
              But, according to one study, over two thirds of companies are planning to
              store at least some of their data in "the cloud" - a term used to describe
              putting data online rather than on a hard-drive.                                         The Red coloured text
              With more businesses using the cloud, this sort of leak could become a more
              regular occurrence.
              "While the potential of cloud computing is rapidly being revealed, so too are
              its vulnerabilities," Brendan O'Connor, the Australian minister for Home
              Affairs, told the International Association of Privacy Professionals.
              And, he believes, criminals "can hide data     THE SONY CRISIS
              in clouds" if they are clever about it.        Graham Cluley, security

              "Rogue cloud service providers based in        consultant

              countries with lax cybercrime laws can
              provide confidential hosting and data
              storage services," he said.
                                                             "People need to be more careful with
              "[This] facilitates the storage and            their passwords and make sure that
              distribution of criminal data, avoiding        they have different passwords for
              detection by law enforcement agencies."        different online accounts.
              An easy parallel to draw is with the way
              Swiss bank accounts were rumoured to
                                                             "People should also consider lying
              operate in the past.
                                                             about some of their details. I have
              While bank customers were offered the
                                                             given Facebook a phoney date of birth
              utmost of discretion with their financial      for instance."
              transactions, that same courtesy could now     Sony crisis: The expert panel
              be offered to those wishing to de-encrypt
              sensitive data.
              Stealing secrets
              To safeguard information, details are regularly encrypted to a high level,


              Ricardo Norbert                                                                           Page 1
meaning that - until very recently - supercomputers were required to get any
details in a useable form.
But now the internet itself is offering criminals the chance to super-charge
their processing power to make decryption quicker, cheaper and easier than
ever before.
William Beer, director of Price Waterhouse Cooper's security division, says
"even if credit card details are encrypted, there is software that may be able
to decrypt it given enough processing power" once it has been stolen from the
cloud itself.
"Encryption is often seen as a silver bullet.
We need to be very careful because there
are many different types of encryption. It
can introduce an air of complacency into
organisations and what we're starting to see
are criminals actually looking to the cloud.
"It can provide massive amounts of
processing power and [this] can actually de- PM David Cameron says cyber-crime is
encrypt some of the data. The irony of it is a top priority for national security
that they are using stolen credit cards to buy that processing power from the
cloud providers."
And this type of activity has actually been tested by German security
researcher Thomas Roth.
He used a "brute force" technique that could previously only be possible with
super-computers to break into encrypted WiFi networks.
The technique allows 400,000 different passwords to the encryption to be
tested per second, quite literally knocking at the door until it caves in. No
specialist hacking techniques need to be used.
This was done using a cloud computing service costing just a few dollars per
hour.
Roth used Amazon's Elastic Cloud                    Even if you have
Computing (EC2) system, which allows            supercomputers, if your

users to rent increased computing power by encryption is strong enough, it
the hour or for as long as is needed - thus     would still take years to break
                                                those passwords
the name elastic.
Amazon says it continually works to make
sure the services aren't used for illegal       Mark Bowerman, Financial Fraud
                                                Action UK
activity and takes all claims of misuse of
services very seriously and investigates each one.
While Roth was not doing this for illicit means - and could be done with any
cloud system - the idea could be used, in principle at least, for the purpose of
de-encrypting credit card details.


Ricardo Norbert                                                                     Page 2
He is already experimenting with speeds that could allow one million
passwords a second to be tried.
Hacking 'master key'
What many see as most scary about this idea is that because the criminals
using the cloud are using false information, they are very difficult to trace.
That said, there are data standards in relation to private information kept by
companies which are particularly strict when financial details are held.
"You've got to meet the data security standard - it is the absolute minimum
requirement," says Mark Bowerman, a spokesman for Financial Fraud Action
UK.
"Beyond that, there are reputational issues
to consider. If you are hacked and data is
stolen, then it will be a serious concern both
reputationally and financially as well."
So what can be done to protect information
yourself?
"Unfortunately, people have the habit of
reusing their passwords for multiple             Credit card information is heavily
different services," says Rik Ferguson, of       encrypted when held online

digital security company Trend Micro.
"Many people will have to consider that these criminals have both their email
address and their common password.
"Once you own someone's email account, that's really the master key to
everything because you can go through the password reset process of [a
number of services] and of course, they come back to that email account. It's
the key to your online life."
But, says Bowerman, if both you and the companies you trust with your data
are careful with it, serious breaches are still very unlikely.
"Even if you have supercomputers, the computing power of hundreds of
thousands of computers linked together, if your encryption is strong enough, it
would still take years and years to break those passwords," he says.
"It boils down to how good your encryption is."




Ricardo Norbert                                                                       Page 3
Task 2:


      Names of People Mentioned and their Job Roles.

      Bredan O’Conner, Australian Minister for Home Affairs

      Graham Cluley, Security Consultant

      Thomas Roth, German Security Researcher

      Mark Bowerman, Spokesman for Financial Fraud Action UK

      , Digital Security

      Names of Organisations Mentioned

      Sony Playstation




      Task 3:
                                                                                        Graham Cluley
                            People that are
                            against Fraud
                                                                                        Mark Bowerman




Bredan O’Conner



                           Rik Ferguson                               Thomas Roth


                                                Sony PlayStation

      Summary:


      The spider diagram shows us that the people involved in this article are agreed that fraud and
      believe it should be stopped




      Ricardo Norbert                                                                                  Page 4

More Related Content

DOCX
Assignment 1
PDF
Insecure mag-33
PDF
Cyber Law & Forensics
PDF
Cyber Law & Forensics
PPTX
What i learned at the infosecurity isaca north america expo and conference 2019
PDF
A Guide to Internet Security For Businesses- Business.com
PDF
Does Cloud Computing Compromise Clients?
PDF
A Cyber Security Review
Assignment 1
Insecure mag-33
Cyber Law & Forensics
Cyber Law & Forensics
What i learned at the infosecurity isaca north america expo and conference 2019
A Guide to Internet Security For Businesses- Business.com
Does Cloud Computing Compromise Clients?
A Cyber Security Review

What's hot (20)

PDF
Paranoia or risk management 2013
PPTX
Data breach at sony
PPTX
Risk base approach for security management fujitsu-fms event 15 aug 2011
PPTX
Cybertort Imp Slides For Pub. Internet
PDF
StuartMillar_13616005_PIA
PDF
2015 Labris SOC Annual Report
PDF
Tor talk-prosa-screen
DOCX
Digital inheritance final
PDF
2016 legal seminar for credit professionals
PPTX
Updated Cyber Security and Fraud Prevention Tools Tactics
DOC
111cyber crimes
PDF
Qrator Labs annual report 2017
PPTX
Social media legislation
PDF
Rpt paradigm shifts
PDF
Rpt paradigm shifts
PPTX
Security weekly september 28 october 4, 2021
PDF
Malta Economic Update 06 2008 - isec interview
PDF
Noah Lang's Presentation
PDF
CIR Magazine - Cyber Readiness, key to survival
PDF
Axxera End Point Security Protection
Paranoia or risk management 2013
Data breach at sony
Risk base approach for security management fujitsu-fms event 15 aug 2011
Cybertort Imp Slides For Pub. Internet
StuartMillar_13616005_PIA
2015 Labris SOC Annual Report
Tor talk-prosa-screen
Digital inheritance final
2016 legal seminar for credit professionals
Updated Cyber Security and Fraud Prevention Tools Tactics
111cyber crimes
Qrator Labs annual report 2017
Social media legislation
Rpt paradigm shifts
Rpt paradigm shifts
Security weekly september 28 october 4, 2021
Malta Economic Update 06 2008 - isec interview
Noah Lang's Presentation
CIR Magazine - Cyber Readiness, key to survival
Axxera End Point Security Protection
Ad

Viewers also liked (12)

DOC
Receptionist administrator performance appraisal
PPTX
Mas o menos alumno
DOCX
PPT
Implikasi falsafah pendidikan barat kepada falsafah pendidikan kebangsaan
PPT
Analysis of Covers
DOCX
Proyecto final trafo
PDF
I Remember the Day He Met the Crab
PPTX
Assignment on Trailers
PDF
Change Et Al case studies
PPTX
Ilp bombing presentation
PPT
Evaluation question 1
PPT
서울에서 담양 가는 길
Receptionist administrator performance appraisal
Mas o menos alumno
Implikasi falsafah pendidikan barat kepada falsafah pendidikan kebangsaan
Analysis of Covers
Proyecto final trafo
I Remember the Day He Met the Crab
Assignment on Trailers
Change Et Al case studies
Ilp bombing presentation
Evaluation question 1
서울에서 담양 가는 길
Ad

Similar to Assignment 1 (20)

PDF
Hacking - how accessible is it?
PDF
The Nature of Security
PPTX
3.5 Online Services and Security and Privacy of Data
PPTX
Ao4 powerpoint mrs hussain
PPTX
Ao4 powerpoint mrs hussain
PDF
Cyber Security Matters a book by Hama David Bundo
PDF
Social Network Crime on Rise
DOCX
Technological Threats to Businesses (Independent Study)
PDF
Network Security Introduction Lecture #1
DOC
Steven Leahy_IT 543_Unit 1 Assignment
PPTX
Cyber Security Training in Office Environment
PDF
IT Security Awareness Posters
PPTX
Security Unplugged
DOCX
Security technology
PPTX
Risk Management Practices for PCI DSS 2.0
PDF
Cyber crimes trends to watch-full book-l
PDF
9626 chapter 5 e security
PDF
Sept 2012 data security & cyber liability
PPTX
1713435528251_1709734122381_1708585866621_1708585864158_2.Information Systems...
PPT
News Bytes June 2012
Hacking - how accessible is it?
The Nature of Security
3.5 Online Services and Security and Privacy of Data
Ao4 powerpoint mrs hussain
Ao4 powerpoint mrs hussain
Cyber Security Matters a book by Hama David Bundo
Social Network Crime on Rise
Technological Threats to Businesses (Independent Study)
Network Security Introduction Lecture #1
Steven Leahy_IT 543_Unit 1 Assignment
Cyber Security Training in Office Environment
IT Security Awareness Posters
Security Unplugged
Security technology
Risk Management Practices for PCI DSS 2.0
Cyber crimes trends to watch-full book-l
9626 chapter 5 e security
Sept 2012 data security & cyber liability
1713435528251_1709734122381_1708585866621_1708585864158_2.Information Systems...
News Bytes June 2012

More from NWAce (12)

DOC
Script (1)
DOC
Pc
DOC
Script
PPT
Presentation1
PPT
My Pitch
PPT
Presentation1
PPT
Presentation1
DOCX
Unit 27 cover page
DOC
Questions to answer when analysing a documentary
PPTX
Pitch idea
PPTX
Weeds
PPTX
Weeds
Script (1)
Pc
Script
Presentation1
My Pitch
Presentation1
Presentation1
Unit 27 cover page
Questions to answer when analysing a documentary
Pitch idea
Weeds
Weeds

Recently uploaded (20)

PPTX
202450812 BayCHI UCSC-SV 20250812 v17.pptx
PPTX
Orientation - ARALprogram of Deped to the Parents.pptx
PPTX
Tissue processing ( HISTOPATHOLOGICAL TECHNIQUE
PPTX
Radiologic_Anatomy_of_the_Brachial_plexus [final].pptx
PDF
Chapter 2 Heredity, Prenatal Development, and Birth.pdf
PDF
A systematic review of self-coping strategies used by university students to ...
PDF
RTP_AR_KS1_Tutor's Guide_English [FOR REPRODUCTION].pdf
PDF
OBE - B.A.(HON'S) IN INTERIOR ARCHITECTURE -Ar.MOHIUDDIN.pdf
PPTX
1st Inaugural Professorial Lecture held on 19th February 2020 (Governance and...
PPTX
History, Philosophy and sociology of education (1).pptx
PDF
grade 11-chemistry_fetena_net_5883.pdf teacher guide for all student
PPTX
Introduction-to-Literarature-and-Literary-Studies-week-Prelim-coverage.pptx
PDF
Module 4: Burden of Disease Tutorial Slides S2 2025
PPTX
Microbial diseases, their pathogenesis and prophylaxis
PPTX
UV-Visible spectroscopy..pptx UV-Visible Spectroscopy – Electronic Transition...
PDF
Trump Administration's workforce development strategy
PDF
Chinmaya Tiranga quiz Grand Finale.pdf
PDF
2.FourierTransform-ShortQuestionswithAnswers.pdf
PDF
ChatGPT for Dummies - Pam Baker Ccesa007.pdf
PPTX
UNIT III MENTAL HEALTH NURSING ASSESSMENT
202450812 BayCHI UCSC-SV 20250812 v17.pptx
Orientation - ARALprogram of Deped to the Parents.pptx
Tissue processing ( HISTOPATHOLOGICAL TECHNIQUE
Radiologic_Anatomy_of_the_Brachial_plexus [final].pptx
Chapter 2 Heredity, Prenatal Development, and Birth.pdf
A systematic review of self-coping strategies used by university students to ...
RTP_AR_KS1_Tutor's Guide_English [FOR REPRODUCTION].pdf
OBE - B.A.(HON'S) IN INTERIOR ARCHITECTURE -Ar.MOHIUDDIN.pdf
1st Inaugural Professorial Lecture held on 19th February 2020 (Governance and...
History, Philosophy and sociology of education (1).pptx
grade 11-chemistry_fetena_net_5883.pdf teacher guide for all student
Introduction-to-Literarature-and-Literary-Studies-week-Prelim-coverage.pptx
Module 4: Burden of Disease Tutorial Slides S2 2025
Microbial diseases, their pathogenesis and prophylaxis
UV-Visible spectroscopy..pptx UV-Visible Spectroscopy – Electronic Transition...
Trump Administration's workforce development strategy
Chinmaya Tiranga quiz Grand Finale.pdf
2.FourierTransform-ShortQuestionswithAnswers.pdf
ChatGPT for Dummies - Pam Baker Ccesa007.pdf
UNIT III MENTAL HEALTH NURSING ASSESSMENT

Assignment 1

  • 1. Are there criminals hiding in the cloud? By Alex Hudson BBC Click Task 1: Following the exposure of the Sony Is this the PlayStation 3 security flaws - and with underlined so much of our data stored online - are Text we making it too easy for criminals to get hold of our information? When over 100 million people's details were garnered illegally from Sony recently, users were up in arms about their prized Sony's shares have fallen significantly information being leaked. in the aftermath of the security breach Task 2: But, according to one study, over two thirds of companies are planning to store at least some of their data in "the cloud" - a term used to describe putting data online rather than on a hard-drive. The Red coloured text With more businesses using the cloud, this sort of leak could become a more regular occurrence. "While the potential of cloud computing is rapidly being revealed, so too are its vulnerabilities," Brendan O'Connor, the Australian minister for Home Affairs, told the International Association of Privacy Professionals. And, he believes, criminals "can hide data THE SONY CRISIS in clouds" if they are clever about it. Graham Cluley, security "Rogue cloud service providers based in consultant countries with lax cybercrime laws can provide confidential hosting and data storage services," he said. "People need to be more careful with "[This] facilitates the storage and their passwords and make sure that distribution of criminal data, avoiding they have different passwords for detection by law enforcement agencies." different online accounts. An easy parallel to draw is with the way Swiss bank accounts were rumoured to "People should also consider lying operate in the past. about some of their details. I have While bank customers were offered the given Facebook a phoney date of birth utmost of discretion with their financial for instance." transactions, that same courtesy could now Sony crisis: The expert panel be offered to those wishing to de-encrypt sensitive data. Stealing secrets To safeguard information, details are regularly encrypted to a high level, Ricardo Norbert Page 1
  • 2. meaning that - until very recently - supercomputers were required to get any details in a useable form. But now the internet itself is offering criminals the chance to super-charge their processing power to make decryption quicker, cheaper and easier than ever before. William Beer, director of Price Waterhouse Cooper's security division, says "even if credit card details are encrypted, there is software that may be able to decrypt it given enough processing power" once it has been stolen from the cloud itself. "Encryption is often seen as a silver bullet. We need to be very careful because there are many different types of encryption. It can introduce an air of complacency into organisations and what we're starting to see are criminals actually looking to the cloud. "It can provide massive amounts of processing power and [this] can actually de- PM David Cameron says cyber-crime is encrypt some of the data. The irony of it is a top priority for national security that they are using stolen credit cards to buy that processing power from the cloud providers." And this type of activity has actually been tested by German security researcher Thomas Roth. He used a "brute force" technique that could previously only be possible with super-computers to break into encrypted WiFi networks. The technique allows 400,000 different passwords to the encryption to be tested per second, quite literally knocking at the door until it caves in. No specialist hacking techniques need to be used. This was done using a cloud computing service costing just a few dollars per hour. Roth used Amazon's Elastic Cloud Even if you have Computing (EC2) system, which allows supercomputers, if your users to rent increased computing power by encryption is strong enough, it the hour or for as long as is needed - thus would still take years to break those passwords the name elastic. Amazon says it continually works to make sure the services aren't used for illegal Mark Bowerman, Financial Fraud Action UK activity and takes all claims of misuse of services very seriously and investigates each one. While Roth was not doing this for illicit means - and could be done with any cloud system - the idea could be used, in principle at least, for the purpose of de-encrypting credit card details. Ricardo Norbert Page 2
  • 3. He is already experimenting with speeds that could allow one million passwords a second to be tried. Hacking 'master key' What many see as most scary about this idea is that because the criminals using the cloud are using false information, they are very difficult to trace. That said, there are data standards in relation to private information kept by companies which are particularly strict when financial details are held. "You've got to meet the data security standard - it is the absolute minimum requirement," says Mark Bowerman, a spokesman for Financial Fraud Action UK. "Beyond that, there are reputational issues to consider. If you are hacked and data is stolen, then it will be a serious concern both reputationally and financially as well." So what can be done to protect information yourself? "Unfortunately, people have the habit of reusing their passwords for multiple Credit card information is heavily different services," says Rik Ferguson, of encrypted when held online digital security company Trend Micro. "Many people will have to consider that these criminals have both their email address and their common password. "Once you own someone's email account, that's really the master key to everything because you can go through the password reset process of [a number of services] and of course, they come back to that email account. It's the key to your online life." But, says Bowerman, if both you and the companies you trust with your data are careful with it, serious breaches are still very unlikely. "Even if you have supercomputers, the computing power of hundreds of thousands of computers linked together, if your encryption is strong enough, it would still take years and years to break those passwords," he says. "It boils down to how good your encryption is." Ricardo Norbert Page 3
  • 4. Task 2: Names of People Mentioned and their Job Roles. Bredan O’Conner, Australian Minister for Home Affairs Graham Cluley, Security Consultant Thomas Roth, German Security Researcher Mark Bowerman, Spokesman for Financial Fraud Action UK , Digital Security Names of Organisations Mentioned Sony Playstation Task 3: Graham Cluley People that are against Fraud Mark Bowerman Bredan O’Conner Rik Ferguson Thomas Roth Sony PlayStation Summary: The spider diagram shows us that the people involved in this article are agreed that fraud and believe it should be stopped Ricardo Norbert Page 4