SlideShare a Scribd company logo
Are there criminals hiding in the cloud?
              By Alex Hudson
              BBC Click




Task 1:       Following the exposure of the Sony
Is this the   PlayStation 3 security flaws - and with
underlined    so much of our data stored online - are
Text          we making it too easy for criminals to
              get hold of our information?
              When over 100 million people's details were
              garnered illegally from Sony recently, users
              were up in arms about their prized             Sony's shares have fallen significantly
              information being leaked.                      in the aftermath of the security breach
                                                                                                       Task 2:
              But, according to one study, over two thirds of companies are planning to
              store at least some of their data in "the cloud" - a term used to describe
              putting data online rather than on a hard-drive.                                         The Red coloured text
              With more businesses using the cloud, this sort of leak could become a more
              regular occurrence.
              "While the potential of cloud computing is rapidly being revealed, so too are
              its vulnerabilities," Brendan O'Connor, the Australian minister for Home
              Affairs, told the International Association of Privacy Professionals.
              And, he believes, criminals "can hide data     THE SONY CRISIS
              in clouds" if they are clever about it.        Graham Cluley, security

              "Rogue cloud service providers based in        consultant

              countries with lax cybercrime laws can
              provide confidential hosting and data
              storage services," he said.
                                                             "People need to be more careful with
              "[This] facilitates the storage and            their passwords and make sure that
              distribution of criminal data, avoiding        they have different passwords for
              detection by law enforcement agencies."        different online accounts.
              An easy parallel to draw is with the way
              Swiss bank accounts were rumoured to
                                                             "People should also consider lying
              operate in the past.
                                                             about some of their details. I have
              While bank customers were offered the
                                                             given Facebook a phoney date of birth
              utmost of discretion with their financial      for instance."
              transactions, that same courtesy could now     Sony crisis: The expert panel
              be offered to those wishing to de-encrypt
              sensitive data.
              Stealing secrets
              To safeguard information, details are regularly encrypted to a high level,


              Ricardo Norbert                                                                           Page 1
meaning that - until very recently - supercomputers were required to get any
details in a useable form.
But now the internet itself is offering criminals the chance to super-charge
their processing power to make decryption quicker, cheaper and easier than
ever before.
William Beer, director of Price Waterhouse Cooper's security division, says
"even if credit card details are encrypted, there is software that may be able
to decrypt it given enough processing power" once it has been stolen from the
cloud itself.
"Encryption is often seen as a silver bullet.
We need to be very careful because there
are many different types of encryption. It
can introduce an air of complacency into
organisations and what we're starting to see
are criminals actually looking to the cloud.
"It can provide massive amounts of
processing power and [this] can actually de- PM David Cameron says cyber-crime is
encrypt some of the data. The irony of it is a top priority for national security
that they are using stolen credit cards to buy that processing power from the
cloud providers."
And this type of activity has actually been tested by German security
researcher Thomas Roth.
He used a "brute force" technique that could previously only be possible with
super-computers to break into encrypted WiFi networks.
The technique allows 400,000 different passwords to the encryption to be
tested per second, quite literally knocking at the door until it caves in. No
specialist hacking techniques need to be used.
This was done using a cloud computing service costing just a few dollars per
hour.
Roth used Amazon's Elastic Cloud                    Even if you have
Computing (EC2) system, which allows            supercomputers, if your

users to rent increased computing power by encryption is strong enough, it
the hour or for as long as is needed - thus     would still take years to break
                                                those passwords
the name elastic.
Amazon says it continually works to make
sure the services aren't used for illegal       Mark Bowerman, Financial Fraud
                                                Action UK
activity and takes all claims of misuse of
services very seriously and investigates each one.
While Roth was not doing this for illicit means - and could be done with any
cloud system - the idea could be used, in principle at least, for the purpose of
de-encrypting credit card details.


Ricardo Norbert                                                                     Page 2
He is already experimenting with speeds that could allow one million
passwords a second to be tried.
Hacking 'master key'
What many see as most scary about this idea is that because the criminals
using the cloud are using false information, they are very difficult to trace.
That said, there are data standards in relation to private information kept by
companies which are particularly strict when financial details are held.
"You've got to meet the data security standard - it is the absolute minimum
requirement," says Mark Bowerman, a spokesman for Financial Fraud Action
UK.
"Beyond that, there are reputational issues
to consider. If you are hacked and data is
stolen, then it will be a serious concern both
reputationally and financially as well."
So what can be done to protect information
yourself?
"Unfortunately, people have the habit of
reusing their passwords for multiple             Credit card information is heavily
different services," says Rik Ferguson, of       encrypted when held online

digital security company Trend Micro.
"Many people will have to consider that these criminals have both their email
address and their common password.
"Once you own someone's email account, that's really the master key to
everything because you can go through the password reset process of [a
number of services] and of course, they come back to that email account. It's
the key to your online life."
But, says Bowerman, if both you and the companies you trust with your data
are careful with it, serious breaches are still very unlikely.
"Even if you have supercomputers, the computing power of hundreds of
thousands of computers linked together, if your encryption is strong enough, it
would still take years and years to break those passwords," he says.
"It boils down to how good your encryption is."




Ricardo Norbert                                                                       Page 3
Task 2:


      Names of People Mentioned and their Job Roles.

      Bredan O’Conner, Australian Minister for Home Affairs

      Graham Cluley, Security Consultant

      Thomas Roth, German Security Researcher

      Mark Bowerman, Spokesman for Financial Fraud Action UK

      , Digital Security

      Names of Organisations Mentioned

      Sony Playstation




      Task 3:
                                                                                        Graham Cluley
                            People that are
                            against Fraud
                                                                                        Mark Bowerman




Bredan O’Conner



                           Rik Ferguson                               Thomas Roth


                                                Sony PlayStation

      Summary:


      The spider diagram shows us that the people involved in this article are agreed that fraud should be
      stopped and want do their best to prevent this crime.




      Ricardo Norbert                                                                               Page 4

More Related Content

DOCX
Assignment 1
PDF
Insecure mag-33
PDF
Cyber Law & Forensics
PDF
Cyber Law & Forensics
PDF
Cyber Law & Forensics
PPTX
What i learned at the infosecurity isaca north america expo and conference 2019
PDF
A Guide to Internet Security For Businesses- Business.com
PDF
Does Cloud Computing Compromise Clients?
Assignment 1
Insecure mag-33
Cyber Law & Forensics
Cyber Law & Forensics
Cyber Law & Forensics
What i learned at the infosecurity isaca north america expo and conference 2019
A Guide to Internet Security For Businesses- Business.com
Does Cloud Computing Compromise Clients?

What's hot (20)

PDF
A Cyber Security Review
PPTX
Cybertort Imp Slides For Pub. Internet
DOCX
Digital inheritance final
PPTX
Risk base approach for security management fujitsu-fms event 15 aug 2011
PDF
StuartMillar_13616005_PIA
PDF
Qrator Labs annual report 2017
DOC
111cyber crimes
PPTX
Social media legislation
PPTX
Data breach at sony
PDF
2016 legal seminar for credit professionals
PPTX
Updated Cyber Security and Fraud Prevention Tools Tactics
PDF
Paranoia or risk management 2013
PDF
Noah Lang's Presentation
PDF
2015 Labris SOC Annual Report
PDF
CIR Magazine - Cyber Readiness, key to survival
PDF
Tor talk-prosa-screen
PDF
Rpt paradigm shifts
PDF
Rpt paradigm shifts
PPTX
Security weekly september 28 october 4, 2021
PDF
Fingerpay
A Cyber Security Review
Cybertort Imp Slides For Pub. Internet
Digital inheritance final
Risk base approach for security management fujitsu-fms event 15 aug 2011
StuartMillar_13616005_PIA
Qrator Labs annual report 2017
111cyber crimes
Social media legislation
Data breach at sony
2016 legal seminar for credit professionals
Updated Cyber Security and Fraud Prevention Tools Tactics
Paranoia or risk management 2013
Noah Lang's Presentation
2015 Labris SOC Annual Report
CIR Magazine - Cyber Readiness, key to survival
Tor talk-prosa-screen
Rpt paradigm shifts
Rpt paradigm shifts
Security weekly september 28 october 4, 2021
Fingerpay
Ad

Similar to Assignment 1 (20)

PPTX
Lofty Ideals: The Nature of Clouds and Encryption
PPTX
Cubeitz 1 Million Bit Encryption
PDF
9 Trends in Identity Verification (2023) by Regula
PDF
Secure Cloud For Legal Professionals
PPTX
Gdpr encryption and tokenization
PDF
Cloud risk management
PDF
Kadai1
PDF
Consequences of Misusing Blockchain Technology.
PDF
Hacking - how accessible is it?
PDF
Securing data in the cloud: A challenge for UK Law Firms
PDF
Malta Economic Update 06 2008 - isec interview
PPT
2009 10 21 Rajgoel Trends In Financial Crimes
PPTX
Cloud Computing: New Approaches for Security
PDF
Data leakage detbxhbbhhbsbssusbgsgsbshsbsection.pdf
PPTX
dataleakagedetection-1811210400vgjcd01.pptx
PPTX
Data leakage detection
PDF
Wk online trust solutions overview january 2012
PDF
TME0212-49
PDF
Cybersecurity Forecast For 2023
Lofty Ideals: The Nature of Clouds and Encryption
Cubeitz 1 Million Bit Encryption
9 Trends in Identity Verification (2023) by Regula
Secure Cloud For Legal Professionals
Gdpr encryption and tokenization
Cloud risk management
Kadai1
Consequences of Misusing Blockchain Technology.
Hacking - how accessible is it?
Securing data in the cloud: A challenge for UK Law Firms
Malta Economic Update 06 2008 - isec interview
2009 10 21 Rajgoel Trends In Financial Crimes
Cloud Computing: New Approaches for Security
Data leakage detbxhbbhhbsbssusbgsgsbshsbsection.pdf
dataleakagedetection-1811210400vgjcd01.pptx
Data leakage detection
Wk online trust solutions overview january 2012
TME0212-49
Cybersecurity Forecast For 2023
Ad

More from NWAce (12)

DOC
Script (1)
DOC
Pc
DOC
Script
PPT
Presentation1
PPT
My Pitch
PPT
Presentation1
PPT
Presentation1
DOCX
Unit 27 cover page
DOC
Questions to answer when analysing a documentary
PPTX
Pitch idea
PPTX
Weeds
PPTX
Weeds
Script (1)
Pc
Script
Presentation1
My Pitch
Presentation1
Presentation1
Unit 27 cover page
Questions to answer when analysing a documentary
Pitch idea
Weeds
Weeds

Recently uploaded (20)

PPTX
UNIT III MENTAL HEALTH NURSING ASSESSMENT
PPTX
Cell Structure & Organelles in detailed.
PDF
What if we spent less time fighting change, and more time building what’s rig...
PPTX
Introduction-to-Literarature-and-Literary-Studies-week-Prelim-coverage.pptx
PPTX
Final Presentation General Medicine 03-08-2024.pptx
PDF
GENETICS IN BIOLOGY IN SECONDARY LEVEL FORM 3
PDF
Paper A Mock Exam 9_ Attempt review.pdf.
PPTX
Final Presentation General Medicine 03-08-2024.pptx
PDF
Trump Administration's workforce development strategy
PDF
STATICS OF THE RIGID BODIES Hibbelers.pdf
PDF
grade 11-chemistry_fetena_net_5883.pdf teacher guide for all student
PDF
Microbial disease of the cardiovascular and lymphatic systems
PDF
Yogi Goddess Pres Conference Studio Updates
PPTX
Lesson notes of climatology university.
PDF
LDMMIA Reiki Yoga Finals Review Spring Summer
PDF
A GUIDE TO GENETICS FOR UNDERGRADUATE MEDICAL STUDENTS
PDF
LNK 2025 (2).pdf MWEHEHEHEHEHEHEHEHEHEHE
PDF
Anesthesia in Laparoscopic Surgery in India
PDF
ChatGPT for Dummies - Pam Baker Ccesa007.pdf
PDF
Classroom Observation Tools for Teachers
UNIT III MENTAL HEALTH NURSING ASSESSMENT
Cell Structure & Organelles in detailed.
What if we spent less time fighting change, and more time building what’s rig...
Introduction-to-Literarature-and-Literary-Studies-week-Prelim-coverage.pptx
Final Presentation General Medicine 03-08-2024.pptx
GENETICS IN BIOLOGY IN SECONDARY LEVEL FORM 3
Paper A Mock Exam 9_ Attempt review.pdf.
Final Presentation General Medicine 03-08-2024.pptx
Trump Administration's workforce development strategy
STATICS OF THE RIGID BODIES Hibbelers.pdf
grade 11-chemistry_fetena_net_5883.pdf teacher guide for all student
Microbial disease of the cardiovascular and lymphatic systems
Yogi Goddess Pres Conference Studio Updates
Lesson notes of climatology university.
LDMMIA Reiki Yoga Finals Review Spring Summer
A GUIDE TO GENETICS FOR UNDERGRADUATE MEDICAL STUDENTS
LNK 2025 (2).pdf MWEHEHEHEHEHEHEHEHEHEHE
Anesthesia in Laparoscopic Surgery in India
ChatGPT for Dummies - Pam Baker Ccesa007.pdf
Classroom Observation Tools for Teachers

Assignment 1

  • 1. Are there criminals hiding in the cloud? By Alex Hudson BBC Click Task 1: Following the exposure of the Sony Is this the PlayStation 3 security flaws - and with underlined so much of our data stored online - are Text we making it too easy for criminals to get hold of our information? When over 100 million people's details were garnered illegally from Sony recently, users were up in arms about their prized Sony's shares have fallen significantly information being leaked. in the aftermath of the security breach Task 2: But, according to one study, over two thirds of companies are planning to store at least some of their data in "the cloud" - a term used to describe putting data online rather than on a hard-drive. The Red coloured text With more businesses using the cloud, this sort of leak could become a more regular occurrence. "While the potential of cloud computing is rapidly being revealed, so too are its vulnerabilities," Brendan O'Connor, the Australian minister for Home Affairs, told the International Association of Privacy Professionals. And, he believes, criminals "can hide data THE SONY CRISIS in clouds" if they are clever about it. Graham Cluley, security "Rogue cloud service providers based in consultant countries with lax cybercrime laws can provide confidential hosting and data storage services," he said. "People need to be more careful with "[This] facilitates the storage and their passwords and make sure that distribution of criminal data, avoiding they have different passwords for detection by law enforcement agencies." different online accounts. An easy parallel to draw is with the way Swiss bank accounts were rumoured to "People should also consider lying operate in the past. about some of their details. I have While bank customers were offered the given Facebook a phoney date of birth utmost of discretion with their financial for instance." transactions, that same courtesy could now Sony crisis: The expert panel be offered to those wishing to de-encrypt sensitive data. Stealing secrets To safeguard information, details are regularly encrypted to a high level, Ricardo Norbert Page 1
  • 2. meaning that - until very recently - supercomputers were required to get any details in a useable form. But now the internet itself is offering criminals the chance to super-charge their processing power to make decryption quicker, cheaper and easier than ever before. William Beer, director of Price Waterhouse Cooper's security division, says "even if credit card details are encrypted, there is software that may be able to decrypt it given enough processing power" once it has been stolen from the cloud itself. "Encryption is often seen as a silver bullet. We need to be very careful because there are many different types of encryption. It can introduce an air of complacency into organisations and what we're starting to see are criminals actually looking to the cloud. "It can provide massive amounts of processing power and [this] can actually de- PM David Cameron says cyber-crime is encrypt some of the data. The irony of it is a top priority for national security that they are using stolen credit cards to buy that processing power from the cloud providers." And this type of activity has actually been tested by German security researcher Thomas Roth. He used a "brute force" technique that could previously only be possible with super-computers to break into encrypted WiFi networks. The technique allows 400,000 different passwords to the encryption to be tested per second, quite literally knocking at the door until it caves in. No specialist hacking techniques need to be used. This was done using a cloud computing service costing just a few dollars per hour. Roth used Amazon's Elastic Cloud Even if you have Computing (EC2) system, which allows supercomputers, if your users to rent increased computing power by encryption is strong enough, it the hour or for as long as is needed - thus would still take years to break those passwords the name elastic. Amazon says it continually works to make sure the services aren't used for illegal Mark Bowerman, Financial Fraud Action UK activity and takes all claims of misuse of services very seriously and investigates each one. While Roth was not doing this for illicit means - and could be done with any cloud system - the idea could be used, in principle at least, for the purpose of de-encrypting credit card details. Ricardo Norbert Page 2
  • 3. He is already experimenting with speeds that could allow one million passwords a second to be tried. Hacking 'master key' What many see as most scary about this idea is that because the criminals using the cloud are using false information, they are very difficult to trace. That said, there are data standards in relation to private information kept by companies which are particularly strict when financial details are held. "You've got to meet the data security standard - it is the absolute minimum requirement," says Mark Bowerman, a spokesman for Financial Fraud Action UK. "Beyond that, there are reputational issues to consider. If you are hacked and data is stolen, then it will be a serious concern both reputationally and financially as well." So what can be done to protect information yourself? "Unfortunately, people have the habit of reusing their passwords for multiple Credit card information is heavily different services," says Rik Ferguson, of encrypted when held online digital security company Trend Micro. "Many people will have to consider that these criminals have both their email address and their common password. "Once you own someone's email account, that's really the master key to everything because you can go through the password reset process of [a number of services] and of course, they come back to that email account. It's the key to your online life." But, says Bowerman, if both you and the companies you trust with your data are careful with it, serious breaches are still very unlikely. "Even if you have supercomputers, the computing power of hundreds of thousands of computers linked together, if your encryption is strong enough, it would still take years and years to break those passwords," he says. "It boils down to how good your encryption is." Ricardo Norbert Page 3
  • 4. Task 2: Names of People Mentioned and their Job Roles. Bredan O’Conner, Australian Minister for Home Affairs Graham Cluley, Security Consultant Thomas Roth, German Security Researcher Mark Bowerman, Spokesman for Financial Fraud Action UK , Digital Security Names of Organisations Mentioned Sony Playstation Task 3: Graham Cluley People that are against Fraud Mark Bowerman Bredan O’Conner Rik Ferguson Thomas Roth Sony PlayStation Summary: The spider diagram shows us that the people involved in this article are agreed that fraud should be stopped and want do their best to prevent this crime. Ricardo Norbert Page 4