What do we mean by cloud?

The downside of open source is its very openness. Hackers are using Open Source Intelligence (OSint) to find personal information and even passwords and usernames to plan their exploits.
Organisations like Anonymous and LulzSec have been using Google Code Search - a public beta in which Google let users search for open source code on the Internet - according to Stach & Lui, a penetration testing firm. In Code Search, they can unearth information to assist them in their exploits, for instance finding passwords for cloud services which have been embedded in code, or configuration data for virtual private networks, or just vulnerabilities that lay the system open to other hacking ploys, such as SQL injection.
The Google service is due to be switched off next year as part of the company's rationalisation of its research efforts with the closure of Google Labs but that does not mean that exposed code on the Internet will be safer. There are several sites which provide similar services.
Google's BigTable is the repository of most things the company gleans from its searches, and searching it for nefarious purposes is known as Google Hacking.
A-Team, a white-hat hacking group which appears to have the sole purpose of exposing Anonymous and its various subgroups, wrote a highly critical, sneering condemnation of Google Hacking.
"LulzSec and Anonymous [are] believed to use Google Hacking as a primary means of identifying vulnerable targets," the group blogged in June this year. "Their releases[revelations] have nothing to do with their goals or their lulz [fun]. It's purely based on whatever they find with their 'google hacking' queries and then release it."
Mark Stockley, an independent Web consultant, wrote on the Naked Security blog, "While the findings provide a much-needed wake-up call to online businesses, admins and developers, they also offer a fascinating insight into the motivation of hacking collectives such as Anonymous and LulzSec...
"Rather than being motivated by politics or injustice, hacking groups may simply be targeting organisations because Google Code search has turned up a vulnerability too tempting to ignore, making them less political action groups, more malicious 21st century Wombles," he said.
The best protection is to ensure that nothing is included in code that is useful to a hacker. If it is unavoidable then the information should be stored separately and encrypted.
Colin Tankard, managing director of encryption and security specialist Digital Pathways, advised, "Obviously if the data is encrypted it protects that data wherever it goes as long as the key is never stored with the data. This adds extra control of who or what application is allowed access to the data. By applying encryption with access control organisations can define who or what is allowed access to data."
Source: eWeek
To continue reading
http://www.eweekeurope.co.uk/news/facebook-offers-developers-html5-resource-centre-43310
Cloud computing refers to computer networks that are hosted by outside vendors and are accessible over the Internet.
Until now, the federal government has kept all its networks within its own computer systems.
Last week, the Department of Homeland Security granted a five-year, $5 million contract to computer company CGI Federal Inc. to manage some of its public Web sites. They include DHS.gov, FEMA.gov and USCIS.gov.
Members of the House Homeland Security subcommittee on cybersecurity want to know whether computer hackers who have broken into other Web sites could hack the government Web sites hosted by private companies.
The subcommittee plans a hearing Thursday on the risks of cloud computing.
"In light of the administration's 'Cloud First Policy' and the announced transition by the Department of Homeland Security to cloud computing, my subcommittee will be examining how government information is being managed and secured in the cloud environment," said Daniel E. Lungren (R-CA), chairman of the cybersecurity subcommittee.
The Cloud First Policy refers to President Barack Obama's plan to switch government Web site management to private companies when it can be done at lower cost without security risks.
The Homeland Security Department contract last week was the first of many planned for federal agencies.
Computer networks that contain classified information or represent a public threat if they are hacked will be served only by the government's servers and systems under the Cloud First Policy.
"We also want to hear how the private sector is implementing this shared technology option, its cost savings and risk concerns," Lungren said.
Cloud computing offers its customers easier updates to Web sites, less maintenance and lower costs for equipment and personnel.
The controversies for the government include the potential for layoffs among its computer staff and whether private contractors can be trusted to properly manage the government networks.
Homeland Security Department spokesman Larry Orluskie said his agency's contract with CGI Federal "maintains requisite security for the government's needs and delivers best-in-class return on investment for the citizens of the United States."
CGI Federal said in a statement that its computer management service "contains all of the required enterprise-wide security" the government requires.
The House hearing Thursday could influence whether Obama's Cloud First Policy gets carried out.
Republicans, who hold a majority in the House, must eventually approve funding for the program.
Private companies confront the same issues as the government, but still are making a big push toward cloud computing.
Four out of five businesses plan to switch to cloud computing soon, according to a survey of more than 900 large companies announced this week by the business consulting firm of KPMG.
Ten percent of the companies surveyed reported they already moved their core information networks from internal computers to cloud computing.
A grocery mentioned by KPMG in its study reported it could maintain its inventory better and increase sales by linking its suppliers through a cloud computing ordering network.
Cloud computing is "quickly shifting from a competitive advantage to an operational necessity," said Steve Hill, KPMG's vice chairman of strategic investments.
The cloud computing industry is expected to generate $177 billion in revenue by 2015, compared with $89.4 billion this year, according to industry forecasts.
Source:(AHN)