data security: an impossible dream ... especially on the cloud!

data security: an impossible dream ... especially on the cloud!

 

Talking about data security in a market that continues to offer the cloud as the ideal solution, it means uniquely identifying one of the insurmountable problems of this paradigm.

Despite the lobbies of the ICT market they are trying in every way to centralize control over everything and everyone, an impossible knot is coming to a head: privacy and data security.

Almost all sources, more or less independent, they can't help but tell the truth: a cloud-based infrastructure is inherently more fragile and less protectable than a network and a physical infrastructure owned and defined in a specific perimeter.

In this article on ICTBusiness it states : “…the forecasts drawn by Websense for the current year: cybercriminals they will focus their attacks more on data stored in the cloud than on those that remain within corporate networks. This will happen, and it's already happening, and because the volume of data that is entrusted to the cloud is growing rapidly, and because it is sometimes easier for hackers to sneak into cloud systems than to overcome the barriers of an on-premise network. "

Not that the network, in itself, guarantees privacy and data security, as Edward Snoweden has shown with some revelations that are for many ( also deliberately !!!!) been interpreted to identify ONLY ONE scapegoat ...

While the reality is much more varied and simple: espionage is an activity within the reach of many, not just national security agencies.

This is demonstrated by the fact that the NSA simply entered the OTT archives to spy on anyone .... without having to make the effort of placing bugs and signalers!!!

... but I repeat ... while the NSA aims to protect against terrorism, the OTTs because they spy on everything and everyone?!?

In this article on key4biz a sentence by Luigi Montuori is reported, Head of the Communications and Telematic Networks Department of the Privacy Guarantor : “…the real danger to confidentiality is not given by the use of individual personal data, but from the possibility of crossing it and combining it with other information collected thus allowing the carrying out of real forms of social filing ... "

But the aberrant reality, it is not limited to where the data is stored and encrypted, on the fact that the network itself spies through cookies, but it also and above all affects everything that passes through smartphones.

In this article on technologyreview this sentence summarizes what is happening in the ICT sector thanks to an infrastructure built to collect data without any limits : “NSA gathers huge amounts of information from cloud computing platforms and wireless carriers, including the numbers ordinary people called and the times they called them. Not only could the government be watching you: so could websites, advertisers, and even retailers trying to track your movements within stores. Modern smartphones and the apps running on them are engineered to collect and disseminate enormous amounts of user data—such as location, Web browsing histories, search terms, and contact lists.”

Among other things, a simple consideration escapes many, but indirect: the ease of spying on us through smartphones , derives from the fact that the infrastructure on which the mobile terminals are based is in the cloud.

There is no inviolable system, but in the light of these facts it is inevitable to come to a conclusion: if data thieves are attracted to "reservoirs" that contain so many, it's part of a solution, pulverize such data and return owners while retaining, the creation, management and processing on owned machines and NOT ON THIRD PARTY SERVERS!

 

ComputArte copyright.

 

Leave a Reply

This site uses cookies to enhance your experience. By continuing to the site you accept their use. More info in our cookies policy.     ACCEPT