Wednesday, February 20, 2013

Hacking and Cloud Computing - Phase Two

     My topic will be about computer hacking and how it poses a severe threat to cloud systems. In recent years hacking has been a serious issue, making it seem like anyone can just get into your computer whenever they want to, especially when you hear the stories about the hacking group, Anonymous. It's interesting to me because it's amazing how people are able to bypass any kind of security measure a computer system may put up. I believe researching this topic can help me understand hacking better so I can provide better security for computer or networking systems. Anyone who finds an interest in computer security or hacking may find my further research intriguing. Until next time.

-Derek S.

4 comments:

  1. Derek, this sounds like a great topic for you to spend the semester researching. I'm especially interested in the connection you make between hacking and cloud systems, a newer technology with immediate implications for cloud users.

    As you continue your research process and your research investigation becomes more focused and narrow, you should be able to pinpoint a more specific audience that has a stake in the information and conclusions you're pulling together.

    ReplyDelete
  2. Derek, this intrigues me because I have had problems with hackers, viruses, and trojans in the past. Some questions I have for you are as follows: Can hackers get to your computer through the cloud system, or do they have to go through your computer? Do hackers target cloud systems or does hacking affect them indirectly?

    ReplyDelete
    Replies
    1. Hackers can either worm their way into your computer if your computer is connected to a cloud system or they can just hack directly into your computer. Really it's just two different methods to accomplish the same thing, but getting directly into your computer would involve infecting your computer with a virus of some kind and creating a back door that the hacker can access remotely without you ever knowing. Cloud systems would be a necessary target as it would allow them easy access to hundreds or thousands of other computers linked to said cloud system. Rather than hacking a computer one by one, they could hack all of them fairly easily and simultaneously using cloud systems.

      Delete
  3. Interestingly enough, there is something called a Tor network now that I have been reading about that could help secure people against certain kinds of spying or hacking. It is funny, I think it was actually Anonymous itself that was pushing for internet privacy, yet the same Tor network that can keep people "anonymous" on the internet might also be used by companies to prevent hackers from getting at information? Just a thought.

    ReplyDelete