Professional Documents
Culture Documents
Of course cloud computing is dangerous. It would have been dangerous in a blue sky as well. The
only good thing is you may hide yourself in a cloud and would not be found as easily as last year.
Cloud computing
Cloud computing has not been designed for security, but for functionality. Designers will always
optimize visible functionality first and invisible security just as far as it is needed. Who cares about
crashes, data recovery and security? Well, preventive measures costs money and no customer is
paying for invisible options.
By no means these basic predetermined breaking points of security have been restricted to IT-
systems. IT-systems however will be found in all modern equipment, in organizations and
companies. The overwhelming use of vulnerable electronics will inflict all security systems and
organisations.
Of course the quality of electronic devices increases by improvements and technological progress.
Improved quality however cannot compensate the growing risks by increased complexity and the
growing numbers of installed systems. Each year the sum of potential hazards is growing by the
sheer number of installed devices.
Careless IT-operators
Hazards will especially hit the newest, fast growing technologies such as cloud computing. Today
most of the errors are not caused by hackers or criminals but by careless IT-operators of services 3. I
don't wonder about that practice. Especially in cloud computing it's cheaper to leave the testing to
the customers.
Password protection
Most of the password protection systems are unprotected, obsolete fossils from archaic software,
which should have been shredded ages ago4. Someone forgot to replace them by a modern with
longer keys, which provide much more protection.
Encryption
Virtual machines need genuine random numbers to properly encrypt data, but virtual machines don't
provide real random roots to generate security keys. I remember these generators used some
physical environment parameters, but virtual machines do not provide us with true physical objects.
"The security of these cloud-based infrastructure services is like Windows in 1999. It's
being widely used and nothing tremendously bad has happened yet. But it's just in early
stages of getting exposed to the Internet, and you know bad things are coming.5"
Backup Systems
Backup systems for large data volumes are expensive. Growing data volumes may quickly
outperform the backup systems and make it obsolete. An obsolete backup system may be neglected
or even switched off without notice to the owner or system's manager. At regular intervals backups
and other security systems need to be tested like a fire alarm. These tests will only be planned if the
customer will ask and pay for these services, but normally the customer does not even think of these
matters.
1 Cloud Computing is Dangerous
2 Danger in Cloud Computing
3 A Hidden Danger in Cloud Computing
4 The Cloud Isn't Safe?!
5 Quotation by John Pescatore of Gartner in the Financial Times.
Intro Cloud
A cloud is a cloud -
it may start wikileaking rain
and some day it may simply disappear.
Who expects a cloud to be waterproof?
Leaking rain will bring fertility
to grow a few crops
and tons of bad weeds...
Cloud-computing is reported
to be unreliable and unsafe?
I beg you pardon.
What is safety and what is reliability?
Life is safe and reliable – it always ends deadly...
That's what I call
a predictable system.
Cloud computing
is just another
of these global designs
in which security costs
have been restricted
to maximal 10%
of the profits...
Lee's Laws
Lee's Law #1
Technology will always be designed
to work at the borderline of barely acceptable unreliability.
This borderline is named Lee's Limit.
In commercial business the bulk profit will be made
at the expense of safety, and
in military business the bulk profit will be made
at the expense of XXX6.
Lee's Law #2
Global systems will always
restrict costs for security
to acceptable levels such as e.g.
one global, nuclear disaster in 25 years,
one global financial breakdown pro decade
one global cloud computing incident pro year
and three airport hassles each year.
Lee's Law #3
The failure rate for solid-state equipment is proportional
to the clock rate, the number of solid-state devices
the number of wired connections
and the software's number of bytes.
Lee's Law #4
Singular solid-state devices can reach
growing safety levels of 99,9999...%,
but used in large, expanding numbers
they will produce error levels
up one severe catastrophe pro year.
Lee's Law #5
If tsunamis have been registered
to generate altitudes of 29 meters
the engineers will be allowed
to protect the plant up to 30 meter waves.
According to Schrödinger,
the cat remains both alive and dead
(to the universe outside the box)
until the box is opened.
Not me.
I have been checking
my memory
at weekly rates
for hours
with my Checkerboard-program.
• 000376 examine
• 060120 deposit (for a Start from Disk)
• 000377 deposit next
• 000376 examine
• start
My first text-processor
named Open Access
had no access at all
to external devices.
You might choose to open
a file from 10MB-disk
or from a 360kB-floppy.
Cloud Computing
is just another evolutionary step
balancing
at the borderline
of barely acceptable
unreliability.