Cloud Computer and Insider Threats
Cloud computing is widely regarded as the wave of the future. "Cloud computing is all the rage. It's become the phrase du jour" (Knorr & Gruen 2011). However, many people throw the phrase around without truly understanding what it really is. "Cloud computing comes into focus only when you think about what IT always needs: a way to increase capacity or add capabilities on the fly without investing in new infrastructure, training new personnel, or licensing new software" (Knorr & Gruen 2011). It may include many different types of services, some of which are subscription-based, others of which are pay-per-use (Knorr & Gruen 2011). For example, with SaS (software as a service), one of the most common types of hosting, this means no "upfront investment in servers or software licensing; on the provider side, with just one app to maintain, costs are low compared to conventional hosting" (Knorr & Gruen 2011). At its essence, what is so revolutionary about cloud computing is that it obviates the need for hardware and physical storage; rather, "clients lease these resources from a cloud provider as an outsourced service" (Malik & Nazir 2012: 390).
The cloud has the potential to convey many cost savings to organizations, and improve speed and efficiency as well as reduce the physical encumbrances placed upon smaller organizations. However, there are also fears about its risks. "Cloud computing services provide a resource for organizations to improve business efficiency, but also expose new possibilities for insider attacks. Fortunately, it appears that few, if any, rogue administrator attacks have been successful within cloud service providers, but insiders continue to abuse organizational trust in other ways, such as using cloud services to carry out attacks" (Claycomb, & Nicoll 2012: 10). But many fear that this relatively strong track record thus far is merely a reflection of the relative youth of cloud computing, and it is only a matter of time before serious threats become chronic.
The lack of 'rogue' administrator attacks may cause many organizations to be sanguine about monitoring user patters. Particularly since the technology is still in its nascent stages, organizations may be uncertain of how to guard against threats and their potential for misuse resulting in a lack of appropriate monitoring that would be customary with the deployment of other technological applications. The solution to this problem is not to fear cloud computing, but to become more aware of potential risks and to develop employee monitoring systems before threats from inside do begin to assert themselves in a more pervasive fashion.
"Some observable insider activities are clearly harmful to the organization -- for instance, an insider deleting critical applications from the organization's servers. However, not all insider activity is so blatantly malicious" (Claycomb, & Nicoll 2012: 9). To accumulate data upon the subject is essential, and one critical area is the ability to compare normal user patterns in a cloud computing scenario with that of malicious attacks by insiders. "The lack of sufficient real-world data that has 'ground truth' enabling adequate scientific verification and validation of proposed solutions" lays cloud computing systems open to vulnerabilities and increases "the difficulty in distinguishing between malicious insider behavior and what can be described as normal or legitimate behavior" (Claycomb, & Nicoll 2012: 9).
Research is required to determine when and how user attacks are likely to occur, with the hope of generating a comparative framework of normal vs. malicious patterns of use in cloud computing in terms of both technical and non-technically measured behaviors. There has been a call for "automated, easy to understand, and easily verifiable policy management techniques for cloud-based systems' (Claycomb, & Nicoll 2012: 9). The extent to which this is feasible, along with the real potential scope of insider threats is hotly-debated.
Memo 2.2. Clarifying the locus of the inquiry
The focus of my study will be on how to guard against insider threats within cloud computing systems, specifically to determine if normal user patterns can be established in such a way to distinguish them against malicious use patters. The study will also seek to understand why and when insider threats are likely to occur, and how a trusted employee and business associate can potentially exploit the cloud. It will compare the value of searching for technical red flags regarding employee behavior (such as eccentric log-in patterns and violations of search policies) with non-technical, qualitative behaviors that indicate the potential for the employee to pose an insider threat (Claycomb, & Nicoll 2012: 9).
Aggrieved employees can exploit vulnerabilities in their relationship with their clients...
Our semester plans gives you unlimited, unrestricted access to our entire library of resources —writing tools, guides, example essays, tutorials, class notes, and more.
Get Started Now