Feeds

The DoD's very cloudy thinking over Gmail

Let's get physical

  • alert
  • submit to reddit

High performance access to file storage

In the wake of the Google vs. China dustup, we’re starting to see some discussion of the greater implications for computing, both in general and the cloudy Google way.

The fact that some Gmail accounts were accessed by hackers looking for dissidents raises some questions about the security of Gmail specifically and the entire cloud model as well.

I’ve always felt that security is one of the biggest concerns with the entire cloud concept. While cloud providers are increasingly paying attention to allaying customer concerns about data security, they aren’t (and really can’t) provide guarantees.

There isn’t a cloud supplier in the world who will agree to compensate a customer for the losses arising from security breaches or associated downtime. This is completely understandable; it’s hugely difficult to objectively value the cost of a security breach.

But there are situations where the stakes are higher than mere money. Take the US Department of Defense, for example. I was shocked to find out that Gmail is an accepted email alternative for official use. To me, this opens up all sorts of bad scenarios. Of course Google does its best to protect customers, but some things simply shouldn’t be stored outside firewalls. I put a significant percentage of DoD communications into this category.

This guest blog from Paul Strassman, an Information Sciences professor at George Mason University, makes a point that is often overlooked: physical security in the data center.

In his view, an agent with bad intentions, some technical skills, and access to the data center could tap unencrypted communications with physical wiretaps placed between systems. Is this far-fetched… or entirely possible? To me, a non-expert in security, it sounds spookily plausible.

If you read the article, be sure to read the comments section to see a spirited discussion ... one of my favorites is the first one, where a reader asks, “DoD using Gmail?!?... Is that not like placing a Kwikset bathroom lock on the access doors to a missle silo?!?”

Certainly something to think about and discuss.

High performance access to file storage

More from The Register

next story
Seagate brings out 6TB HDD, did not need NO STEENKIN' SHINGLES
Or helium filling either, according to reports
European Court of Justice rips up Data Retention Directive
Rules 'interfering' measure to be 'invalid'
Dropbox defends fantastically badly timed Condoleezza Rice appointment
'Nothing is going to change with Dr. Rice's appointment,' file sharer promises
Cisco reps flog Whiptail's Invicta arrays against EMC and Pure
Storage reseller report reveals who's selling what
Bored with trading oil and gold? Why not flog some CLOUD servers?
Chicago Mercantile Exchange plans cloud spot exchange
Just what could be inside Dropbox's new 'Home For Life'?
Biz apps, messaging, photos, email, more storage – sorry, did you think there would be cake?
IT bods: How long does it take YOU to train up on new tech?
I'll leave my arrays to do the hard work, if you don't mind
Amazon reveals its Google-killing 'R3' server instances
A mega-memory instance that never forgets
prev story

Whitepapers

Mainstay ROI - Does application security pay?
In this whitepaper learn how you and your enterprise might benefit from better software security.
Five 3D headsets to be won!
We were so impressed by the Durovis Dive headset we’ve asked the company to give some away to Reg readers.
3 Big data security analytics techniques
Applying these Big Data security analytics techniques can help you make your business safer by detecting attacks early, before significant damage is done.
The benefits of software based PBX
Why you should break free from your proprietary PBX and how to leverage your existing server hardware.
Mobile application security study
Download this report to see the alarming realities regarding the sheer number of applications vulnerable to attack, as well as the most common and easily addressable vulnerability errors.