Skip to main content

Security and Privacy Challenges

  • Chapter
  • First Online:
Inventing the Cloud Century

Abstract

With the availability of international networks and with the wide distribution of personal computers, the occurrence of security threads and violations became a mass phenomenon. In parallel to the development of the new economies, a shadow industry of criminal organizations appeared. We will analyze the different types of threads and the technologies used today to break into computer systems and data collections and give an overview on security measures that are used for risk reduction.

If all that Americans want is security, they can go to prison. They’ll have enough to eat, a bed and a roof over their heads. But if an American wants to preserve his dignity and his equality as a human being, he must not bow his neck to any dictatorial government.

Dwight D. Eisenhower.

All human beings have three lives: public, private, and secret.

Gabriel García Márquez: A Life.

This is a preview of subscription content, log in via an institution to check access.

Access this chapter

eBook
USD 16.99
Price excludes VAT (USA)
  • Available as EPUB and PDF
  • Read on any device
  • Instant download
  • Own it forever
Softcover Book
USD 99.99
Price excludes VAT (USA)
  • Compact, lightweight edition
  • Dispatched in 3 to 5 business days
  • Free shipping worldwide - see info
Hardcover Book
USD 99.99
Price excludes VAT (USA)
  • Durable hardcover edition
  • Dispatched in 3 to 5 business days
  • Free shipping worldwide - see info

Tax calculation will be finalised at checkout

Purchases are for personal use only

Institutional subscriptions

Notes

  1. 1.

    Mohit Aurora: “Is AES Encryption Safe?https://kryptall.com/index.php/2015-09-24-06-28-54/how-safe-is-safe-is-aes-encryption-safe retrieved 2016–10–12

  2. 2.

    Whitfield Diffie, New directions in cryptography”, IEEE, 1976: http://ieeexplore.ieee.org/document/1055638/ retrieved 2016–10–12

  3. 3.

    Ron Rivest, Adi Shamir, and Leonard Adleman: “A method for obtaining digital signatures and public-key cryptosystems”, ACM, 1978: http://dl.acm.org/citation.cfm?id=359342 retrieved 2016–10–12

  4. 4.

    AVTEST, Malware Statistics: https://www.av-test.org/en/statistics/malware/ retrieved 2017–01–20

  5. 5.

    Phil Zimmermann, 2001: http://www.philzimmermann.com/EN/news/PGP_10thAnniversary.html retrieved 2016–10–12

  6. 6.

    Computerworld, 2010: http://www.computerworld.com/article/2517739/security0/symantec-buys-encryption-specialist-pgp-for--300m.html retrieved 2016–10–12

  7. 7.

    Heroes of Freedom, Reason, 2003: http://reason.com/archives/2003/12/01/35-heroes-of-freedom retrieved 2016–10–12

  8. 8.

    Open PGP: http://openpgp.org/ retrieved 2017–03–02

  9. 9.

    Nikolai Bezroukov: Melissa Worm, 1994: Melissa: http://www.softpanorama.org/Malware/Malware_defense_history/Ch05_macro_viruses/Zoo/melissa.shtml retrieved 2017–01–12

  10. 10.

    The Guardian, 2000: https://www.theguardian.com/world/2000/may/05/jamesmeek

  11. 11.

    Jonathan Strickland: 2017: http://computer.howstuffworks.com/worst-computer-viruses2.htm retrieved 2017–01–27

  12. 12.

    Mail Statistics, Symantec: http://www.symantec.com/de/de/security_response/landing/spam/ retrieved 2017–01–25

  13. 13.

    Roger Dindledine, 2004: https://pando.com/2014/07/16/tor-spooks/ retrieved 2016–10–12

  14. 14.

    The TOR project. https://www.torproject.org/ retrieved 2016–10–12

  15. 15.

    Cloud Security Alliance: https://cloudsecurityalliance.org/about/ retrieved 2016–10–12

  16. 16.

    Common Computing Security Standards Forum: http://www.ccssforum.org/objectives.php retrieved 2016–12–10

  17. 17.

    CASC: https://casecurity.org/casc/ retrieved 2016–10–12

  18. 18.

    CSA, Treacherous-12, 2016: https://downloads.cloudsecurityalliance.org/assets/research/top-threats/Treacherous-12_Cloud-Computing_Top-Threats.pdf. Retrieved 2017–01–12

  19. 19.

    Crowd Research Partner, Security Report 2016: http://www.crowdresearchpartners.com/portfolio_item/cloud-security/ retrieved 2017–01–25

  20. 20.

    Kaspersky Lab: Security Report 2016: https://securelist.com/analysis/kaspersky-security-bulletin/76858/kaspersky-security-bulletin-2016-executive-summary/ retrieved 2017–01–25

  21. 21.

    vcoudnews, Walker Ben, Every Day Big Data Statistics, http://www.vcloudnews.com/every-day-big-data-statistics-2-5-quintillion-bytes-of-data-created-daily/, 2015, retrieved 2017–01–13

  22. 22.

    Calyptix Security 2016: http://www.calyptix.com/top-threats/top-5-cyber-attack-types-in-2016-so-far/ retrieved 2017–01–20

  23. 23.

    NTTSecurity, Quarterly Threat Reports: https://www.solutionary.com/ retrieved 2017–01–20

  24. 24.

    Markets and Markets, 2016: http://www.marketsandmarkets.com/PressReleases/cyber-security.asp retrieved 2017–01–20

  25. 25.

    Cisco: Cybersecurity Talent, 2016: http://www.cisco.com/c/dam/en/us/products/collateral/security/cybersecurity-talent.pdf retrieved 2017–01–25

  26. 26.

    SFGate: Russians Seem To Be Hacking Into Pentagon, 1999: http://www.sfgate.com/news/article/Russians-Seem-To-Be-Hacking-Into-Pentagon-2903309.php retrieved 2017–01–20

  27. 27.

    DMR: Cyber Security Statistics, 2016: http://expandedramblings.com/index.php/cybersecurity-statistics/ retrieved 2017–01–20

  28. 28.

    Business Insider, 2016: http://www.businessinsider.de/cyber-attacks-are-costing-companies-millions-of-dollars-heres-how-they-can-mitigate-those-costs-2016-2 retrieved 2017–01–20

  29. 29.

    Juniper Research https://www.juniperresearch.com/press/press-releases/cybercrime-cost-businesses-over-2trillion

  30. 30.

    Sebastian Kexel: “Management in der Malware Industrie”, Grin-Verlag, 2011.

  31. 31.

    ARS Technica, 2015: http://arstechnica.com/security/2015/06/fbi-says-crypto-ransomware-has-raked-in-18-million-for-cybercriminals/ retrieved 2016–10–12

  32. 32.

    Brave New Coin: U.K. cod bitcoins to pay ransoms, 2016 http://bravenewcoin.com/news/large-uk-businesses-holding-bitcoin-to-pay-ransoms/ retrieved 2016–10–12

  33. 33.

    Sebastian Kexel: “Management in der Malware Industrie”, Grin-Verlag, 2011

  34. 34.

    FBI: CEO Fraud, 2016 https://www.fbi.gov/contact-us/field-offices/phoenix/news/press-releases/fbi-warns-of-dramatic-increase-in-business-e-mail-scams retrieved 2017–01–12

  35. 35.

    Wall Street Journal, 2013: http://www.wsj.com/articles/SB10001424127887324328904578621880966242990 retrieved 2016–10–12

  36. 36.

    Forbes, 2015: http://www.forbes.com/sites/stevemorgan/2015/11/24/ibms-ceo-on-hackers-cyber-crime-is-the-greatest-threat-to-every-company-in-the-world/#5fff995e3548 retrieved 2016–10–12

  37. 37.

    EIN News, 2017: http://www.einnews.com/pr_news/350071526/cybersecurity-economic-predictions-2017-to-2021 retrieved 2017–01–25

Reference

Download references

Author information

Authors and Affiliations

Authors

Rights and permissions

Reprints and permissions

Copyright information

© 2018 Springer International Publishing AG

About this chapter

Cite this chapter

Oppitz, M., Tomsu, P. (2018). Security and Privacy Challenges. In: Inventing the Cloud Century. Springer, Cham. https://doi.org/10.1007/978-3-319-61161-7_14

Download citation

Publish with us

Policies and ethics