iTnews
  • Home
  • Features
  • Technology
  • Security

Apple and the public cloud: new threats, new solutions

By Jason Hart on Jun 24, 2011 10:56AM
Apple and the public cloud: new threats, new solutions

Apple's iCloud will bring cloud computing to the masses and with it, new security challenges.

Apple's iCloud is here, it's big and the question of mass cloud security is now a real and present challenge. Apple understandably believes the cloud is critical in delivering its services to the general public.

Staying ahead of the competition with its ability to create markets where none have existed before, Apple can set the agenda of technology like no other. Delivery of consumer applications via the cloud is only going to grow and the threat of a mass breach of cloud user data is a critical concern for cloud providers as the technology evolves. So how can Apple make sure it's not the victim?

In many ways, the cloud is a logical extension of what security experts already have to deal with every day. From simple SQL injections, distributed denial-of-service (DDoS) and cross-site scripting to more serious attacks, the cloud is just another network to defend and there will be many measures taken to protect Apple's users against malicious code.

The problem for the iCloud, as with any cloud solution, is the ability to identify individuals as legitimate users. After all, it doesn't matter how sophisticated your encrypted virus protection is if the attacker has the right username and password.

Whether brute forced, phished or physically stolen, we know that there are hundreds of thousands of compromised username/password combinations out there already.

The iCloud faces a heightened threat due to the premium value of its content: once a hacker comes into possession of another user's details, they could quickly run up thousands of pounds in downloaded audio, video and apps. Because this could be accessed from any device connected to the cloud, it would be easy to hook up, download, disconnect and be gone before anyone had even detected a breach.

So, what are Apple's options? It will certainly need strong defences to protect its network and users against sophisticated assaults, but it is also going to need a way to authenticate users at point of access. As IT services face logins from every angle and all devices, proper authentication will be the key to safeguarding users.

After all, no matter how secure Apple makes its own service, it is powerless to protect against user data obtained from other, less secure services. It's not a coincidence that Apple is facing this challenge now, as the cloud is becoming a fundamental part of our lives.

At work, more people are accessing the office remotely. At home, users are changing habits, shifting away from ownership and towards cloud-based subscription models. In both cases, this is reflected in how they access their data: mostly through mobile devices that log in to online services.

With so many access points that are impossible to account for, it's small wonder that companies are adopting policies that move the focus away from protecting machines to verifying the accounts themselves.

In an increasingly digitised world with thriving on-demand business models, it's no surprise that the cloud has been propelled into the spotlight of the consumer market as quickly as it has.

It's now up to modern companies, from service providers to cloud-based application providers, to make sure that the people buying their products are really who they say they are.

This article originally appeared at scmagazineuk.com

Got a news tip for our journalists? Share it with us anonymously here.
Copyright © SC Magazine, UK edition
Tags:
analysisapplecloud computingicloudsecurity

Partner Content

Why rethinking your CMS is crucial for customer retention
Promoted Content Why rethinking your CMS is crucial for customer retention
Winning strategies for complaints and disputes management in financial services
Promoted Content Winning strategies for complaints and disputes management in financial services
How to turn digital complexity into competitive advantage
Promoted Content How to turn digital complexity into competitive advantage
Digital signatures propel Australian Unity with rapid time to value
Digital signatures propel Australian Unity with rapid time to value

Sponsored Whitepapers

Free eBook: Digital Transformation 101 – for banks
Free eBook: Digital Transformation 101 – for banks
Why financial services need to tackle their Middle Office
Why financial services need to tackle their Middle Office
Learn: The latest way to transfer files between customers
Learn: The latest way to transfer files between customers
Extracting the value of data using Unified Observability
Extracting the value of data using Unified Observability
Planning before the breach: You can’t protect what you can’t see
Planning before the breach: You can’t protect what you can’t see

Events

  • Forrester Technology & Innovation Asia Pacific 2022
By Jason Hart
Jun 24 2011
10:56AM
0 Comments

Related Articles

  • Apple drops iOS and iPadOS 15.6.1 to fix two exploited zero days
  • Apple to only seek abuse images flagged in multiple nations
  • Apple Engineering staves off attempted network route hijack
  • Apple releases large surprise set of security patches
Share on Twitter Share on Facebook Share on LinkedIn Share on Whatsapp Email A Friend

Most Read Articles

Services Australia sets changeover date for myGov

Services Australia sets changeover date for myGov

Google Cloud IoT Core goes on the end-of-life list

Google Cloud IoT Core goes on the end-of-life list

NBN Co proposes to axe CVC across all plans by mid-2026

NBN Co proposes to axe CVC across all plans by mid-2026

NSW Police dumps Bezos-backed Mark43 from core systems overhaul

NSW Police dumps Bezos-backed Mark43 from core systems overhaul

Digital Nation

CommBank’s mobile banking app beats ANZ, NAB, Suncorp and Westpac: Forrester
CommBank’s mobile banking app beats ANZ, NAB, Suncorp and Westpac: Forrester
Save the Date — Digital Nation Live launches on October 25
Save the Date — Digital Nation Live launches on October 25
Crypto losses to crime surge to $1.9 B in first half of 2022: Chainalysis
Crypto losses to crime surge to $1.9 B in first half of 2022: Chainalysis
Stakes are higher for cybersecurity in Web3: Gal Tal-Hochberg, CTO at Team8
Stakes are higher for cybersecurity in Web3: Gal Tal-Hochberg, CTO at Team8
Edge and IoT critical to Web3 infrastructure
Edge and IoT critical to Web3 infrastructure
All rights reserved. This material may not be published, broadcast, rewritten or redistributed in any form without prior authorisation.
Your use of this website constitutes acceptance of nextmedia's Privacy Policy and Terms & Conditions.