
The cloud presents a vast amount of opportunities especially when you consider the impact of IoT. The internet of things will be wireless connect our lives to the cloud in efforts to gain useful data that can enhance the human lifestyle. As many computer security analysts know, when an emerging technology bursts its way onto the scene, people with nefarious intentions are lurking trying to find ways to exploit said technology.
Microsoft Azure’s General Manager of Cyber Security is Michal Braverman-Blumenstyk. She recently spoke in front of gathering of security professionals in an event titled, “The Battlefield and the Art of War” as it regards to cyber-crime. Braverman-Blumenstyk spoke about some of the big security concerns for the next generation of cloud connected devices.
One example would be your automobile. The next leap in cloud technology is connecting your car to the cloud. Many technological companies are putting all of their eggs into the car-cloud basket. Blackberry is a prime example of this. When your car is connected to the cloud, who says that your car can’t be hacked? What if a cyber-terrorism organization gains control of an army of cloud connected cars? The organization could theoretically back your car out of your driveway using a hacked cloud and your car could be used to malicious purposes.
“Some of the functionality of connected cars can be accessed remotely—velocity adjustment for example.” Braverman-Blumenstyk noted. “If police are chasing a criminal, you’d want the police to be able to slow the suspect’s car down. However, if a malicious entity gets hold of the car, the damage is limitless.”
As cloud automobile technology gains market share and maturity, one must be cognizant of these fears. What happens when we connect airplanes to the cloud? What about wearable cloud technology? These same types of attacks could happen. While much of this sounds like the Twilight Zone, it’s refreshing to know that technical professionals are aware of these potential concerns and that they are taking steps to be proactive in efforts to counterbalance a potential technological tragedy.