Hackers’ treasure box – ‘Cloud’

Lots of people – almost all people maybe- use ‘cloud’ for their own warehouse of private information. ‘Google Drive’ and ‘I Cloud’ can be the examples of those named ‘Cloud’. Not in the internal storage such as a computer or mobile phone, but in the external storage server, people can download or upload their files. These cloud systems made people’s lives so much comfortable.

iCloud :: 아이클라우드 사용법 1탄, 기본적인 설정 및 아이클라우드 소개

However, ‘I Cloud’ -the cloud system served by ‘Apple’ company- had recently been hacked by the unknown hackers!!! According to a BBC News report in January 2014, hundreds of British and American celebrities’ pictures had been spilled. Following to this incident, lots of people are worrying about their private information being spilled out. Then, why are the hackers aiming to hack these ‘Cloud’ systems despite their advanced security systems – which leads hackers to spend lots of money?

Before hacking the server, the hackers approximately measure how much money would be spent and be earned after hacking the server. This is because the reason why hackers hack is just to get the incomes. For Cloud Systems, however, they can give more than hackers pay to hack the servers’ security systems. There are three big reasons why Cloud Systems give much benefit to the hackers.

The first reason is that the Cloud Systems contain a lot of important information in them. From individuals to large businesses, big data are stored in the Cloud Systems. Thus, the hackers can hold a mortgage on the information and earn much money. The second reason is that since the Cloud Systems are one of the kinds of server systems, diffusion of malignant codes is easily done. For example, the hackers can make malignant codes as the update files falsely and make people to be infected in those codes readily. Lastly, since Cloud Systems are made to share files among people, malignant codes can be shared among people easily. To be specific, sharing infected files with other people make other people’s files to be infected, too.

Cloud Systems are commonly used among lots of people in this world. The security systems on the server were not that weak systems, too. However, the hackers decided to hack since the server makes more benefit to the hackers more than they need to spend for passing the security systems. This is the matter of course, but the Cloud Systems necessarily need to be reinforced in security systems until the hackers profit being canceled out. After then, the hackers might lose the motivation to hack the Cloud System Servers and the private information. I hope this world to be safer in the online world, too.

References:

http://www.sciencetimes.co.kr/?p=162359&cat=135&post_type=news

Advertisements

Leave a Reply

Fill in your details below or click an icon to log in:

WordPress.com Logo

You are commenting using your WordPress.com account. Log Out / Change )

Twitter picture

You are commenting using your Twitter account. Log Out / Change )

Facebook photo

You are commenting using your Facebook account. Log Out / Change )

Google+ photo

You are commenting using your Google+ account. Log Out / Change )

Connecting to %s