Double-edged sword: How serious are the consequences of cloud fraud?
Source: Internet
Author: User
KeywordsCloud Services
The advent of cloud computing has led to new business models, as well as a new pattern of fraud-cloud fraud. Cloud services bring untold benefits to individual users and business users around the world, but things are both sides, and there is a dark side to the success of the cloud. There is no doubt that cloud has helped criminals with fraud and other illegal activities. 498) this.width=498 ' OnMouseWheel = ' javascript:return big (This) ' border= ' 0 "alt=" double-edged sword: How serious are the consequences of cloud fraud? "src=" http:// S8.51cto.com/wyfs02/m02/25/ea/wkiol1noowaht7woaaankthkqee030.jpg "width=" 427 "height="/> Why there is cloud fraud? The key benefits of the cloud are rapid expansion, on-demand delivery, high availability, and competitive prices, which attract the average user and attract cyber criminals. Cloud fraud-How serious is this problem? The purchase of cloud services is easy and anonymous and can be controlled in all parts of the world. Therefore, all aspects of the cloud that are beneficial to the organization are also beneficial to the undesirable elements. The anonymity of the cloud and the sheer scale of the clouds have no incentive for fraudsters. How did it happen? As the saying goes, all roads lead to Rome, the cloud to the cyber criminals are also open to many different ways. From phishing schemes and money transfer fraud to identity theft and malicious soft, each item has its own risk and needs its own prevention methods. This process is easy for potential criminals. Research shows that stolen credit cards can be obtained on the black market in only one dollar. Once a criminal gets a bank card, they only need to spend a few minutes online registration, and then they can control their servers. This allows the server to be used all the time, using the identity of the stolen person and the bank card without having to speak to the service provider through the physical environment-a perfect crime. Bank fraud in the cloud one of the most compelling cases of fraud is the recent "High roll action". This is an international criminal chain case against the rich and commercial accounts of European banks, which McAfee estimates are about 75 million dollars to 2.5 billion dollars stolen. The whole case was done through the clouds. The combination of a remote server and a system of banking transactions known to criminals makes it possible to steal automation, not just the user name and password, and then manually transfer money from the computer. Fraud starts with an e-mail conversation, like the one from the recipient's bank. When the link is clicked, the malware is downloaded and the software will later steal the information needed to transfer the funds. Check and protect a good line before balancing customer privacy and preventing illegal activity. As a result, cloud providers spend a huge amount of money developing systems to monitor how customers use services, but they do not monitor actual data. Once large fraud information is detected, the information is communicated to the relevant department immediately. The difficulty for suppliers is the lack of enthusiasm for testing software. Users often turn off services that are helpful to them, because the provider mistakenly believes that they will soon be deprived of the right to use cloud computing and find alternative storage methods once criminal activity occurs. Cloud computing is a double-edged sword, both pros and cons, so enterprises in the use of cloud technology-related solutions, but also to do a certain protective measures. "Editorial Recommendation" enterprises to consider data security should be migrated to private cloud services Microsoft confirms that it will encrypt its cloud services in 2014 Five ways to enhance the security of cloud Services "responsible editor: Blue Rain Tears TEL: (010) 68476606" Original: Double-edged Sword: Cloud fraud The consequences of how serious? Back to network security home
The content source of this page is from Internet, which doesn't represent Alibaba Cloud's opinion;
products and services mentioned on that page don't have any relationship with Alibaba Cloud. If the
content of the page makes you feel confusing, please write us an email, we will handle the problem
within 5 days after receiving your email.
If you find any instances of plagiarism from the community, please send an email to:
info-contact@alibabacloud.com
and provide relevant evidence. A staff member will contact you within 5 working days.