Nsauditor Network Security Auditor - Advanced All-In-One Network Tools Suite!
  Recommended Product
Network Security Audit Software
Network Security Audit Software and Computer Security Tools
  Learn More
 
 
  Network Security Software
Network Bandwidth Monitor Network Bandwidth Monitor
NBMonitor tracks Internet bandwidth usage (upload and downloads) and shows process names initiated network connections...
Network Hardware Inventory Software Network Hardware Inventory Software
Nsasoft Hardware Software Inventory is a powerful network inventory software for home, office and enterprise networks...
BlueAuditor Monitors Mobile Devices in Wireless Network BlueAuditor Monitors Mobile Devices in Wireless Network
BlueAuditor is a wireless personal area network auditor and easy-to-use program for detecting and monitoring mobile devices in a wireless network...
Network Access Monitoring Network Access Monitoring
ShareAlarmPro allows easily perform network shares and folder monitoring, block unwanted users attempting to access secured shares...
Network Shares Monitoring Network Share Watcher
Monitors network folders permissions and identify shares which are violating company data access policy...
NetworkSleuth Network File Search Utili NetworkSleuth Network File Search Utiliy
NetworkSleuth is a network file searching utility, that allows you to quickly locate files across a network....
Product Key Finder Product Key Finder
Product Key Explorer enables you to quickly recover over 3000 popular software product keys from network computers...
Backup Key Recovery Crashed Drive Keys Recovery Backup Key Recovery Crashed Drive Keys Recovery
Backup Key Recovery retrieves product keys for Windows, MS Office, SQL Server, Adobe products and more than 2500 popular software products...
 
 

Network Security News

US lawmakers question cloud security

Oct 6, 2011 | ITNews.com

A rush by President Barack Obama's administration to move U.S. government agencies to cloud computing services may lead to unintended security problems and other headaches, some lawmakers said Thursday.

While agency adoption of cloud computing could save money, it may also lead to questions about control of agency data, about data portability and about whether cloud vendors will be prime targets for cybercriminals, several members of the U.S. House of Representatives Homeland Security Committee's cybersecurity subcommittee said during a hearing.

"Our concern is that the cloud offers a rich target for hackers, criminals, terrorists and rogue nations," said Representative Dan Lungren, a California Republican and subcommittee chairman. "With cyber-espionage affecting every sector of our economy, aggregating important information in one location is a legitimate security concern. You might say it's a target-rich environment."

Many cloud providers spread data across servers and data centers to reduce risk, said Timothy Brown, senior vice president and chief architect for security at CA Technologies. "Little pieces of your data are stored in little pieces on servers all over the world," he said. "Therefore, they can't be reconstituted into one piece."

Other subcommittee members questioned whether agencies should use the services of foreign cloud providers and what will happen to an agency's data if its cloud provider goes out of business. Lawmakers need to examine cloud computing's benefits and risks after the Obama administration issued a "cloud first" strategy for IT deployment in February, Lungren said.

Five of seven witnesses before the subcommittee defended cloud computing, saying it can save U.S. agencies significant money and allow them to upgrade their technology much faster than they can with in-house systems.

"By leveraging shared computing resources, higher utilization rates of computing hardware, and economies of scale, cloud computing is ushering in an IT revolution which promises far lower costs while greatly improving capacity and performance," said James Sheaffer, president of the North American public sector division of Computer Sciences.

The U.S. Department of Homeland Security could save 8 to 10 percent of IT costs by moving to cloud infrastructure services, and by using the cloud, the agency can add new network and storage services in one week, compared to up to 18 months if done in house, said Richard Spires, CIO at DHS.

DHS is moving 12 IT services to the cloud, including email, mobile support and project management, he said. Agencies need to demand strong reporting and auditing requirements in contracts with cloud providers as a way to ensure security and service, he said.

"The benefits of cloud computing far outweigh the challenges," Spires said.

Representative Yvette Clarke, a New York Democrat, asked witnesses if there are government applications or services that should not be moved to a cloud environment.

Some classified information should not be put on the public Internet-based cloud right now, said Greg Wilshusen, director of information security issues U.S. Government Accountability Office.

Clarke asked if some government information should "never" be moved to the cloud.

"I was taught from a very early age never to say never," Wilshusen said.

Technology changes rapidly, and what's inappropriate today may be acceptable in a few years, Spires added. Still, it will be "quite awhile before we have any comfort putting any classified information into a public cloud environment," he said.

Security of data stored in the cloud is a shared responsibility between the vendor and the customer, said CA's Brown.

"IT organizations must take a very focused and methodical approach to evaluating what should or should not be moved to the cloud," he said. "The cloud is not a panacea, and may not be appropriate for all workloads."

Other witnesses raised concerns about cloud computing. Some federal agencies may be concerned about the physical location of their data and whether it's being stored overseas, said John Curran, CEO of the American Registry of Internet Numbers. Data interoperability standards, to guard against cloud providers going out of business, are not yet established, he added.

Lungren said he sees benefits to cloud computing, but also potential risks. "Sometimes, things sound too good to be true," he said.

View more news

 
  Most Popular Articles
 
 
  Popular Searches
network security magazine network security auditor network security news network security software corporate network security network security systems home network security product key finder password recovery software Network Bandwidth Monitor Network Access Monitoring data access policy monitoring remote shutdown Network File Search key recovery Network Monitoring Computer Security Ethical Hacking Network Security Network Inventory Software Information Security
 
 
  Partner Sites
Network Security Auditor
Nsauditor is a complete networking utilities package that includes more than 45 network tools and utilities for network auditing, scanning,network connections monitoring and more. For more information, please visit:
www.nsauditor.com


Password Recovery Software
SpotAuditor is All-in-one password recovery program that offers administrators and users a comprehensive solution for recovering passwords and other critical business information saved in users' computers. For more information, please visit:
www.password-recovery-software.com

Product Key Explorer
Product Key Explorer quickly recovers and displays product key, including Windows 7 keys, Windows Vista key, Windows XP product key, Microsoft Office 7 product key, MS office 2010 key, Adobe Photoshop, Adobe CS5, CS4, CS3, SQL Server, Electronic Arts games and more than 3000 popular software products:
www.product-key-explorer.com/