Cloud Computing can be evil because-
1) Most browsers are owned by for profit corporations . Corporations can be evil, sometimes
And corporations can go bankrupt. You can back up data locally, but try backing up a corporation.
2) The content on your web page can be changed using translator extensions . This has interesting ramifications as in George Orwell. You may not be even aware of subtle changes introduced in your browser in the way it renders the html or some words using keywords from a browser extension app.
Imagine a new form of language called Politically Correct Truthspeak, and that can be in English but using machine learning learn to substitute politically sensitive words with Govt sanctioned words.
3) Your DNS and IP settings can be redirected using extensions. This means if a Govt passes a law- you can be denied the websites using just the browser not even the ISP.
Thats an extreme scenario for a authoritative govt creating its own version of Mafiaafire Redirector.
So how to keep the cloud computer honest?Move some stuff to the desktop
How to keep desktop computing efficient?Use some more cloud computing
It is not an OR but an AND function in which some computing can be local, some shared and some in the cloud.
Part 1 in this series is avaiable at http://www.decisionstats.com/analytics-for-cyber-conflict/
The next articles in this series will cover-
- the kind of algorithms that are currently or being proposed for cyber conflict, as well as or detection
Cyber Conflict requires some basic elements of the following broad disciplines within Computer and Information Science (besides the obvious disciplines of heterogeneous database types for different kinds of data) –
1) Cryptography – particularly a cryptographic hash function that maximizes cost and time of the enemy trying to break it.
The ideal cryptographic hash function has four main or significant properties:
- it is easy (but not necessarily quick) to compute the hash value for any given message
- it is infeasible to generate a message that has a given hash
- it is infeasible to modify a message without changing the hash
- it is infeasible to find two different messages with the same hash
A commercial spin off is to use this to anonymized all customer data stored in any database, such that no database (or data table) that is breached contains personally identifiable information. For example anonymizing the IP Addresses and DNS records with a mashup (embedded by default within all browsers) of Tor and MafiaaFire extensions can help create better information privacy on the internet.
This can also help in creating better encryption between Instant Messengers in Communication
2) Data Disaster Planning for Data Storage (but also simulations for breaches)- including using cloud computing, time sharing, or RAID for backing up data. Planning and creating an annual (?) exercise for a simulated cyber breach of confidential just like a cyber audit- similar to an annual accounting audit
3) Basic Data Reduction Algorithms for visualizing large amounts of information. This can include
- K Means Clustering, http://www.jstor.org/pss/2346830 , http://www.cs.ust.hk/~qyang/Teaching/537/Papers/huang98extensions.pdf , and http://stackoverflow.com/questions/6372397/k-means-with-really-large-matrix
- Topic Models (LDA) http://www.decisionstats.com/topic-models/,
- Social Network Analysis http://en.wikipedia.org/wiki/Social_network_analysis,
- Graph Analysis http://micans.org/mcl/ and http://www.ncbi.nlm.nih.gov/pubmed/19407357
- MapReduce and Parallelization algorithms for computational boosting http://www.slideshare.net/marin_dimitrov/large-scale-data-analysis-with-mapreduce-part-i
In the next article we will examine
- the role of non state agents as well as state agents competing and cooperating,
- and what precautions can knowledge discovery in databases practitioners employ to avoid breaches of security, ethics, and regulation.
Decisionstats.com was undergoing some hacking attacks this past two weeks.
Backing up WordPress Blog-
- use export feature in wordpress to create files.
- If your number of articles is more than 70, then create multiple usernames, export using bulk apply to seperate wordpress xml files.
- then in wordpress.com site, import the various xml files ( note multiple file method avoid corruption and using bulk apply -change author – makes it very fast)
- once your wordpress.com blog is updated, use a wild card redirect so as to preserve your search engine traffic. Your Backup is now online even if your original site is hacked
- Use the server to access your .htaccess file to check whether rouge redirects happened.
- Use logs of server access ( painful but true) to pinpoint IP addresses of hack attacks ( note hackers WOULD use relay servers to disguise IP addresses)
- To prevent domain name hijacking, make sure your who.is information is private
- Change your email passwords, security questions, server passwords. Use random password generators to create secure passwords.
- To prevent rogue malware from infecting your laptop create a dual boot Ubuntu/Windows laptop using a 10 minute tutorial. Use the Ubuntu Linux boot to do all the above operations.
- Inform the Federal authorities in cyber crime division with the server logs and a SPECIFIC complaint ( no rambling sob stories)
- Pray to God, Matt ( both Cutts and Mullenweg), and if all above steps fail ask Donncha O Caoimh at http://ocaoimh.ie/about/ to step in.