Security Magazine logo
search
cart
facebook twitter linkedin youtube
  • Sign In
  • Create Account
  • Sign Out
  • My Account
Security Magazine logo
  • NEWS
    • Security Newswire
    • Technologies & Solutions
  • MANAGEMENT
    • Leadership Management
    • Enterprise Services
    • Security Education & Training
    • Logical Security
    • Security & Business Resilience
    • Profiles in Excellence
  • PHYSICAL
    • Access Management
    • Fire & Life Safety
    • Identity Management
    • Physical Security
    • Video Surveillance
    • Case Studies (Physical)
  • CYBER
    • Cybersecurity News
    • More
  • BLOG
  • COLUMNS
    • Career Intelligence
    • Cyber Tactics
    • Cybersecurity Education & Training
    • Leadership & Management
    • Security Talk
  • EXCLUSIVES
    • Annual Guarding Report
    • Most Influential People in Security
    • The Security Benchmark Report
    • Top Guard and Security Officer Companies
    • Top Cybersecurity Leaders
    • Women in Security
  • SECTORS
    • Arenas / Stadiums / Leagues / Entertainment
    • Banking/Finance/Insurance
    • Construction, Real Estate, Property Management
    • Education: K-12
    • Education: University
    • Government: Federal, State and Local
    • Hospitality & Casinos
    • Hospitals & Medical Centers
    • Infrastructure:Electric,Gas & Water
    • Ports: Sea, Land, & Air
    • Retail/Restaurants/Convenience
    • Transportation/Logistics/Supply Chain/Distribution/ Warehousing
  • EVENTS
    • Industry Events
    • Webinars
    • Solutions by Sector
    • Security 500 Conference
  • MEDIA
    • Interactive Spotlight
    • Photo Galleries
    • Podcasts
    • Polls
    • Videos
      • Cybersecurity & Geopolitical Discussion
      • Ask Me Anything (AMA) Series
  • MORE
    • Call for Entries
    • Classifieds & Job Listings
    • Continuing Education
    • Newsletter
    • Sponsor Insights
    • Store
    • White Papers
  • EMAG
    • eMagazine
    • This Month's Content
    • Advertise
  • SIGN UP!
Security Enterprise Services

The Bieber Effect: Oh What a Web We Weave

By Bill Zalud
April 1, 2011
Zalud report April 2011

Warfare in the cloud. Reginald Nowlin, manufacturing assembler for Harris RF Communications prepares racks of tactical radios. The gear extends wireless broadband tactical Internet connectivity to forward deployed areas of the battlefield.  

A major theme at this month’s ISC West in Las Vegas is the continued movement of security applications to the Internet, what some call “in the cloud” and others label Software as a Service or SaaS.

The approach, folks such as John Szczygiel of Brivo Systems, see value in the approach. It’s “pay as you go,” says Szczygiel. “No infrastructure is required.” The tight economy helps, in addition to the attraction of the Web. “The basic value of the model is sound. Rent, don’t buy.”

However, with any rental property, there are dangers and a less clear understanding as to who is the owner and what his or her responsibilities are.

That guy Justin Bieber knows.

The young singer kicked off his career on the Web and is the most searched keyword on Google. On the other hand, his music is among the most pirated; there are numerous scams centering on him and his profile; and there are scores of people pretending to be him or speak for him.

For those who have not kept up, cloud computing describes computation, software, data access and storage services that do not require end user knowledge of the physical location and configuration of the system that delivers the services. Parallels to this concept can be drawn with the electricity grid where end users consume power resources without any necessary understanding of the component devices in the grid required to provide the service.

Cloud computing is a natural evolution of the widespread adoption of virtualization, service-oriented architecture, autonomic and utility computing. Details are abstracted from end users, who no longer have need for expertise in, or control over, the technology infrastructure “in the cloud” that supports them.

The challenging bottom line, however, is that working, having data or running applications in the cloud have disadvantages and vulnerabilities as well as benefits.

Justin Beiber

Pity poor Justin Bieber. But piracy, intellectual property theft, scams and denial of service attacks are increasing in the Internet world. And, as security leaders move applications to the cloud, they need to be forewarned.

For example, the 2010 Internet Crime Report, released by the Internet Crime Complaint Center (IC3), highlights how pervasive online crime has become, affecting people in all demographic groups throughout the country. Last year, IC3 received 303,809 complaints of Internet crime, the second-highest total in IC3’s 10-year history.

IC3 is a partnership between the Federal Bureau of Investigation (FBI) and the National White Collar Crime Center (NW3C). Since its creation in 2000, IC3 has received more than two million Internet crime complaints.

The survey primarily centers on consumer complaints but also crosses over into business and enterprise incidents. On the latter, computer security and cloud computing experts warn that companies often purchase products and services for their dazzling features while forgetting to ask about or explore the security of the technology, especially in IP environments. See Global News & Analysis on page 12 for more statistics. New technology developed for IC3 allows investigators to collaborate on cases spanning jurisdictional boundaries. IC3 analysts also provide support for various investigative efforts.

“Internet crime has affected millions across the country, and the great thing about IC3 is that we have adapted our resources to meet this threat,” says NW3C Director Don Brackman. “We have implemented new tools to help law enforcement bring online criminals to justice.”

Gordon Snow, assistant director of the FBI’s Cyber Division, adds, “We encourage individuals to report Internet crime through the IC3 Web portal. The IC3 is a unique resource for federal, state, and local law enforcement to intake cases efficiently, find patterns in what otherwise appear to be isolated incidents, combine multiple smaller crime reports into larger, higher priority cases and ultimately, bring criminals to justice.”

There is no doubt that Internet Protocol and the Web browser are becoming the common interface when it comes to card access control, security video monitoring and retrieval, visitor management and mass notification, among other applications, work well in the cloud. The military has numerous cloud computing application in Iraq and Afghanistan – all of them have been designed with high level security in mind.

The security industry has been in the cloud for many years if you consider third party burglar and fire alarm monitoring as fitting into the definition. As enterprise security leaders move more forcefully to SaaS, there must be a complementary effort to cover the vulnerabilities, both old and new.the cloud, they need to be forewarned.

KEYWORDS: cloud computing computer security internet

Share This Story

Looking for a reprint of this article?
From high-res PDFs to custom plaques, order your copy today!

Zalud 2016 200px

Bill was the editor emeritus of Security Magazine, and he can be reached at (773) 929-6859.

Recommended Content

JOIN TODAY
To unlock your recommendations.

Already have an account? Sign In

  • Iintegration and use of emerging tools

    Future Proof Your Security Career with AI Skills

    AI’s evolution demands security leaders master...
    Security Leadership and Management
    By: Jerry J. Brennan and Joanne R. Pollock
  • The 2025 Security Benchmark Report

    The 2025 Security Benchmark Report

    The 2025 Security Benchmark Report surveys enterprise...
    The Security Benchmark Report
    By: Rachelle Blair-Frasier
  • The Most Influential People in Security 2025

    Security’s Most Influential People in Security 2025

    Security Magazine’s 2025 Most Influential People in...
    Most Influential People in Security
    By: Security Staff
Manage My Account
  • Security Newsletter
  • eMagazine Subscriptions
  • Manage My Preferences
  • Online Registration
  • Mobile App
  • Subscription Customer Service

More Videos

Sponsored Content

Sponsored Content is a special paid section where industry companies provide high quality, objective, non-commercial content around topics of interest to the Security audience. All Sponsored Content is supplied by the advertising company and any opinions expressed in this article are those of the author and not necessarily reflect the views of Security or its parent company, BNP Media. Interested in participating in our Sponsored Content section? Contact your local rep!

close
  • critical event management
    Sponsored byEverbridge

    Why a Unified View Across IT, Continuity, and Security Makes or Breaks Crisis Response

  • Charlotte Star Room
    Sponsored byAMAROK

    In an Uncertain Economy, Security Is a Necessity - Not an Afterthought

  • Sureview screen
    Sponsored bySureView Systems

    The Evolution of Automation in the Command Center

Popular Stories

Cybersecurity trends of 2025

3 Top Cybersecurity Trends from 2025

Red laptop

Security Leaders Discuss SitusAMC Cyberattack

Green code

Logitech Confirms Data Breach, Security Leaders Respond

Neon human and android hands

65% of the Forbes AI 50 List Leaked Sensitive Information

The Louvre

After the Theft: Why Camera Upgrades Should Begin With a Risk Assessment

Top Cybersecurity Leaders

Events

September 18, 2025

Security Under Fire: Insights on Active Shooter Preparedness and Recovery

ON DEMAND: In today’s complex threat environment, active shooter incidents demand swift, coordinated and well-informed responses.

December 11, 2025

Responding to Evolving Threats in Retail Environments

Retail security professionals are facing an increasingly complex array of security challenges — everything from organized retail crime to evolving cyber-physical threats and public safety concerns.

View All Submit An Event

Products

Security Culture: A How-to Guide for Improving Security Culture and Dealing with People Risk in Your Organisation

Security Culture: A How-to Guide for Improving Security Culture and Dealing with People Risk in Your Organisation

See More Products

Related Articles

  • SaaS: What Is It and How Will it Change the Way we Know Security?

    See More
  • security-lessons-fp1170x658v6.jpg

    What we learned from transforming a security program

    See More
  • automation_enews

    What We can Do to Bridge the Cyber Skills Gap

    See More

Related Products

See More Products
  • Physical Security and Safety: A Field Guide for the Practitioner

  • The Database Hacker's Handboo

  • school security.jpg

    School Security: How to Build and Strengthen a School Safety Program

See More Products
×

Sign-up to receive top management & result-driven techniques in the industry.

Join over 20,000+ industry leaders who receive our premium content.

SIGN UP TODAY!
  • RESOURCES
    • Advertise
    • Contact Us
    • Store
    • Want More
  • SIGN UP TODAY
    • Create Account
    • eMagazine
    • Newsletter
    • Customer Service
    • Manage Preferences
  • SERVICES
    • Marketing Services
    • Reprints
    • Market Research
    • List Rental
    • Survey/Respondent Access
  • STAY CONNECTED
    • LinkedIn
    • Facebook
    • YouTube
    • X (Twitter)
  • PRIVACY
    • PRIVACY POLICY
    • TERMS & CONDITIONS
    • DO NOT SELL MY PERSONAL INFORMATION
    • PRIVACY REQUEST
    • ACCESSIBILITY

Copyright ©2025. All Rights Reserved BNP Media.

Design, CMS, Hosting & Web Development :: ePublishing