GGF and Grid Security 82
An anonymous reader writes "Things are changing fast in the grid community. Our communication networks connect millions of systems and billions of individuals on the planet. These myriad systems, and the data they contain, present juicy targets for those who want to steal, damage, corrupt, or otherwise gain unlawful access to those systems."
Re:MOD PARENT UP Re:Starts with "ad",ends with "me (Score:1)
It has been some time........ (Score:5, Insightful)
There are ways to protect sensitive data, such as using VPN's rather than the internet for e.g. Doctors accessing hospital records, grid computing etc. Doing everything on the open internet is neither necessary nor desirable.
I think our software deployment capability exceeds our network architecture design capability.
Re:It has been some time........ (Score:4, Informative)
The General and the Scientist (Score:1)
In the case of the military, it is possible to enforce security due to the inherent hierarchical nature of the relationships being modeled: witness the structure of X500 and subsequently LDAP based directory services which are derived from X500.
The situation is somewhat more complex with globalized Grid Computing [computer.org] because of the lack of a universally trusted authority. If the ideal of a ubiquitous "on tap" computing resource is to be realised then a model which unifies hierarchical and peer based trust mo
Re:It has been some time........ (Score:2, Funny)
Would that not be a just a PN?
Re:It has been some time........ (Score:2)
Social Engineering? (Score:5, Insightful)
Re:Social Engineering? (Score:1)
Re:Social Engineering? (Score:5, Interesting)
I have found that almost every place I've worked, bypassing security is a joke. I mean, think about it. How many times have people "swiped you in", or what have you, when you forgot your badge? Even without really knowing you? And if you should have a fake badge that just "isn't working", you're in like Flynn. For me, the only exception was where they kept actual classified data. It would take some amount of serious spying (e.g., returning on multiple days, shoulder surfing, maybe even key swiping) to get in. But the fact is, most people just won't assume that you're doing something evil. So... easy! Far easier than trying to crack the software and such, if you ask me. And that's as an introverted geek. (on the flip side, I'm also "unassuming"; I don't look like I have a hidden agenda.
Of course, the other side is that, hey, why don't we use computers to see what remains unseen by people? They're better at spotting "suspicious" behavior anyway. And if people actually were willing to accept that the computer IS right and the policy that so-and-so can't get in without a badge must be enforced... you could have a very secure system.
For instance, take protecting classified data. If you're generic spy X, you're gonna want to sit down, and just start copying all that stuff on to the nearest media you can find. That kind of behavior is almost always not what a regular person would do...
There are all sorts of patterns which can register as suspicious. Most security systems are smart enough to note these things, and alert people who, I would assume, should always be the second check on such a system, because some people are just eccentric.
(I at one point was designing a security control system, and my boss was always asking me to add such things. It's amazing, but pretty obvious. If somebody needs to get a new password every other day, something is probably wrong. If somebody brand new is supposed to be given full access to every system in the place (happened! Managers just found it easier to check every box!), something is wrong).
Anyway, that's just my $.02
Re:Social Engineering? (Score:1)
Which is why non-generic spy Y or cyborg spy Z have photographic memories- so that they can look just like a normal person while copying any data they come across in the course of a normal job based search into whatever storage media they already have ins
physical security (Score:1, Interesting)
Re:physical security (Score:1)
If by "compromised" you mean "broken the hell into and sacked like they were Vikings," then yes.
http://slashdot.org/article.pl?sid=04/05/03/225
What is the grid community? (Score:4, Interesting)
Mod parent up - there is no "grid computing" (Score:4, Insightful)
When you look at case studies [boic.com] of commercial "grid computing", what they're really talking about are dedicated clusters of machines. This is just clustering.
If "grid computing" were saleable, ISPs would be offering off-peak compute time on their server farms, and people would be buying it. They're not.
It's time sharing, people. And time sharing is dead.
Re:Mod parent up - there is no "grid computing" (Score:3, Informative)
The real task is to transform that sprawling, unreliable beast into something that provides some sort of useful, dependable resource. Machines will be switched off, progr
Re:Mod parent up - there is no "grid computing" (Score:1)
there is no *commercial* grid computing. yet. (Score:1)
Grid infrastructure is not just about compute time. It will also attempt to deal with the predicted "data deluge" in the various sciences (chiefly high energy physics, but genetics are also a big producer of data). Storage requirements will increase much faster than the media technology, meaning that new distributed systems will have to be developed to store and access this in a useful way.
Anyway, you can't expect this to leap straight from research papers into commercially viable systems right away. Reme
Re:Mod parent up - there is no "grid computing" (Score:2)
"Grid" as a concept is mostly just a buzzword. Oracle10g is a good example.
But Grid as a standard (under development by the GGF, OASIS and others) is something a lot more sp
Re:Mod parent up - there is no "grid computing" (Score:2)
Re:Mod parent up - there is no "grid computing" (Score:2)
The simplest I can make it is that Web services, as compared to "standard" Web pages, adds interoperability. This means that programs can actually operate with each other over the Internet. There are some other ways this can happen (distributed computing; cluster/parallel software like MPI), but Web services probably offers a more general-purpose framework. The trade-off is that WS are complex, and even dec
Re:Mod parent up - there is no "grid computing" (Score:2)
I had to laugh. Web services are so ludicrously complex that unless you use loads of existing (complex and platform-specific) software, the technical barriers to entry are remarkably high! I've implemented some web services stuff from scratch, and it's really not easy at all. The WSDL standard drags in many other standards.
Just for a laugh, I started to try to enumerate the standards referred to, directly and in
Re:What is the grid community? (Score:1)
Distributed groups of computers working together.
and why is breaking into their systems any worse that breaking into a normal system?
They have lots and lots of resources. In the same way a T1 connected Xeon server is a more attractive target than my pII with 56k dialup grid systems are much more attractive targets than almost anything else out there.
Attack of the clones. (Score:1)
To answer your first question: the grid community exists through several forums and consortiums [computer.org].
Now, question 2: The machines in today's grid testbeds are typically just cloned machines so if they get compromised they're easy enough to purge.
The risks are many. Should such a powerful system become compromised at a high enough level (through a social or technical attack), then the potential for a brute force attack on other cryptographically secured systems is high.
Also, due to the "webs of trust" that
Re:What is the grid community? (Score:1)
Time to move on.
billions of individuals on the planet (Score:1)
Security challenges with grid computing (Score:5, Interesting)
Then there's the security issue.
But I see another problem which is even harder to solve: the tragedy of the commons. Consider a university campus, and suppose that anyone on campus can submit jobs to the Campus Grid. You come in the next morning and see that there are 10000 jobs in your grid queue, and 9800 of them are encoding random people's MP3's.
The problem is that if you give free resources to a large anonymous community, it takes only a few of those people to suck up all the resources. So you need some way of identifying everyone who submits a job, and some way of charging for the jobs.
Re:Security challenges with grid computing (Score:2, Interesting)
Re:Security challenges with grid computing (Score:3, Informative)
That's why the people who are developing big grid projects are not giving free resources to anonymous users. These grids are the combined resources of all all the colloborators, and have controlled access to the resource pool.
HIPPA security (Score:2, Interesting)
Re:Grid computing will never be secure (Score:2)
It seems to be a commonly held misconception that making your node part of a computational grid implies making all of its resources available in the absence of "physical" layers of security (e.g. VPN, virtual memory protection). This is not true - in the "client pull" model, a node on the grid can choose exactly what it cares to run - and if this
Jane... (Score:3, Insightful)
I wonder what that AI would do upon emerging? Lurk around in silence? Help or harm the human race? Would it develop its own set of laws?
Or maybe it'll end up being another ELIZA chatbot.
"What about clueless make you want beer drown?"
-Cyc
Re:Jane... (Score:5, Insightful)
No.
What we would need for accidental AI evolution is a sufficiently large system with not only billions and billions of bits, but the ability for each individual node in that system to modify the nodes around it.
The internet will actually be useful for EVERYTHING far before it ever sprouts an AI.
Re:Jane... (Score:2)
Re:Jane... (Score:1)
A fascinating idea of course but to be clear Card had a definite notion of soul. The network did not become aware by itself but the Buggers actually took a conscious from the ether and placed in the network in the same way they did with new queens. They did this in hope of contacting ender through the game he played in the battle school and eventually the conscious evolved to utilize the ancible to create a large galactic AI. Card did not see grid computing (on a planeta
Re:Jane... (Score:1)
Can someone explain to me ... (Score:1, Offtopic)
How, in this day and age, does Cisco leave sensitive information like their network OS source code on a computer/grid that is accessible from the outside internet?
The answer. (Score:2)
What use is security when you have an open invite? (Score:3, Insightful)
Poor GUI design, insecure appliction defaults and lack of awareness by users all contribute to poor security.
For example just do a search for boot.ini or inbox.dbx on any p2p program to get an idea of just how many open boxes are out there.
Plan 9 (Score:1, Interesting)
Re:Plan 9 (Score:2)
Looks like I was right... (Score:4, Funny)
Yup, you know it!
Re:Looks like I was right... (Score:2)
Blatant plug... (Score:2)