blog

0
116
Monday, August 8, 2008

Google serves as first line of defense during Russia’s invasion of Georgia (A plug for the cloud)

As reported by the Christian Science Monitor, “As Georgian troops retreated to defend their capital from Russian attack, the websites of their government, also under fire, retreated to Google. In an Internet first, Georgia’s Ministry of Foreign Affairs reopened its site on Google’s free Blogger network and gave reporters a Gmail address to reach the National Security Council.”
——–

Now that the Russians are apparently pulling out of Georgia, the world is rushing to understand if we’re at the front end of a new Cold War. One of the things I focused on was the impact of this on the reality of cloud computing for the DoD.

According to the New York Times, “… the attacks against Georgia’s Internet infrastructure began as early as July 20, with coordinated barrages of millions of requests — known as distributed denial of service, or D.D.O.S., attacks — that overloaded and effectively shut down Georgian servers.”

Weeks before the “kinetic attack”, Jose Nazario of Arbor Networks reported “a stream of data directed at Georgian government sites…”. Other Internet technical experts cited this as the first known cyberattack that had coincided with a shooting war.

Assuming that this won’t be the last world conflict, this lesson may actually be a good thing for the future of cloud computing.

According to the Christian Science Monitor, “The online attacks forced the website of the president of Georgia, Mikhail Saakashvili, to relocate to the United States at Tulip Systems Inc., an Atlanta-based Web-hosting company. Even there it was under continued attack, although it was reachable from a Boston-based computer as of Wednesday [August 13, 2008] afternoon.”

If the website was hosted in a globally distributed cloud, how could an adversary even target Georgian government sites with DDOS attack? Distributed defense in the public cloud may be the best thing for DoD.

Google serves as first line of defense during Russia’s invasion of Georgia (A plug for the cloud)

A timely reference for this would be From Information operations to cyber warfare and a new terrain posted on Selil Blog.

You should also read Kevin Donovan’s take on this in his blog.

Follow me at https://Twitter.com/Kevin_Jackson

LEAVE A COMMENT

Name*
E-mail*
Phone number*
Your Message

Latest posts

0
1310

How “Big Iron” Does “Big Regulation”

According to Verizon, there were over there were over 53,000 security incidents in 2017, with over 2,200 of those ide...

0
1623

Mainframe Synergies for Digital Transformation

In July  of 2018, Broadcom announced its intentions to acquire CA Technologies. In the press release, Hock Tan, Presi...

0
356

2018 AT&T Business Summit: Security “in” and “of” the Cloud

While public cloud is undoubtedly an outsized piece of the conversation, news headlines of the latest data breach can...

0
128

My Brush with Royalty: Queen Latifah

Queen Latifah! Hip Hop Icon. Movie Star. Television Star. Fashion Model. Songwriter. Producer. Entrepreneurial Genius...

0
264

What’s New in Puppet 5?

Puppet 5 is released and comes with several exciting enhancements and features that promise to make configuration man...

0
149

5 Reasons Why Ansible is the Best CM Tool Out There?

Amidst volatile markets, dynamic technology shifts, and ever-increasing customer demands, it is imperative for IT org...

0
205

Machine learning APIs for Google Cloud Platform

Google Cloud Platform (GCP) is considered to be one of the Big 3 cloud platforms among Microsoft Azure and AWS. GCP i...

0
253

What Is The Most Important Part of Architecture?

I always find it interesting to hear what people view architecture as. A lot of people think it’s just about the desi...

0
1727

Cloud migration best practice Part 4: Executing the migration

This series has stepped through cloud migration best practices. After providing an overview, we discussed: Classifyin...

0
326

Cloud Migration Best Practice Part 3: Application Portfolio Analysis

In part three of this series on cloud migration best practice, I will focus on migrating the application itself. If y...