Page 14 - Cyber Defense eMagazine - January 2018
P. 14

We can only guess that the idea for such a solution exists probably some time back –
               because  we  are  strongly  aware  that  all  brilliant  ideas  existing  today  as  commercial
               solutions would deal with their root coming many years before from a defense industry.
               And,  indeed  –  the  main  purpose  of  the  serverless  technology  is  to  save  the
               programming code on the web and offer us the chance to execute it when we want to.
               From that point of view – the serverless is so similar with the container’s technology, but
               – on the other hand – the application containers would offer much more options for the
               code storage. In addition, the serverless would cost us only if we use it and that’s really
               the big advantage having in mind that this system would be quite cost-effective. Also,
               it’s important to mention that the serverless computing is the way of cloud’s computing –
               but,  in  this  case  we  would  deal  with  the  Function-as-a-Service  (FaaS)  cloud’s
               deployment model.

               So, we would make a good talk about this very new paradigm, but we would not try to
               explain why we use the term “serverless” for this concept. The first and logical question
               here would be if there are any servers being applied in this case. The name “serverless”
               would suggest us that we would not deal with servers, data centers or any services. The
               fact is that there would be so many servers, data centers and services in the practice
               like in any other cloud’s system, but we would use the very small functions being the
               pieces of a code that would get stored without any limitations within the IT infrastructure.
               In other words, this is not any revolutionarily new solution, but rather the way to save
               your confidential code within the web environment.

               Also,  it’s  important  to  know  that  there  are  some  weaknesses  regarding  this  new
               technology. For instance, there would be so high risk for its data centers to get hacked
               and as it would use an HTTP communication channel – we are quite concerned that so
               many  cyber  criminals  could  take  a  big  advantage  over  the  vulnerabilities  of  this
               communication line. Also, this very new paradigm would cope with some access control
               concerns  –  but,  let’s say  that’s not  that  alarming  as  we  would believe  before. At this
               moment – there are the quite encouraging moves being made on the marketplace that
               would promise us that we should worry less about the access control.

               On the other hand, we would get aware that the hackers would easily obtain someone’s
               IP address and they could take a full advantage over some data center, IT infrastructure
               or  communication  line.  In  such  a  case,  it’s  so  significant  to  highlight  that  we  should
               always get prepared the good disaster recovery and business continuity strategies that
               would provide us an opportunity to repair once breached system.







                   14    Cyber Defense eMagazine – January 2018 Edition
                         Copyright © 2018, Cyber Defense Magazine,  All rights reserved worldwide.
   9   10   11   12   13   14   15   16   17   18   19