Criminal Opportunities in the Cloud
Establishing proper security over the cloud is a relatively new process and one that bears some differences from the old approach to security. For example, an obvious one, the cloud features large storage capabilities, such that if it isn't monitored closely, huge amounts of illicit data could be stored in corporate space and distributed from there and ultimately purged, so that the administrator never realizes that the action has happened.Experts at the Black hat Conference in DC pointed to this risk and lots of others.
They said, for example, that this storage capacity along with the computing power that could be available would mean that an array of data could be stored and then the information used to break passwords.
For an article on this and related issues, check out this link.