Security trends for 2010 : Be watchful
Computers & Technology → Site Security
- Author Pirumandal Manal
- Published January 30, 2010
- Word count 547
Security of IT infrastructure means protecting information and information systems from unauthorized access, use, disclosure, disruption, modification or destruction. The next year, 2010 will be the year of constant change. Also, adoption of cloud computing, social media, 3G/4G, web based apps and virtualization technologies will require more security concerns due to emergence of new cybercriminal methods such as ransom-ware and Crime as a Service will threaten the enterprise segment at large.
The feature here discusses about various security trends for the upcoming 2010.
Security with Antivirus is not appropriate in Virtual-clouds
At present, various organizations are adopting cloud-based services that open them to many risks and infections as data travels to and from protected networks through a public pipe, creating many more opportunities for data infection or theft. Therefore, such organizations should consider suitable security measures to counter the issue.
Further, the much hyped virtualization technology, which allows companies’ business application to be managed by host’s hardware, will be a key in securing virtual movements on the servers. Hence, the increment in the malware activities during 2009, the industry should realize that the traditional approach of antivirus is not sufficient for such threats.
Social Engineering: A Major concern
Social engineering is the act of maneuvering people into performing actions or divulging confidential information. Various web criminals adopt such practices and never come face-to-face with the victim. Therefore, security companies like Symantec has suggested that such practices will surely increase in 2010.
Microsoft’s Windows 7
Microsoft’s Windows 7 is the most secure version from the software giant’s desktop operating system. However, the company had already released the first security patches for it. But, as always there could be some security lapses in the software, which can be exploited by hackers. Therefore, the Windows 7 could be a major focus in 2010.
Hype in Social Networking Apps
Today, various people are just crazy about social networking. But recently, Facebook users had discovered that on various quiz apps, they are providing vast amounts of personal information on the networking site.
Further on Facebook, users can load third-party applications, which are the simple widgets that are adding sparkle to friends' profiles. After the user is allowed to install the widgets, these apps are displayed as small icons on the profile. However, it is found that sometimes these apps are compromised with viruses. Therefore, in 2010, the apps on the social networking would be of prime concern.
CAPTCHA Technology
CAPTCHA stands for Completely Automated Public Turing test to tell Computers and Humans Apart. To fight against spammers and web attackers, which works in automated modes, the CAPTCHA technology will help the industry in 2010.
Win32 Conficker worm
Conficker worm had attacked defense computers in Britain and France besides German military systems in February, 2009. After that it is reported that Conficker C or April Fool’s virus will hit the world on April 1. However, a Conficker worn was discovered on April 7 called as Conficker E. Microsoft had announced that it will offer $250,000 to the person who will provide information about the culprit, but the investigation is still continuing. Hence, the Conficker worm would be a major concern for the next year.
CaaS vs. SaaS
SaaS or Security-as-a-service will offer services to protect against cyber-risk, but now cyber-criminals recasting the SaaS model to implement their own CaaS (Crime-as-a-Service approach).
http://www.itvoir.com/portal/boxx/knowledgebase.asp?iid=1724&Cat=23
Article source: https://articlebiz.comRate article
Article comments
There are no posted comments.
Related articles
- A Brief Guide: The A-Z of Tailgating Attacks
- Essential Tips for Proofreading and Editing University Assignments
- Stop the Bleeding
- Top 10 Digital Forensics Tools: An In-Depth Exploration
- All You Need To Know To Secure Your Data From Phishing
- Crypto Security Guide: Everything You Need to Know to Protect Your Crypto
- Advancing Email Validation in Laravel
- Fortifying the Digital Fortress: Understanding the Foundations of Cybersecurity Architecture
- How is GenAI Changing Cybersecurity?
- AI-Enhanced Cybersecurity Trends for 2024
- The Game of Trust: A Guide to the Future of KYC in Gaming
- AI in Cybersecurity: The New Frontier in Digital Protection
- Metadata: The Attorney’s Secret Weapon in Civil Litigation
- The importance of cyber security
- 5 Reasons to Comply with CMMC
- Payless CCTV Security Camera
- How Bitdefender Protect From Pegasus Spyware
- Printer Security? Here Are 6 Tips To Keep Your Business Safe
- Why it is important to install Access control system at your business
- Powerful Keyloggers for Windows
- Website security check: Tips on how to protect your website from hackers
- How will cyber threats evolve in 2020?
- When to choose red teaming over penetration testing: A guide to a robust cybersecurity program
- Protect your files with drive image backup software
- How Cloud Management Values Change Your Business
- The U.S. Government and Zero Day Vulnerabilities
- Spyware – Yet Another Cyber Menace
- Reset lost passwords in Windows with Active@ Password Changer
- Antivirus measures you should know when your PC is infected with a virus
- Security Fit For Royalty!