Tek-Tips is the largest IT community on the Internet today!

Members share and learn making Tek-Tips Forums the best source of peer-reviewed technical information on the Internet!

  • Congratulations TouchToneTommy on being selected by the Tek-Tips community for having the most helpful posts in the forums last week. Way to Go!

what security technologies do you think the market will adopt...

Status
Not open for further replies.

meshel

MIS
May 23, 2003
7
US
What security technologies do you think the market will adopt over the next 2 years? ANy help you could please provide would be GREAT!! Thanks
 
Boy. Tough question.

Nothing to do with the technologies that are popularly appearing but because the issues with securtity technolgies wil continue to involve people and their starnge habits.

Without getting too deep into IR fingerprint recognition (as used as a gimick on recent PDAs), retina scans, and - for all I know - DNA testing, there will always remain a human element

Any system that incurs false positives will piss users off. Any sytem that makes access tricky will piss users off. Any sytem that makes users have to think/remember stuff has flaws

 
I think some of the biggest changes may be in the area of e-mailing and spam prevention.

Also Web services and its accompanying security (whatever that may be) will also get bigger.

Best regards,
J. Paul Schmidt - Freelance ASP Web Developer
- Creating "dynamic" Web pages that read and write from databases...
 
hell... we might as well all just go and get smart cards implanted in our hands... or where ever... (J/K)

Be able to walk up and shake hands and transfer business cards, payments, credit card information, whatever...

Yeah... Right...

Sounds like a good Idea until everyone comes up with empty bank accounts and identity theft commited against them...
Because someone figured out a way to steal the information by shaking hands...

I am getting to the point where I am starting to wonder if security actally even exist or if it is just a "good idea"

I guess it all kind of goes back to the whole thing about...
No matter how tough you are there is always someone out there that is tougher... (with multiple variation on the word usage ;-))

As long as people can develop fail-proof security systems...
There will always be people who can hack/work around them...

So... Is "security" actually anything more than a better sounding word for delayed access?

after all... to almost any given situation... if there is one way to do something, is there not another way possible?

Please feel free to comment on this...

Have Fun, Be Young... Code BASIC
-Josh Stribling
cubee101.gif

 
First level security: what you know, aka passwords
Second level security: what you have, aka tokens
Third level security: who you are, aka biometrics

Each level builds on the previous level. Now most software includes passwords and we have https, encryption, cryptoprotocols, etc. Authentication in short. We can expect better encryption algorithms, new authentication protocols and bigger key sizes, though the great breakthrough was public key security.

Tokens are less widespread, but smartcards, particularly wireless smartcards, are pretty common. In general, expect more powerful cryptographic chips and the multiple wireless solutions to remote tracking, like chip implants for people and animals.

Biometrics are the next wave, but still confront problems, despite some successful systems in the market. The big step I think will be face recognition software, though there are problems regarding illumination and gestures. You can't do better than DNA, though, but it can be somewhat easily (and painfully), defeated.

As for systems, try looking for honeypots and honeynets. Also the development of common criteria for IT, and antivirus technology against such beauties like recombinant machines.

In the end, security is not a matter of technology but a
lifestyle: you need a holistic approach to security or it won't work. The cleverest password is nothing if you write it over your keyboard; the latest smartcard is useless if you forget it in the bathroom; biometrics are null if you key personnel is on the competition's payroll, etc.

Try looking for attack trees for a fun methodology of security threats assessment.
 
Status
Not open for further replies.

Part and Inventory Search

Sponsor

Back
Top