Emerging cybersecurity technologies in 2017

IT security as we know it is going through a revolution. A large number of legacy systems have been replaced by more complex, mobile, wireless and even hardware independent storage and transmission systems. The war between data defenders and data thieves is described as a cat-and-mouse game. Once the white hat resists one form of black hat malicious behavior, the other malicious form raises its ugly head. How to tilt the game environment to support InfoSec fighters? The answer lies in these emerging technologies this year.

Hardware certification

The shortcomings of user names and passwords are well known. Obviously, a more secure form of authentication is needed. One method is to bake authentication into the user’s hardware. Intel is moving in this direction with the Authenticate solution in its sixth-generation Core vPro processor. It can combine various hardware enhancement factors at the same time to verify the user’s identity. Hardware authentication is especially important for the Internet of Things (IoT), in which the network ensures that things that try to gain access to it should be able to access it.

User Behavior Analysis

Once someone’s username and password are destroyed, no matter who owns these usernames and passwords, they can enter the network and engage in various malicious actions. If the system defender is using user behavior analysis (UBA), this behavior may trigger a red flag. The technology uses big data analysis to identify users’ abnormal behavior. Comparing a user ’s current behavior with past behavior is not the only way UBA can identify malicious actors. It can compare someone’s behavior with someone who has the same manager or the same department. This can indicate that the person is doing something they should not do, or that someone else has taken over their account. In addition, UBA can be a valuable tool for training employees on better safety practices.

Early warning system

The early warning system is still in its infancy, but its purpose is to reduce hacking in an innovative way. These systems are based on algorithms that try to identify sites and servers that will be hacked in the future. This view is not just focused on the weaknesses of the infrastructure; instead, it includes an analysis of the common characteristics shared by the most hacked systems. For example, a site known to contain large amounts of sensitive financial data will be more likely to be targeted by hackers than another site that contains only general business information. Such systems are not designed to protect all sites, not even sites with a certain type of security, which is different from traditional network security methods.

Virtual Decentralized Network (VDN)

Man-in-the-middle network attacks are increasing, and hackers use these attacks to change messages or insert messages into the communication stream. The virtual decentralized network-or VDN-imitates the traditional methods used by the military. The radio frequency changes randomly, and the communication is divided into several parts (or multiple streams). The receiving radio is programmed to reassemble these parts into their original form. With VDN, the Internet itself or a specific network will become a communication assembly platform.

Combination of intrusion detection and encryption technology and Security Assertion Markup Language (SAML)

The biggest problem with cloud-based applications, especially with regard to BYOD, is that these technologies reside and transmit outside the parameters of traditional firewalls and security systems. To address this issue, some companies are using SAML (Data Authentication and Authorization Format) and intrusion detection and encryption software to manage their data streams.

The


Source by Saumya Sinha