Summary Post - Emerging security technologies
From the initial discussions, points summarise emerging security technologies.
Cloud technology
This technology has made tremendous progress in computing, especially in making high-end computing available to small businesses without having to spend much money on servers and infrastructure teams to maintain them Lord (2020).
Cloud computing reduces cost for the end-customers, but there are multiple variables in play, which directs concerns related to the visibility of data, data theft, inadequate controls over data, lack of skill Chakraborty (2020).
Hruschka (2020) argues that, when focusing on the security of cloud solutions, it is not always entirely clear who is responsible for the security in place. When using cloud services, be it SaaS or infrastructure-as-a-service (IaaS), the customer always has some level of responsibility to protect their data from attackers.
Hardware authentication
The disadvantages of using usernames and passwords are well known and require a more robust and secure form of authentication. One of the most recent techniques is to use certified hardware.
Debiccari (2020) describes that a system is only as strong as its weakest link and that link can often end up being the users of the system. Education and network security protocols like occasional password resets are still required to shore up against social hacking angles.
(Mohonee, 2020) mentioned that Two-Factor Authentication can be used as an alternative to hardware authentication.
Which was argued that not all 2FA are safe, by giving an example from a research article showing that, there is a phishing attack against Google’s SMS-based two-factor authentication exploit which is similar to the SMS containing the one-time password and SMS sent as part of Google Gmail’s confidential mode (Markeret al., 2020).
User-behaviour analytics
UBA models designed to highlight false-positive feedbacks; hence, it is a perfect tool to identify profiles with anomalous behaviour as watch-list-profiles and keep track of escalated unknowns, while applying predictive risk scores Seneviratne (2020).
Debiccari (2020), added that UBA is commonly used by credit card companies to detect identity theft. Only takes a few purchases that deviate from the credit card holder’s usual spending pattern to raise a red flag.
Cybersecurity industry needs to look at emerging security technologies, and the cybersecurity professionals continuously need to be at the head of the game.
References:
Amy, L. (2020) Initial Post - Emerging security technologies. Available from: https://www.my-course.co.uk/mod/hsuforum/discuss.php?d=230207 [Accessed 12 November 2020]
Chakraborty, S. (2020) Initial Post - Emerging security technologies. Available from: https://www.my-course.co.uk/mod/hsuforum/discuss.php?d=230207 [Accessed 12 November 2020]
Debiccari, C (2020) Initial Post - Emerging security technologies. Available from: https://www.my-course.co.uk/mod/hsuforum/discuss.php?d=230207 [Accessed 12 November 2020]
Hruschka, M. (2020) Initial Post - Emerging security technologies. Available from: https://www.my-course.co.uk/mod/hsuforum/discuss.php?d=230207 [Accessed 12 November 2020]
Lewle, S. (2020) Initial Post - Emerging security technologies. Available from: https://www.my-course.co.uk/mod/hsuforum/discuss.php?d=230207 [Accessed 12 November 2020]
Marker, P., Farke, F., Dürmuth, M., (2020) View The Email To Get Hacked: Attacking SMS-Based Two-Factor Authentication. [online] Ei.ruhr-uni-bochum.de. Available at: https://www.ei.ruhr-uni-bochum.de/media/mobsec/veroeffentlichungen/2019/08/19/way2019-5-view-the-email-to-get-hacked_v3.pdf [Accessed 16 November 2020].
Mohonee, K. (2020) Initial Post - Emerging security technologies. Available from: https://www.my-course.co.uk/mod/hsuforum/discuss.php?d=230207 [Accessed 12 November 2020]