Page 17 - AeM_Mar_2018
P. 17

RESEARCH, ANALYSIS & TRENDS



       Next-generation hackers emerge                      With  84%  of  all  cyberattacks  currently  taking  place  at
                                                           the  application  level,  it  is  imperative  to  implement
       Not  only  IT  has  undergone  a  change  thanks  to  cloud   security there, too. Because only if the application itself
       computing,   increased   digitization,   and   mobile   has  been  equipped  at  the  end  of  its  development
       computing.  The  hacker  scene  as  adapted  fast  and   process, at the binary code level, with multi-layered and
       changed  significantly  in  recent  years,  too.  We  are  no   dynamic  protection  mechanisms  -  and  above  all  an
       longer  confronted  by  semi-professional  individual   active  encryption  of  sensitive  keys  -  it  can  effectively
       perpetrators, but well-organized hacker networks, which   withstand   sophisticated   hacker   attacks   and
       makes  cyberattacks  of  the  21st  century  the  more   manipulation attempts. The fact is that cybercrime, data
       dangerous:  Hackers  that  act  like  companies,  manage   theft, and cyber-attacks have reached a new dimension
       tailor-made  attacks  and  have  in  addition  sufficient   in  recent  years,  mainly  due  to  the  advancing
       financial  resources,  are  always  finding  new  ways  to   digitization,  an  increasingly  professional  hacker  scene
       break through previously effective security barriers.   and the lack of security technology.

       Ineffective security technologies
                                                           Well, although it is much easier to find applications for
       Although  the  damage  caused  by  hackers  and     IoT  that  help  consumers  in  managing  their  everyday
       espionage  has  increased  dramatically  in  recent  years,   life, the Industrial Internet  of Things (IIoT) holds great
       many  IoT  devices  and  common  infrastructure  remain   benefits  as  well,  aside  from  the  typical  purpose  to
       vulnerable.  Countless  companies,  including  large   automate,  save  costs  and  optimize.  A  more  holistic
       corporations  and  operators  of  critical  infrastructures,   view  and  clear  strategy  is  needed  to  make  the  shift
       have  not  yet  realized  the  seriousness  of  the  situation   towards  innovation,  better  customer-centric  service,
       and  therefore  have  often  neither  adequate  technical   leveraging  new  sources  of  data-driven  revenues,
       security measures nor adequate insurance coverage in   building  ecosystems  of  value  and  ecosystem-wide
       place. To prevent manipulation, data theft and reverse   digital transformation. ◊
       engineering, conventional security technologies such as
       conventional anti-virus software, firewalls, or even static
       encryption  and  obfuscation  programs,  are  completely                          By Daniela La Marca
       inept.  Particularly  mobile  devices  and  IoT  applications
       that  run  in  distributed  and  unsecured  environments
       require special protection.






































                                                 MediaBUZZ Pte Ltd - Independant ePublisher for Asia
   12   13   14   15   16   17   18   19   20   21   22