Welcome to YLOAN.COM
yloan.com » Google » Googlechrome Ability To Protect Our Information Security?
Nokia Sony Ericsson Motorola HTC Sam Sung Panasonic Acer LG Sharp Toshiba BlackBerry Google android ringtone other Phones

Googlechrome Ability To Protect Our Information Security?

HC Network Security Recently, many of the daily system updates and software patches tired Information Security Workers and IT System administrators have asked me

, the new operating system (such as Google Chrome) is Microsoft in the PC operating system and can shake the unchallenged dominance of the issue of information security will improve after five years?

In fact, this is a difficult question to answer. Five years later, IT industry, of course, there will be more ground-breaking Technology . Therefore, the answer to these problems is the safest way, review the current status.

Very clear, we are engaged in a network war. One attack through malicious programs, practices, and other malicious activity break for profits and growing network Crime Persons. These people have been able to succeed, because computer is basically dominated by a single operating system. If you are a Hacker You only lock on Microsoft's platform, you can find enough victims, let you pockets. This is a very simple economies of scale. With other operating systems (such as Mac OS) started to be welcomed, market share has grown, and the corresponding growth of malicious programs have begun to follow. This is not surprising.

However, if a very small operating system, and the use of open source it? If all the information and applications are stored in the cloud, as does the practice of Chrome the operating system? This will not be safer?


Theory, will be. When the operating system smaller, software errors (commonly known as bugs), they will naturally be less (because they may become less error-code), In addition, the operating system was not so strong, so, like the current range of malicious programs that use it may not exist. I personally do not believe that open source would allow hackers to more easily identify weaknesses in the system become even more dangerous (this is the rhetoric we often hear). Way through the hide to improve security, has never been very helpful!

Even so, some may still viable attack strategy:

Control connection to the cloud. Fixed point on the operating system as long as the little hands and feet, for example, to look at DNS records, you can allow users to connect to the web application, first transferred to underground malicious Web site, and then get their own web application page. As long as the communication channel is not completely blocked, the user's data may be fully exposed. Even if IP V6, encryption, certificates and other protective measures, this is a possible attack.

Attack cloud itself. If the cloud type cloud operating system, applications, and become the mainstream, then how important is the availability of 99.999%? Very important: If you can not access Host Information and applications on your computer equivalent to the waste. If an attacker using a standard Bot networks (within the next ten years should also see the use of multi-standard operating systems Bot infected computer) to give the host cloud infrastructure overload and paralysis on it? If the hacker demanded that the operators must be given to small "donate" in order to have paralyzed the cloud host recovery operate? For hackers, presumably this is a lucrative business. It sounds a bit like science fiction? Not at all! This has in fact happened, but only small. However, once the hacker current practices (let the computer infected with malicious programs and then used for illegal purposes) economic incentive is no longer (can not find enough victims), naturally there will be another way to place there.

Directly from the cloud (because the information has been moved to the cloud) to extract valuable information, such as: credit card, identity card number, login ID and so on. Cloud service providers must ensure that information is not being illegal access, will not easily allow hackers to copy a few million potential users of the login account password, online banking information, account information, transaction records. Simply put, it is essential to prevent data leakage, for this, I hold a skeptical attitude.


Census drawn from a word, I do not want to speculate whether Chrome the operating system will be successful, I do not want to predict the next five years which will become the mainstream operating system. However, one thing is certain, that is: the information security industry will not disappear, but rather a new attack against the development of a new defensive approach.

That time may no longer need to install on this machine large Virus Code files, but rely on cloud page, e-mail and document services, credit rating. In addition, of course, need to vulnerability assessment, protection, encryption and other protective measures to ensure the integrity of the digital exchange of information security.

Googlechrome Ability To Protect Our Information Security?

By: mumu
Google Instant-ly Hated Chrome Wheels And Tires Skyrocket Your Google Rankings By Using This Tactic Why Pages Disallowed In Robots.txt Still Appear In Google Seo Consulting California: Implementing Google Analytics For Leveraging Seo Who Are The Ones That Make Money With Google Adsense? Increasing Google Pagerank What is Google Instant and Will it Affect You? Ppc Basics Keyword Research Free Google Tools Make Money with Google | Earn Money How Google Traffic Works 7 SEO Things Google Really Hates - If in doubt Google will throw you out Do you think like a Search Spider - Google Search Bot?
print
www.yloan.com guest:  register | login | search IP(216.73.216.125) California / Anaheim Processed in 0.018027 second(s), 7 queries , Gzip enabled , discuz 5.5 through PHP 8.3.9 , debug code: 24 , 4974, 96,
Googlechrome Ability To Protect Our Information Security? Anaheim