The Fu­ture of Tech­nol­ogy Security

Through an in­ter­view, Kr­ishna Ra­jagopal, Chief Ex­ec­u­tive Of­fi­cer of AKATI Con­sult­ing, he shares his in­sights into the world of tech­no­log­i­cal security in the face of in­creas­ing security breaches, ex­ploits and hacks into valu­able busi­ness and per­sonal in­for

Insurance - - MAN­AGE­MENT -

Q: 2011 was known for Dis­trib­uted De­nial of Ser­vice (DDOS) at­tacks in the cy­ber world. Will the year 2012 be any dif­fer­ent? With all the crazy 2011 security breaches, ex­ploits and no­to­ri­ous hacks, what can we ex­pect from 2012? Well… noth­ing dif­fer­ent, ac­tu­ally! DDOS will still be there as a form of protest. It will be a new style of protest­ing, but I would like to dub the year 2012 as “the year of mo­bile and so­cial net­work at­tacks with a fo­cus on iden­tify theft.”

Q: Anti-virus soft­ware al­ways seemed to be one step be­hind at­tacks of Viruses, Tro­jans, Mal­wares all the time. Why is this so? Is this a chicken and egg sit­u­a­tion? Not re­ally. When a doc­tor wants to cre­ate a vac­cine for a real world virus, what hap­pens is that he usu­ally starts by ob­tain­ing a live sam­ple of the virus, and this live sam­ple is stud­ied and all at­tempts are made to un­der­stand how it repli­cates. He then tries to find its weak­ness and then builds a vac­cine to pre­vent it from spread­ing. This scene of op­er­a­tion also ap­plies in the world of com­puter viruses, as well. When a new virus is dis­cov­ered in the wild, these anti-virus coders must first get the copy of the ac­tual virus and it is bro­ken down. The coders, then, try to find out how it works and how to stop it – cre­at­ing what we call a sig­na­ture.

Newspapers in English

Newspapers from Malaysia

© PressReader. All rights reserved.