The Future of Technology Security
Through an interview, Krishna Rajagopal, Chief Executive Officer of AKATI Consulting, he shares his insights into the world of technological security in the face of increasing security breaches, exploits and hacks into valuable business and personal infor
Q: 2011 was known for Distributed Denial of Service (DDOS) attacks in the cyber world. Will the year 2012 be any different? With all the crazy 2011 security breaches, exploits and notorious hacks, what can we expect from 2012? Well… nothing different, actually! DDOS will still be there as a form of protest. It will be a new style of protesting, but I would like to dub the year 2012 as “the year of mobile and social network attacks with a focus on identify theft.”
Q: Anti-virus software always seemed to be one step behind attacks of Viruses, Trojans, Malwares all the time. Why is this so? Is this a chicken and egg situation? Not really. When a doctor wants to create a vaccine for a real world virus, what happens is that he usually starts by obtaining a live sample of the virus, and this live sample is studied and all attempts are made to understand how it replicates. He then tries to find its weakness and then builds a vaccine to prevent it from spreading. This scene of operation also applies in the world of computer viruses, as well. When a new virus is discovered in the wild, these anti-virus coders must first get the copy of the actual virus and it is broken down. The coders, then, try to find out how it works and how to stop it – creating what we call a signature.