Hacking - The Next Generation
Attack vectors that seemed fantastical in the past are now a reality. The reasons for this are twofold. First, the need for mobility and agility in technology has made the traditional perimeter-based defense model invalid and ineffective. The consumption of services in the cloud, the use of wireless access points and mobile devices, and the access granted to contingent workers have made the concept of the perimeter irrelevant and meaningless. This issue is further amplified by the increased complexity of and trust placed on web browsers, which when successfully exploited can turn the perimeter
inside out. Second, the emergence of Generation Y culture in the workforce is facilitating the use of social media and communication platforms to the point where citizens are sharing critical data about themselves that has been nearly impossible to capture remotely in the past.
Download
0 comments:
Post a Comment