- Applied Network Security
- Arthur Salmon Warun Levesque Michael McLafferty
- 302字
- 2021-07-02 23:30:51
Current technologies
New technologies are continuously changing the landscape of network security. One of the best examples of this is the Internet of Things. A device, car, or building that is embedded with software, sensors, actuators, and some type of network connection is considered to contain the Internet of Things.
Objects with the Internet of Things collect and share data across the Web. Smart energy management systems have fully embraced this technology with great success. The Internet of Things has some amazing benefits, but also has some major and potentially devastating drawbacks. In 2014 two cyber security researchers demonstrated that it was possible to hack into a Jeep Cherokee and disable its brakes and transmission. This was done remotely using a vulnerability found in the Internet of Things.
Medical devices have also been subject to attacks. Some people now disable the Wi-Fi capability on their pacemaker, out of a real fear that a hacker could send a fatal electric shock through the device itself. Another interesting technology that is growing is called Software-defined networks (SDN). SDN allows network admins to manage network services through the abstraction of lower-level functionality. SDN architectures separate network control and forwarding functions, enabling network control to become directly programmable and the underlying infrastructure to be abstracted from applications and network services. This allows for much greater flexibility and scalability when working with modern computing environments.
The rise of smartphones, cloud services, and mobile data content has led to a change in how network architecture and infrastructure are implemented. Although these technologies are helping set new standards in efficiency and capacity, they come with many vulnerabilities that can cause great harm to inpiduals and businesses. That is why it is important for network security professionals to stay current on new technologies and practices to best protect their networks.
- 零信任網(wǎng)絡(luò):在不可信網(wǎng)絡(luò)中構(gòu)建安全系統(tǒng)
- 黑客攻防與電腦安全從新手到高手(微視頻+火力升級(jí)版)
- 網(wǎng)絡(luò)安全意識(shí)導(dǎo)論
- 信息安全等級(jí)保護(hù)測(cè)評(píng)與整改指導(dǎo)手冊(cè)
- End to End GUI Development with Qt5
- 持續(xù)集成:軟件質(zhì)量改進(jìn)和風(fēng)險(xiǎn)降低之道
- CTF快速上手:PicoCTF真題解析(Web篇)
- Mastering Metasploit
- Android Application Security Essentials
- Web安全攻防從入門到精通
- 黑客攻防與電腦安全從新手到高手(超值版)
- 網(wǎng)絡(luò)空間安全實(shí)戰(zhàn)基礎(chǔ)
- Python Penetration Testing Essentials
- 數(shù)據(jù)中心安全防護(hù)技術(shù)
- 從實(shí)踐中學(xué)習(xí)Web防火墻構(gòu)建