Saturday, July 28, 2012

Cyber Security and the Unfinished Business | StartupWizz

The two players in cyber security are the cyber security experts who also can be white hat hackers and the bad hackers who are also known as the black hat hackers.null

Weak passwords become unacceptable by many online businesses because they want to provide extra protection and reduce their liability in the event those passwords got hacked and their customer's identities were stolen. Stronger passwords are longer with extra characters that are very hard to remember and very easy to forget.

Users most often choose to save their long and strong passwords on their computers or flash drives so they don't forget them. As a result of that those passwords can be stolen if flash drives are lost and found by others, also computers can be hacked and stored passwords can be stolen. The other option users have is try to memorize their long passwords and if they forget them, they will have to go through the process of password resetting which can be time consuming. More often users are always required to change their passwords regularly to avoid being hacked and they will have to memorize the new passwords all over again.

Changing Trends in Cyber Security

Cyber security experts have been exploring different and effective methods to shield against hackers. Some passwords for critical systems and for those organizations with sufficient funding are gradually being replaced with biometric identifiers like fingerprints and iris scans.

Biometric information is unique to each person and they cannot be stolen by a phishing attack for example. Using fingerprint or eye scan to log in can be very convenient, easy and productive and secure . Will biometric become the foolproof solution to the cyber security delima and will it get rid of those numerious and complicated passwords? Some suggest that biometric will be the security trend for the future, secure access will be less dependent on lengthy passwords but it will not be foolproof system.

When biometric data is entered into a computer, the system doesn?t store the actual fingerprint or iris scan. It records a digital template of the biometric information. When a user log in, his or her characteristics are matched against those templates, and the match is given a similarity score. If it?s high enough, the user allowed access.

The result of several researches done to find cracks in the biometric security systems were successful. Researchers we able to mimic the digital templates of the finger prints and even build gummy finger versions of the prints to gain access.
null Researchers also were able to hack into the Iris scans systems that takes images of the eye and create the iriscode. By making an image of the stored iriscode then modify it, researchers used the modified codes against the system and they were able to gain access successfully.

Cyber Security and Startups

Security is on the mind of any online business big or small. Startups in particular are vulnerable to attacks because they have low security budget and they have little experience dealing with virus and malware attacks on their web applications. a website that is infected with a virus can be blocked by search engines, that can cause a big setback for any startup.

Startups should scan their machines and website files using commercially provided virus scan software. Furthermore it is important to regularly back up website files. Check with the hosting company to make sure they are using a secure environment. Changing the password regularly still the only good option to protect against hackers.

Cyber Security and the Unfinished Business

0 votes, 0.00 avg. rating (0% score)

Source: http://www.startupwizz.com/2012/07/cyber-security-and-the-unfinished-business/

cate blanchett drew brees drew brees tim tebow jets katy perry part of me video photoshop cs6 beta nfl news

No comments:

Post a Comment

Note: Only a member of this blog may post a comment.