Chapter 21:Security Beyond Computer Networks: Information Assurance Guide to Computer Network Security
Guide to Computer Network Security Introduction Aspects of security that are likely to remain the same. Attackers are likely (always have) to make novel and better attack tools. We are going to do what we always do, react as developers send us patches to the newest attacks Security tools to protect the network are likely to remain highly complex and cipherable only by a select few who will remain demanding big pay for their services. Money allocation for system security is likely, as has been the case, to remain tied up in defensive security practices. System administrators will continue to have sleepless nights worrying about the capabilities of their traps because the kid next door is creating a smarter mouse. Guide to Computer Network Security
Guide to Computer Network Security There is likely to be improved targeting of victims, if there is a need for it, from better and improved “precision code guided attacks.” More behavioral-centered intrusion detection tools are to make their way to the market. As wireless technology takes a lead in both the telecommunication and computing technologies, the wireless network forming the boundaries of the fixed network is likely to cause the most security headaches for system administrators along with the independent completely wireless and mobile network. Wireless technology will split, if it has not done so already, the security of computer networks into three intertwining network: the fixed network, the wireless augmented network, and the completely wireless network. Security in these three intertwining networks will demand new tools and will create new hackers. There is going to be a need for greater collective security initiatives and best practices. Guide to Computer Network Security
Collective Security Initiatives and Best Practices Individual and national security are and will continue to be tied up. So collective security efforts must be found. There are initiatives already taking shape: The U.S. National Strategy to Secure Cyberspace - part of our overall effort to protect the nation Guide to Computer Network Security
Guide to Computer Network Security Council of Europe Convention on Cyber Crime – creation of criminal law to keep abreast of these technological developments Guide to Computer Network Security