USB has been around for quite sometime and was designed to replace the interface capabilities of the old legacy standard. Today, most PC’s, Laptops and other peripherals have USB ports or have the capability of connecting to one such as keyboards, mice, digitizing pads, digital camera’s, video camera’s, flash disks and the device types goes on and on. They have become so common that many security experts warnings on their danger have gone unheeded, till now that is. Recent security holes and other problems associated with malware and viruses that have been transmitted through the USB port have risen to the point security people had to listen. These interface ports are quite convenient and easy to use that even the most beginner can plug an infected device such as a flash disk loaded with malware or viruses that they easily get through standard security. They are so small that physically banning them can be next to impossible and I’m sure you’ve read the several articles regarding the iPod which was connected to the corporate network…etc. Expert’s advice that to minimize their use for no good, disable them on-board or do not bother connecting them at all at the hardware level. This would render them truly unusable for some people however innocent of the workings of a PC or other computer type can enable them in the control panel easily. Unbeknownst to many, most devices that have flash memory can be used to store files other than video or pictures for they can be formatted using the operating system’s format utility or the propriety software such as iPod’s iTunes which can have even the most basic iPod Shuffle function as a flash disk allowing transport of say documents and other such files.
More on Biometrics – Voice Recognition
The field of IT security has been working with biometrics for quite sometime and has successfully added a layer of security for computer users out there. The heaviest users of such technology are large businesses who aim to have the need for protection due to technology breakthroughs, corporate information and other vital security issues such as in government military offices. Though the technology has spanned most of the human physiology ( Fingerprint, cornea scanning, palm scanning, face recognition and many others) none have focused much on the area of speech or voice recognition technology. Your voice is as unique as a fingerprint and even between twins there are subtle differences in their make-up, tone, pitch, and many other voice characteristics are being studied in conjunction with other biometrics technologies for access control to data sensitive areas such as government intelligence offices, tax office and other such areas that need protection. With many people using headsets and other devices, why not voice recognition. Even walking patterns are being studied by analysts in Sweden which have been working on security devices for cellular phones which can detect if the user has changed and shuts itself down preventing use. This is done to discourage theft of cellular devices which has seen a sudden rise in the past years. The voice recognition can replace password which, as today’s technology sees it is quite inefficient. Other technologies of the future may have your DNA as your password which has been highlighted by sci-fi movies such as the Minority Report where retinal scanning was used to identify people. The Futuristic world of Gattaca where people are selected for their genes rather than personality and abilities. The future of biometrics is indeed heading that way for the ultimate identification system is your DNA which is unique in all aspects to each and every individual.
Inter-Operable Information Systems – Leading the way for a safer tomorrow
The US government is leading the global scene with it’s many states placing requirements for inter-agency, inter-operable information systems that would allow the various agencies in law enforcement, public service and homeland security to communicate through voice and data allowing faster information dissemination thus improving performance. This allows these various state and federal agencies to have common channels of communication and information systems that can communicate through the internet diffusing the time it takes to distribute relevant and vital information to all concerned agencies. This gives faster response times and better public service on the forefront of their goals. State governments are expected to shell out millions upon millions into technology for IT security and Communication that must not only be secure but robust enough to stand the test of time. Industries in the said areas are hustling in providing these services opening opportunities for new business fronts which is always good for their respective businesses.
The entry of the New Year heralds the need for new budgets and upgrading of current systems to keep pace with crime and other degrading IT infrastructure. Governments have already spent and are planning to do more in hopes of getting people the protection they need from better weather forecasting and information dissemination, to fast crime reporting systems allowing both local and state policing agencies to fast get on the track to solving and curbing crime. Inter-Operable communications and Information systems would be a major costs in the upcoming budget hearing and industry has taken notice developing better and more innovative products for the public service sector.
IT Security in Public Schools
It has happened again, information with vital importance getting stolen lost into oblivion but not as grave as the incidents with the UK government, this time in a US Public School. This has been the second break-in in the said school since November last year and it is causing disgust with all concerned, students, teachers and staff alike. The school, Dorothy Hains Elementary school has been broken into twice in a span of a few months when vandals broke in, burning walls and other school equipment. The recent exploit also has office equipment, namely an administration computer which has the social security numbers of all the students and teachers. The principal has expresses utter disgust and desperately wants the disks back so as not to cause more disruption in the school’s operation.
IT Security is now getting on all the to headlines for with more and more information being centralized it becomes easier to loose vital information in so little a crime as petty theft. The recent blunders of the UK government with thousands of constituent information such as tax data and other financially important information highlights the need for more security and may call for more strict control and security on information, it’s use, storage and transport. The FBI, one of the world’s premier crime fighting agencies of the US suffers attacks on various levels through the internet considering the fact that it employs some of the most sophisticated counter-intelligence systems in the world how would an elementary school fare? You be the judge, and let us demand for better control and security of information from governments that it be guarded and kept. One way to curb this would be to impose more strict policing and penalties for violators to deter future venture into the area of IT Security that is Identity Theft.
IT Security – the main concern for 2008
Many have been victimized by identity theft and no other area has been so affected as the banking industry. Investment in upgrading and purchasing newer technology and software is one of the most expensive costs for the banking sector which has one of the highest losses when it comes to IT security. Banks and other financial institutions are expected to pour billions of dollars into buffing up their defenses in hopes of staying one step ahead of fraudulent claims and users. The culprit, the internet, the internet has become one of the most dangerous territories on earth for anywhere financial information is transmitted and used, it can be intercepted and misused. True to the dilemma, health industry leaders have also begun to recognize the rising costs associated with identity theft related medical claims. This has already been in the forefront of the battle in the US and is fast spreading around the world and company after company is falling victim to the said crime. The internet also makes it easy to get away with the crime for use of public access which can be traced but the user may be any of the millions of users at one time. Hackers can also turn to call bouncing options which is more akin to spy movies but is really possible. The banking industry has long been a target of ID theft more so in their credit card divisions where billions are lost annually to fraudulent claims and use. Technology is the only security these establishments have as defense but technology as we know it costs a lot but there may be no other choice for them. Buy or bust is the dilemma and they are surely buying.
IT Security – the outlook for 2008
Wireless networks and ways of protecting them will top most of the IT Security issues for the coming year. Predictions place wireless networks to slowly take over the now existing networks and development into WiMax which has more coverage area in terms of distance compared to WiFi is making this a fast reality. Players in the WiMax development include the biggest names in the wireless network area such as Intel, Samsung, Motorola and many more. Innovations will continue to push the technology to better and improved performance like never before.
Studies also show that more and more workers are turning to wireless computing for their network and office needs doing what they do in the most unlikely places such as coffee shops and anywhere else they can get a stable and sustainable connection. It also raises ethics issues for people will no longer be out of reach of networks and equally their jobs. Family time and other more casual needs for privacy and quiet time will be secondary for your boss can always reach you anywhere on the planet there is coverage of a network.
The death of satellite based communications has spurred rapid development of Voip allowing anybody connected to the internet instant access to telephone-like services without the use of dedicated telephone lines. This saves on telephone bills and has been in use heavily initially with call centers and has now shifted to mainstream use so more is to be expected of the technology in the years to come which may ultimately result in the death of the standard telephone service many opting for high-speed internet access instead.
The release of the Quad-core processors and planned development of more multi-core microprocessors fuels the future of laptop supercomputers which may come in following years. This and all of the better and improved technology will allow computing to soar into new heights making them a mainstay in our everyday lives for the future.
[tags]Multi-core Processors, Mobile Computing, Mobile Workforce[/tags]