ANACOM

!    
TÍTULO/RESP.:

2018 Trends to watch [documento eletrónico] : IT and cybersecurity

: hyperconnectivity and quantum computing must drive change in security thinking / Rik Turner

AUTOR(ES):

TURNER, Rik

PUBLICAÇÃO:

London: Ovum, 2017

NOTAS:

"The IT and cybersecurity market is in rapid evolution. As technology trends such as cloud, mobile, and now the Internet of Things (IoT) enable new ways of working and doing business, so too do they create new opportunities for threat actors and cybercriminals to attack organizations. They present new ways to purloin critical data and inflict lasting damage to IT infrastructure and, increasingly, industrial control systems (ICS). In this piece, Ovum's principal analysts specializing in infrastructure solutions outline the changes in the market, explain which trends will have the biggest impact, and highlight who will benefit from the fast-paced developments in IT and cybersecurity. Organizations, their systems, applications, networks, and the devices used to enable access are constantly being attacked by assailants that make use of anything from the most convenient forms of off-the-shelf malware to highly sophisticated forms of advanced threats. Users and their devices are being targeted as the weakest links and need better and more inclusive forms of protection to stay safe when accessing business systems. Identity and access management (IAM) will continue to provide core identity management and access control facilities for business users. New strategies that offer identity-as-a-service (IDaaS) and customer-facing identity management services will offer new forms of the technology and open the IAM sector to new user groups. Connecting operational technology (OT) and information technology (IT) environments in the Internet of Things makes it increasingly easy to target critical infrastructure with cyberattacks that leave lasting damage. The ease with which many IoT devices in the home can be compromised means we will see a growing number of attacks launched from botnets created in the IoT.
Data obfuscation techniques such as encryption are also becoming increasingly important as more enterprise workloads move into hybrid and public cloud environments. Enterprises that are encrypting their data today need to start thinking about adopting technology that will be resistant to the onslaught of quantum computing on their cryptographic keys."

TEMA:

Comunicações Eletrónicas

ASSUNTOS:

Comunicações eletrónicasTelecomunicaçõesInternetSegurançaComputação em nuvemRedes-de-ComunicaçõesTecnologiaIoT

CDU:

004

DATA PUB.:

2017

TipoReg:

Multimédia

LÍNGUA:

ENG

Monografias