bristy512
Doczy: 28 Pa 2024 Posty: 1
|
Wysany: Pon Pa 28, 2024 10:42 Temat postu: The paradigm of information security is changing |
|
|
For many years, building information security (IS) systems resembled building fortifications around a castle or a city: from the primary fences - antiviruses and firewalls, to numerous and diverse fortifications in types and functions. But they all have one common purpose: to protect the infrastructure from external threats. And the more threats appeared, and the more "refined" they became, the more various barriers were acquired and used in the hope of not letting the enemy into the "holy of holies".
Undoubtedly, each of the solutions used had and has a certain effectiveness for protection. Many of them are certainly necessary. But with the growth in the number and sophistication of threats, the realization began to come that absolute protection website development service is impossible, and the main task is to minimize possible damage in the event of enemy penetration through the created fortifications. And solutions appeared that imitate the best practices of counterintelligence "on home soil" - deception technologies or deception .
Honeypots have long been known on the information security market, but the complexity-to-efficiency ratio has not contributed to their popularity.
Deception is an intelligent system for creating a false infrastructure that dynamically changes with changes in the protected environment, simulating activity, but invisible for use in real activities. They allow not only to mask the necessary assets, but also to identify the presence and intentions of the attacker, to prevent potential damage at the early stages of his search for ways to the target. No false positives. If someone is in the "deceptive" environment, this is a real threat, about which you are immediately notified.
Many information security managers are concerned that the introduction of deception will complicate the infrastructure, and in the presence of layered perimeter protection, will not bring the desired effect. That is, the psychology of minimizing damage has not yet overcome the hope for the impregnability of fortifications. But more and more new cases of targeted hacking and penetration into seemingly completely protected structures, and causing material and reputational damage, are changing the paradigm of protection, not so quickly. And the blessing of ignorance, as well as the illusion of complete protection, because I have not been hit yet, are gradually disappearing.
In order to make sure that deception is not just another newfangled technology, but a recognized by authorities, including Gartner, “easy to deploy, highly accurate and effective way to detect threats ,” it can (and should) be piloted, choosing from products already available on the market.
Who needs deception? Of course, organizations with a developed infrastructure, whose activities are already or may be of interest to ill-wishers. More specifically, for large (by Belarusian standards) financial, fuel and energy and other important and critically important structures, those who understand the need and are ready to use truly effective tools to protect their assets from targeted attacks. _________________ website development service |
|