Regrettably this is the high price we pay for technology advancements: a great deal of awesome lifestyle enablers coupled with the resultant security headaches.
The right question, therefore, to ask is: are we equipped to handle these onslaughts when the time comes?
The reality is that computer networks are becoming more and more integrated into our daily lives - even car door locks are controlled by networks - if you lock the key in the car various service providers can, in a matter of minutes, unlock it for you via a wireless Internet connection.
New age burglary
These technological advances are making it possible for Internet security offenders to steal cars or to hack into our refrigerator computer. Looking at the bigger picture, the integration of these computerised devises is enabling offenders to burgle users swiftly and easily.
Indeed, the shift from viruses and worms to spyware and bots clearly indicates that these offenders are already adjusting their tactics to exploit these integrated systems.
And of these newer threats, users are especially worried about spyware. Even more worrying is that it isn`t always easy to distinguish the safe programs from spyware.
Fortunately, the Anti-Spyware Coalition, a group of more than 20 technology vendors and interest groups, recently unveiled a set of guidelines that will help anti-spyware vendors determine what could be flagged as spyware.
The coalition defines spyware as technologies deployed without appropriate user consent and/or implemented in ways that impair user control over:
* Material changes that affect their user experience, privacy or system security.
* Use of their system resources, including what programs are installed on their computers.
* Collection, use and distribution of their personal or other sensitive information.
Although we are gradually taking steps to fight onslaughts on our very personal, network-driven possessions, these initiatives are only the beginning.
New technology, new mindset
User education is and remains imperative, regardless of the security threat.
Karel Rode, business technologist at Computer Associates Africa.
User education is and remains imperative, regardless of the security threat. Users need to realise that the Internet is as big a threat as it is an asset. Like moving into any new neighbourhood, users have to ensure they are careful what Web sites they open and where they choose to surf.
This can be achieved through gateway content filtering (blocking access to suspect sites) or implementing a real-time scanning solution on every machine, or deploy both as some users will access Internet sites through alternative connections.
Also, corporates need to take a firmer stance. Often security offences are not reported - indeed, a lot of companies are hesitant to report it because it may reflect negatively on the company.
Bots and schemes such as phishing and pharming have caused havoc on corporate infrastructures; however, little is done to fight this. The reality is the embarrassment is minimal when compared to the damage the next attack can cause.
The flipside of the coin is even if companies are willing to report their attacks, the authorities are to a certain extent battling to deal with it.
In the US, for example, the Zotob attack clearly indicated that more strict measures should be put in place. Two men were eventually arrested for their role in the attack - one from Turkey and the other from Morocco. But instead of being sent to the US, the defendants are expected to be prosecuted in their own countries.
Generally, various IT security solution providers are doing their best to prepare for the next, more sophisticated, influx of Internet security threats. The key is to partner with them; they are after all the experts and only have the network`s best interest at heart.
Without sounding too much like a toothpaste commercial, security providers are and remain users` last line of defence. Their partnership with users is imperative and will at the very least enable us to enjoy that newest, stainless steel refrigerator that is downloading the latest recipes from food24.
Share