Free Newsletter
Register for our Free Newsletters
Access Control
Deutsche Zone (German Zone)
Education, Training and Professional Services
Government Programmes
Guarding, Equipment and Enforcement
Industrial Computing Security
IT Security
Physical Security
View All
Other Carouselweb publications
Carousel Web
Defense File
New Materials
Pro Health Zone
Pro Manufacturing Zone
Pro Security Zone
Web Lec

Senior academic forecasts severe internet limitations due to malicious code

Lumension Security : 17 June, 2008  (Technical Article)
Lumension Security proposes alternative approach to internet security to prevent the gloomy future recently forecast by leading academic
One of the world's leading academics, Professor Zittrain, has warned that the internet may come to an end under the weight of malicious code. Zittrain has called for the internet to be locked down by a solution that does not destroy the creativity and openness that made the internet such an enormous success in the first place, according to media reports.

Andrew Clarke, Senior Vice President International, Lumension Security comments: "Whilst it may be a little over zealous to suggest the internet is rapidly coming to an end, it is clear that users are in a continuous battle to combat the threats that emerge as a result of increased malicious activity on the internet. The widespread nature of viruses, spam, worms, phishing and fraud has meant that fending off each new piece of malware as it emerges is next to impossible, putting an end to the reliance on reactive technologies like anti-virus software.

"The problem is that we now operate in a chaotic security environment; racing around applying emergency security updates in response to identified threats and vulnerabilities. This reactive approach to security (typified by anti-virus solutions) has highlighted many inadequacies, placing PCs at risk of security breaches. Only by turning security on its head to enforce a 'known-good' state, can cyber crime be addressed.

"The public and businesses alike need to consider deploying technologies that monitor and only allow known good applications or devices to connect to their PC or network. Whilst this 'whitelisting' approach has had a reputation for impacting productivity, the technology has progressed rapidly since it emerged on the market, not prohibiting the user entirely but allowing them to access data and execute programs that are needed to perform their daily tasks while keeping the malicious activities out."
Bookmark and Share
Home I Editor's Blog I News by Zone I News by Date I News by Category I Special Reports I Directory I Events I Advertise I Submit Your News I About Us I Guides
   © 2012
Netgains Logo