02.12.2019 Views

Cyber Defense eMagazine December 2019

Cyber Defense eMagazine January Edition for 2020 #CDM #CYBERDEFENSEMAG @CyberDefenseMag by @Miliefsky a world-renowned cyber security expert and the Publisher of Cyber Defense Magazine as part of the Cyber Defense Media Group with Pierluigi Paganini, Yan Ross as International and US Editors-in-Chief and many more hard working amazing contributors!

Cyber Defense eMagazine January Edition for 2020 #CDM #CYBERDEFENSEMAG @CyberDefenseMag by @Miliefsky a world-renowned cyber security expert and the Publisher of Cyber Defense Magazine as part of the Cyber Defense Media Group with Pierluigi Paganini, Yan Ross as International and US Editors-in-Chief and many more hard working amazing contributors!

SHOW MORE
SHOW LESS

You also want an ePaper? Increase the reach of your titles

YUMPU automatically turns print PDFs into web optimized ePapers that Google loves.

65<br />

the wireless systems, but they still deal with some limitations. Essentially, the Blockchain has an obvious<br />

weakness which is its access control and a lot of hard work must be put into the service in order to learn<br />

how to manage such a risk. Also, if we talk about the IoT solutions there is the big question regarding<br />

how well secured our endpoints are; for instance, what happens when someone gets their IP addresses<br />

and the other access permissions. Finally, it’s well-known that any encrypted Wi-Fi connection would<br />

deal with some access control details and from that perspective – it would not be that easy for someone<br />

coming from the outside to intercept a signal in or close to the user’s range.<br />

An introduction<br />

The main fact with the wireless web is that it would deal with some encryption, but such a method of<br />

assurance would be an end-to-end cryptography. That sort of protection could offer suitable access<br />

control, but the signal getting transmitted through the surrounding could be easily grabbed from the air<br />

and put through some well-planned cryptanalysis. In practice, there is a wide range of procedures and<br />

methodologies that could be applied in order to surveill the entire network traffic. From the current point<br />

of view, wireless communications may look like secure, but they would in fact be more vulnerable and<br />

less responsive to cybercrime attacks.<br />

The obvious concern with wireless networks is that anyone who wants to connect with their signal would<br />

need to seek some kind of access to that network in order to become part of such an infrastructure. There<br />

would be a plenty of cutting-edge wireless solutions and anyone offering something getting that brand<br />

new would claim that his service was unbreakable. What irony – the entire researchers community would<br />

report frequently about the successful network breaches, but the point is that we are still so far away from<br />

being safe and secure at our spots. So, would there be anything new in case of the Blockchain<br />

technologies? The fact is any offering on the marketplace has its pluses and minuses and maybe the<br />

“encrypted records” technology could provide less stress, but it’s still far from perfect!<br />

The challenges of wireless information transfer<br />

The major challenge with the wireless information transfer is its range. It’s well known that NASA can<br />

communicate with rovers on Mars using radio link. Some space industry projects would receive the<br />

findings day-by-day from some systems being outside of the Solar system. On the other hand, the biggest<br />

preoccupation with our so “on the ground” solutions is that both – Blockchain as well as IoT – have<br />

become so dependent on web communications. In other words, those wireless technologies would<br />

undoubtedly rely on TCP/IP channels and any device or object being the member of such a system would<br />

get its IP address assigned there. The IP address is the number hackers would most love to get, and<br />

once they obtain it, all our nightmares would turn into a reality. In other words, even if Wi-Fi encryption<br />

would work well in protecting anyone getting the access to your internet traffic, the security of your end<br />

client could remain vulnerable.<br />

Could Blockchain channel offer a better link cryptography?<br />

From the perspective of cyber defense, the Blockchain could be applied to the well-developed link<br />

encryption. The entire industry 4.0 could use these solutions as a route to next-generation industrial

Hooray! Your file is uploaded and ready to be published.

Saved successfully!

Ooh no, something went wrong!