02.12.2019 Views

Cyber Defense eMagazine December 2019

Cyber Defense eMagazine January Edition for 2020 #CDM #CYBERDEFENSEMAG @CyberDefenseMag by @Miliefsky a world-renowned cyber security expert and the Publisher of Cyber Defense Magazine as part of the Cyber Defense Media Group with Pierluigi Paganini, Yan Ross as International and US Editors-in-Chief and many more hard working amazing contributors!

Cyber Defense eMagazine January Edition for 2020 #CDM #CYBERDEFENSEMAG @CyberDefenseMag by @Miliefsky a world-renowned cyber security expert and the Publisher of Cyber Defense Magazine as part of the Cyber Defense Media Group with Pierluigi Paganini, Yan Ross as International and US Editors-in-Chief and many more hard working amazing contributors!

SHOW MORE
SHOW LESS

You also want an ePaper? Increase the reach of your titles

YUMPU automatically turns print PDFs into web optimized ePapers that Google loves.

66<br />

systems. As is quite well-known, the Darknet systems would relate to the decentralized network topology<br />

and some streams would believe that could be the next phase in our technological development and<br />

progress. To be clear, we would not recommend any such developments, but rather expect that the<br />

human element would triumph over everyone and everything adverse!<br />

The applications of the link encryption<br />

Through this effort, we would discuss how it works dealing with link encryption; in practice that would<br />

mean that we would utilize communications channels where traffic would stay invisible to anyone who<br />

would want to see it from the outside. As the creators of the Tor project would say, it’s more like the coin<br />

with two sides that would remain hidden behind the menu in some exclusive restaurant. There is the<br />

certain probability that the side could be up or down, but no one has the X-ray glasses to see the accurate<br />

result of the prognosis. Maybe those X-ray glasses could be a good starting point to arrive at some much<br />

more far reaching cyber security solution.<br />

Why we need to protect our wireless communications?<br />

Let’s try to imagine that the NASA radio link to the Mars is not encrypted and some bad guys just tuned<br />

into that frequency and as they do the satellite jamming from the Earth – they could do some rovers’<br />

sabotage from some distant location as well. From that point of view, we believe it’s quite clear why we<br />

need such strong wireless communications protection as well as the well-developed procedures and<br />

policies that would offer us a chance to effectively mitigate any potential threat coming either from the<br />

outside or inside. Above all, wireless systems are rapidly developing through this 4 th industrial revolution<br />

and what we so urgently need in the coming times include better security as well as more reliable<br />

communications systems.<br />

The end points<br />

Reliability is the key factor of further progress. If you can offer communications that would be resistant<br />

to many external elements – that means you can trust that technology would not leave you without vitally<br />

significant service just around the next corner. This trustworthiness means you can be confident that<br />

the system would work with a certain degree of accuracy, and offer you a convenient user’s experience.<br />

If we think this way, we can expect progress at any stage of our activities, whether they are personal or<br />

business.

Hooray! Your file is uploaded and ready to be published.

Saved successfully!

Ooh no, something went wrong!