Security Concepts, Developments, and Future Trends

Security Concepts, Developments, and Future Trends

Alaa Hussein Al-Hamami, Ghossoon M. Waleed Al-Saadoon
DOI: 10.4018/978-1-4666-6583-5.ch001
OnDemand:
(Individual Chapters)
Available
$37.50
No Current Special Offers
TOTAL SAVINGS: $37.50

Abstract

The techniques and tools available for the attackers and protectors are decisive and the main cause for deciding the leading and winning side. This chapter discusses the main concepts, developments, and future trends of security. There are three main reasons for security development and its innovation. The first reason is: Perfect security does not exist; this will lead the researcher to develop more and more methods to defend against new attacks and to support the existence security systems. The second reason is: New technology always brings new threats, which means new countermeasures against those threats is always a necessity. The third reason is: There is no single countermeasure that can be used to ensure security for our systems, and there are many new threats and attacks need to be defeated. For these reasons, security is very active subject and needs more financial support for research and system development, thoughts, technologies, tools, and skilled people to ensure and maintain security for our systems.
Chapter Preview
Top

Introduction

These days are called the knowledge era, and every day we hear about new development and an invented new technology. New technology is always brings new threats; this will lead to invent a new counter measure to protect our society from these new threats. Perfect security does not exist, and security strength depends on the weakest ring in the security chain.

Computers and communications are still suffering from their poor security systems that can't stand against the risks of losing or destroying their data files and folders, intrusion of the unauthorized users and the malfunction of the instruments. These risks can't be ignored; in most organizations protection is still far away from serious actions due to the following reasons (Tanenbaum and Wetherall, 2010):

  • Un-Proper Security Systems: Most techniques that distinguish authorized users are of equal effect on hindering the unauthorized users.

  • Some Organizations Pride that They Are Protected: Several computer crimes are uncovered because organization managers hide such crimes to keep the image of their organizations undistorted.

  • Downloading the Technique for Security Problem: It should be always recognized that security is human problem rather that a technological one.

  • Threat from Inside the Organization: Most of computer and data threats come from inside the organizations rather than from outside. The computer hackers are most likely one of your employees that receive his/her salary from your organization and not a person who lives away from you.

  • The other threat may come from an employee who previously was working for your organization recently, therefore the best security techniques do not usually depend on the technology but depend and focus on the human element.

  • Precaution from the problem is not enough, instead, as usual, it is essential to take one step towards the problem-solving given that such step should not be the last one.

  • There are always persons believe that there is no issue that is so called “security”.

Of course, professionals are still enjoying an important responsibility because they should determine the nature of their organizations data and threat types that face their organizations. Also, they should set and execute plans to protect their data from such threats. These are the important objectives and they always need a high level of technological knowledge. In the realms of computers and communications, even when completing such high professional objectives, they are insufficient to keep computers and communications security (Stallings, 2004).

Top

Basic Principles In Security System Design

Before discussing the basic principles of the security system design, the common goals that contribute in setting the essential corner stone for the security system design should be identified. The following points may represent essential principles when designing security system:

Key Terms in this Chapter

Security Techniques: Any technique used to stop the attack.

Trust: The resistance of the security system to the threats.

Protection: The measure to be taken against any threats.

Threats: Detection applicability against intrusion should be available which operates usually simultaneously with security system protection.

Security System Cost: A balance between the complexity of the security system and the value of the assets.

Computer Security: A generic name for the collection of tools designed to protect data and to thwart hackers.

Complete Chapter List

Search this Book:
Reset