Page 44 - index
P. 44
The protocol/password used per segment is based on a pattern key and can be as simple or
complex as necessary for authentication. An entire data file of any type (a photo, a song, a
video, or a document) can be a password depending on what the user wants.
Every day we hear about the latest attacks and hacks, it’s imperative that as a security
community we are developing not only solutions that can mitigate today’s threats, but are
prepared for the next decade of attacks. We encourage other security companies to put their
solutions to battle against the best test and hackers to ensure we are one step ahead of the bad
guys.
About The Author
Richard Blech is CEO of Secure Channels Inc., a new cyber-security firm
that creates robust, and state-of-the-art patented encryption technologies
under exclusive license from Secure Channels SA that are compatible with
every type of data available on the market. www.securechannels.com.
44 Cyber Warnings E-Magazine – August 2014 Edition
Copyright © Cyber Defense Magazine, All rights reserved worldwide