Page 45 - Cyber Warnings
P. 45







We would use the examples of the Gmail and Twitter which would offer an SMS-based
verification as a quite good defense to your cloud’s environment.

On the other hand, many solutions dealing with the commercial usage would straggle with their
access control. Would this make their systems being somehow vulnerable in comparation with
those being pretty sophisticated ones?

The answer to this question is quite straightforward and it sounds – yes! It this time when
hacker’s so easily can break into someone’s account being assured with the username and
password only – it’s crucially important to get somehow better protection.

Practically, we would see in a period of the next few years in which direction would these
solutions go, while at this stage – we can realize that some ways could already get noticed.

As the most important steps in a current cloud’s defense – we would notice that there are three
phases within this approach. First, you need to identify a threat before you decide how you
would deal with it.

Second, it’s significant to understand everything putting you at the risk in order to know how to
protect your critical asset. It’s quite obvious that a security is the last phase into this cycle and
as we would mention many times through our efforts – understanding the threat is a key pillar to
a good defense.

In case of cloud’s technology – the threats could be human and non-human by their nature. In
other words, sometimes the hackers or cyber criminals could affect your cloud’s asset, while in
some cases – those could be some sorts of technical flaws.

Finally, we would encourage everybody belonging to an expert’s community to try to explain
such complex topics using the “on the ground” approach and in such a manner make a good
knowledge transfer to those who need such findings.


About The Author

Since Milica Djekic graduated at the Department of Control Engineering at
University of Belgrade, Serbia, she’s been an engineer with a passion for
cryptography, cyber security, and wireless systems. Milica is a researcher
from Subotica, Serbia. She also serves as a Reviewer at the Journal of
Computer Sciences and Applications and.

She writes for American and Asia-Pacific security magazines. She is a volunteer with the cturer
with the local engineering society.


45 Cyber Warnings E-Magazine January 2017 Edition
Copyright © Cyber Defense Magazine, All rights reserved worldwide

   40   41   42   43   44   45   46   47   48   49   50