4 Technologies That Could Pave the Future of Cybersecurity
FEB 21, 2017 21:06 PM
A+ A A-

4 Technologies That Could Pave the Future of Cybersecurity

By Larry Alton

Cybersecurity has come a long way over the decades, but hackers and cybersecurity experts are constantly trying to one-up each other in terms of technological sophistication and preparedness. Every time we take a major step forward in terms of reliable security, cybercriminals are there to match us. Accordingly, there will never be an “unhackable” device or piece of software; according to Security Baron, there will always be vulnerabilities in any system you have in place.

Even so, we can always make forward progress toward building something more reliable—there’s always room for improvement in our existing systems, and new technologies on the horizon.

How might these technologies change the future of cybersecurity?

New Technologies on the Horizon

These are some of the most promising technologies coming to keep our digital information and communications safer:

1.      Quantum key distribution. It sounds like some kind of superpower, but as WIRED writes, quantum key distribution could be the future of encryption technology. Quantum physics involves the study of subatomic particles, which behave strangely, against our intuitions on small scales. We’re already using quantum computers, which take advantage of particles that can exist in two states at the same time (as a particle in a wave). Quantum entanglement involves two particles that affect each other’s position, even at a distance. Conventional encryption involves a lock-and-key method of creating and then cracking a code—but these can be easily copied and cracked. Quantum key distribution relies on quantum entangled particles that are virtually uncopiable—and tremendously hard to crack—but it’s still a new technology that demands refinement.

2.      Blockchain tech. Blockchain isn’t a term familiar to many, but it’s associated with a technology that most have heard of—Bitcoin. Blockchain is a system of collaborative information storage, exchange, and retrieval that maintains a public record of ownership. It’s how Bitcoin transactions are able to take place, and remain consistent, without any single institution defining or monitoring those transactions, and without any outside interference to commit digital theft. Shaping Tomorrow predicts that within a few years, most major banks (as well as other financial-related companies like insurance institutions) will be using blockchain to greater secure their financial transactions.

3.      DUST. One reason Snapchat became so popular is its ability to have messages self-destruct; this guarantees, to some degree, that your message won’t spread or be committed to public memory, therefore enhancing both privacy and security. Security organization PARC is now working on Disintegration Upon Stress-release Trigger, or DUST technology, that mirrors this effect. Instead of photos and videos no longer being viewable, computer chips will self-destruct after conveying their requisite information.

4.      Biometrics. In the public eye for decades, biometric technology uses unique personal identifiers to ensure proper identification. For example, your phone may take a thumbprint scan before allowing you to access the data inside, or a device may scan your retina before permitting you access to a building. Since these personal identifiers are incredibly hard to mimic, especially remotely, they could greatly enhance security in a number of different areas. However, there are still a number of important hurdles to overcome before the technology can be adopted on any wide scale.

Projecting a Timeline

It’s hard to say when these developments might actually become mainstream. Some of them sound like technology straight out of science fiction, but the reality is that scientists and engineers are already working on these futuristic solutions—and probably some even more advanced technologies that’s being kept from the headlines.

Some of the biggest challenges include the cost of developing these technologies, which should improve over time, and convincingly demonstrating the reliability of these protocols. We could be as close as a few months away for some of these technologies—but others may never come to fruition. Only time will tell. 

FIRST
PREV
NEXT
LAST
Page(s):
[%= name %]
[%= createDate %]
[%= comment %]
Share this:
Please login to enter a comment:
 

Computing Now Blogs
Business Intelligence
by Keith Peterson
Cloud Computing
A Cloud Blog: by Irena Bojanova
The Clear Cloud: by STC Cloud Computing
Careers
Computing Careers: by Lori Cameron
Display Technologies
Enterprise Solutions
Enterprise Thinking: by Josh Greenbaum
Healthcare Technologies
The Doctor Is In: Dr. Keith W. Vrbicky
Heterogeneous Systems
Hot Topics
NealNotes: by Neal Leavitt
Industry Trends
The Robotics Report: by Jeff Debrosse
Internet Of Things
Sensing IoT: by Irena Bojanova

 

RESET