Quantcast
Viewing all articles
Browse latest Browse all 13550

Top 10 Internet issues and top 10 information protection issues for 2014

Tuesday, February 4th, 2014

Korea Internet & Security Agenmcy (KISA) has set the top 10 Internet issues as well as the top 10 information protection issues for 2014 to analyze the trend of Internet policy and suggest future development direction.

Noting that the characteristic of Internet field for 2014 is the creation of new types of services through the convergence between different sectors, Lim Jae-myung, director of KISA policy research office, forecasts, “Hybrid cloud, smart convergence service, creation of Internet-based Creating Shared Value (CSV) and Over The Top (OTT) will emerge as new Internet issues this year.

Hybrid cloud is the composition of two or more clouds that remain unique entities but are still bound together, offering the benefits of multiple deployment models. Hybrid cloud can also mean the ability to connect collocation, managed, or dedicated services with cloud resources.

Over the Top (OTT) refers to video, television, and other services provided over the Internet rather than via a service provider’s own dedicated, managed IPTV network. OTT is delivered directly from provider to the viewer using an open internet/broadband connection, independently of the viewer’s ISP, without the need for carriage negotiations and without any infrastructure investment on the part of the provider. It is a best effort, unmanaged method of content delivery via the Internet that suits providers who are primarily broadcasters rather than ISPs.

“In case of Internet of Things, which entered the period of expending beyond the initial market, HTML5 and wearable computing particularly, they evolved from the center of building infrastructure to service offering and using technology. Accordingly, finding out core services using these factors are expected to sway success or failure of the market,” said Lim.

 

Internet of Things

The Internet of Things refers to uniquely identifiable objects and their virtual representations in an Internet-like structure. The concept of the Internet of Things first became popular through the Auto-ID Center at MIT and other related market analysis publications. Radio-frequency identification (RFID) was seen as a prerequisite for the Internet of Things in the early days. If all objects and people in daily life were equipped with identifiers, they could be managed and inventoried by computers.

HTML5 is a markup language used for structuring and presenting content for the World Wide Weband a core technology of the Internet. It is the fifth revision of the HTMLstandard (created in 1990 and standardized as HTML 4 as of 1997) and, as of December 2012[update], is a candidate recommendation of the World Wide Web Consortium(W3C). Its core aims have been to improve the language with support for the latest multimedia while keeping it easily readable by humans and consistently understood by computers and devices.

Meanwhile, wearable computing refers to computerpowered devices or equipment that can be worn by a user, including clothing, watches, glasses, shoes, and similar items.Wearable computing devices can range from providing very specific, limited features like heart rate monitoring and pedometer capabilities to advanced “smart” functions and features similar to those a smartphoneor smartwatchoffers.

Commenting that the generalization of new Internet services will increase cases of individual information infringement and security issues, Lim said, “The importance of big data security, personal cloud service security, and mobile app security will emerged further among the top 10 information protection issues.”

As people’s use of various mobile devices, such as smartphones, has been on a steady rise the spread of damages stemming from malicious code infection through malicious apps, an increase in the number of financial frauds abusing smartphone text messages, and a hike in security threats stemming from Bring Your Own Device (BYOD) activation as major concerns.

He also forecast that a growing number of enterprises will be damaged by advanced persistent threats (APT) and highly developed DDoS attacks this year.

APT usually refers to a group, such as a government, with both the capability and the intent to persistently and effectively target a specific entity. The term is commonly used to refer to cyberthreats, in particular that of Internet-enabled espionage using a variety of intelligence gathering techniques to access sensitive information, but applies equally to other threats such as that of traditional espionage or attack. Other recognized attack vectors include infected media, supply chain compromise, and social engineering.

In the meantime, DDoS stands for “Distributed Denial of Service.” A DDoS attack is a malicious attempt to make a server or a network resource unavailable to users, usually by temporarily interrupting or suspending the services of a host connected to the Internet.

Lim said, “KISA’s selection of top 10 Internet issues and the other top 10 information protection issues for 2014 will be of great help for the government and enterprises to establish effective policies.”

Based on its survey of those working in the IT field, analysis of some 24 million cases of big data both at home and abroad, and in-depth interviews with IT experts, KISA selected the top 10 Internet issues and the other top 10 information protection issues for 2014, he said.

“Among the top 10 Internet issues are the spread of smart convergence service to the traditional industry; the creation of Internet-based Creating Shared Value (CSV) for win-win growth of the ecosystem; the emergence of importance of big data curation stemming from surging data; the rational balance of economic feasibility and security, the emergence of hybrid cloud; and the use of HTML5 through smart device platform,” said Lim.

The remaining ones are the evolution of Internet of Things with the focus changing from infrastructure to service; smart machine R&D equipped with knowledge and learning ability; the emergence of Over The Top (OTT), the acceleration of changes in the media using patterns; the popularization of wearable computing; and the spread of privacy protection-type social media.

Among the top 10 information protection issues are the expansion of advanced persistent threats (APT); an increase in cyber terror threat following spread of hacktivism; the spread of network separation to prevent cyber security accident; the spread of next-generation firewall supply to effectively cope with application security threats; and highly developed DDoS attack & expansion of objects.

The remaining issues are the spread of malicious code infection damages through malicious apps; an increase in security threats stemming from BYOD activation; a rise in demands for personal cloud service security and privacy; security services using big data security and big data analysis; and a hike in financial frauds using smartphone text messages.


Viewing all articles
Browse latest Browse all 13550

Trending Articles