The Importance Of Moving Target Security
The current cybersecurity environment is based around a static defense that has been employed for the past few years to protect information systems (See Figure 6). Unfortunately, this cybersecurity paradigm is not effective against current and future cyber threats. According to Zheng (2014), the weakness of this cybersecurity approach is its passive and reactive nature towards safeguarding information systems. Additionally, this method also allows threat actors the time they require to conduct their reconnaissance and exploit any vulnerabilities that are discovered.
Moving Target Defense is a cyber security approach that is being developed to replace the current static defense with a dynamic defense (See Figure 7). This …show more content…
However, with the emergence of quantum computing, these current cryptographic techniques might not be secure for much longer (See Figure 9). The only positive note so far is that current quantum computers have not reached the level needed to break current encryptions, yet. However, Chen et al (2016) believes that a quantum computer capable of breaking a 2000 bit RSA encryption could be available by 2030.
That is where quantum cryptography comes into play. Quantum cryptography employs photons to send encryptions keys securely utilizing the light wave particles (Jami & Piriya, n.d.). What this means for organizations that utilize this emerging technology is that messages can be sent and that it is unlikely that it can be read by anyone other than its intended …show more content…
NetDetectorLive was developed by Niksun (2016) and it provides the ability to conduct rapid “forensics search, session reconstruction, and real-time detection of security violations”.
Remote Monitoring Agents
Today’s cybersecurity environment is increasing daily because of the emergence of new technology and techniques. Unfortunately, the increase in technology did not increase the amount of cybersecurity professionals available to combat cyber threats. This lack of cybersecurity professionals is a detriment to the security of information systems and requires methods to mitigate the lack of qualified professionals.
Employing remote monitoring agents may be an effective method to mitigate the lack of talent an organization has to safeguard its networks. Additionally, organizations with limited personnel can monitor its networks in multiple locations from a central hub. Utilizing remote agents is not entirely new; currently, system administrators utilize remote services to conduct updates and corrective maintenance. However, today’s emerging remote monitoring agents allow cybersecurity professionals to continuously monitor their organizations information and information systems and conduct certain digital forensics functions remotely (UMUC,