You can edit almost every page by Creating an account. Otherwise, see the FAQ.

5th Generation Cyber Security

From EverybodyWiki Bios & Wiki

5th Generation Cyber Security

5th Generation Cyber Security is a term for Internet security that describes the advent of single, unified security systems. These systems are intended to uniformly prevent advanced attacks throughout a business’s entire IT infrastructure of computer network, virtual instances, cloud deployments, endpoints, remote offices and mobile devices

Definition and history of security generations

Since the late 1980s cyberattacks progressively evolved to use innovations in information technology as vectors for committing cybercrimes. In response to each new type of attack, security vendors developed a new security product or function to defend against them.  In this cycle, businesses repeatedly added the additional security functions and products to their infrastructure to protect against each new type of cyberattack.  As a result, distinct generations of cyberattacks and cyber security measures to counter these attacks evolved.

-        Generation 1 - PC attacks - In the late 1980s, computer virus attacks on stand-alone PCs affected all businesses, which drove the invention of antivirus software products.

-        Generation 2 – Network attacks - In the mid-1990s, attacks originating from the Internet affected all businesses, which drove creation of the firewall.

-        Generation 3 – Operating System and Application attacks - In the early 2000s, attackers exploiting vulnerabilities in operating systems and applications affected most businesses, which drove the creation of intrusion prevention systems (IPS) products.

-        Generation 4 – Targeted attacks - Circa 2010, the rise of targeted, unknown, evasive, polymorphic attacks affected most businesses, which drove the development of anti-bot and sandbox products.

-        Generation 5 – Infrastructure attacks - Circa 2017, large scale and state sponsored, multi-vector, mega attacks are driving the adoption of advanced threat prevention systems that are integrated and unified single security systems.  These systems share threat information to uniformly prevent advanced attacks in real time across a business’s entire IT infrastructure of computer networks, virtual instances, cloud deployments, endpoints, remote offices and mobile devices.

Relevance of 5th Generation Cyber Security

The emergence of the 5th Generation attacks is marked by “… incidents that would once have been considered extraordinary are becoming more and more commonplace.” [1] Two examples in 2017 are “ … the WannaCry attack—which affected 300,000 computers across 150 countries—and NotPetya, which caused quarterly losses of US$300 million for a number of affected businesses.[1] Prior generations of security can be described as non-integrated, best of breed, detect-first technologies that cannot protect against the new “formerly extraordinary and now commonplace” attacks.  Sandboxes from 4th Generation Security allow the first attack to infect a “patient zero” and the network while the sandbox analyzes and builds indicators to detect re-occurrences of the same attack.  5th Generation attacks like WannaCry and NotPetya combined with the new dynamic IT services enabled by mobile access and on-demand, elastic, cloud computing service drove a corresponding new 5th Generation model for IT security.

5th Generation Security is marked by the following advancements over the prior 4th Generation Security:

-         Consolidates prior generation security of next-generation-firewall (NGFW), sandbox, bot security, endpoint security and other security controls into a single, unified security system.

-         Shares real time threat information in real time throughout the system.

-         Prevents advanced 5th Generation and first occurrence of new attacks; does not allow first-attack “patient-zero” infection.

-         Extends prevention of advanced attacks to cloud deployments and mobile devices as part of the single, unified security system.

-         Uniformly prevents attacks across a business’s entire IT infrastructure of computer networks, virtual instances, cloud deployments, endpoints, remote offices and mobile devices.

-         Centrally manage, monitor and respond to all security activities and events as a single, unified security system.

References[edit]

  1. 1.0 1.1 World Economic Forum (2018). "The Global Risks Report 2018 13th Edition". World Economic Forum. Archived from the original on |archive-url= requires |archive-date= (help). Retrieved 5 February 2018.

5th Generation Cyber Security[edit]


This article "5th Generation Cyber Security" is from Wikipedia. The list of its authors can be seen in its historical and/or the page Edithistory:5th Generation Cyber Security. Articles copied from Draft Namespace on Wikipedia could be seen on the Draft Namespace of Wikipedia and not main one.