Leaped February...Hacking Threats
Last months entry was leaped ...staying true to the calendar month ! Leaping ahead another 4 years...we know rate of innovation wll create many hack attempts, however, how exactly are the current technologies expected to be used ? what are the future hacking threats we expect ? how will the CIA model be enhanced and used alongside other process mechanisms like Machine to Machine trust framework ? How will traditional hacks augment from enterprise client-server architecture and create new attack vectors?. The paper recommended that technology vectors are constantly monitored using a combination of automated tools, processes and constant research of evolving technology requirements to help mitigate against future hacking threats. Introduction The growing need for efficiency within the connected…