Top technology advancements

SSL/TLS

SSL/TLS

There’s no denying the impact that Secure Sockets Layer (SSL) and Transport Layer Security (TLS) have had on internet security as a whole. These two encryption protocols are the most used on a daily basis, thus earning their <a style="color: #ed1e24" href="http://bit.ly/1ycPGrw" target="_blank">spot here</a>. The importance of TLS is so great, than search-engine Google recently promoted the search ranking of sites that implemented HTTPS.
ASLR

ASLR

While a version of Address space layout randomization (ASLR) was a developed by Memco Software in 1997 as part of one of its solutions, it was the Linux PaX project that first coined the term. The first true design and implementation was released in July 2001. This development helped thwart a number of security attacks by making it more difficult for miscreants to target memory-addresses.
Phasing out SHA-1

Phasing out SHA-1

Yes, when this cryptographic hash function was first designed by the government and quickly became a standard it was soon one the most widely used of its family. However, as most aspects and objects in technology, it was only a matter of time before it was phased out. Now many organizations are shifting toward SHA-2 and SHA-3, seeing as SHA-1 has showed many signs of weakness.
Multi-factor authentication

Multi-factor authentication

It wasn’t long before the security industry finally made a move to a multiple-pronged approach to verifying the legitimacy of a person – or transaction at that – with anywhere from two to three-factors of authentication. Using <a style="color: #ed1e24" href="http://bit.ly/12oer6L" target="_blank">an additional layer of authentication</a> – such as one-time passwords sent via a smartphone push notification – is commonplace nowadays.
Public key cryptography/RSA algorithm

Public key cryptography/RSA algorithm

Perhaps one of the most significant fundamental developments in internet security today, public-key encryption had its start in the ‘70s thanks to cryptographer Clifford Cocks, and has seen quite the evolvement. Although there have been known weaknesses – as with many other aspects of security – there’s no telling what the internet would be like without such a development in technological history.

Technology continues to change, and in a short time, the industry has transformed to adapt to threats and new needs. Our list covers some of the major advancements.

More Slideshows

Topics:

You must be a registered member of SC Media US to post a comment.