Difference between revisions of "Security Technology"
(11 intermediate revisions by the same user not shown) | |||
Line 5: | Line 5: | ||
[[Image:Picture2.jpg]] | [[Image:Picture2.jpg]] | ||
<Physical Break-In> | <Physical Break-In><br> | ||
Privacy information can be leaked through physical break-ins. Safety box, surveillance camera and entering and leaving management technologies contribute to protecting from such leakage. According to the research from Secom, 80% of the leak cases attribute to the internal leakage, that is, the leakage caused by people who owned or were authorized to access the information. Thus, besides recording the activities, solid log management would be significantly required. | Privacy information can be leaked through physical break-ins. Safety box, surveillance camera and entering and leaving management technologies contribute to protecting from such leakage. According to the research from [http://www.secomtrust.net/infomeasure/rouei/column1.html Secom], 80% of the leak cases attribute to the internal leakage, that is, the leakage caused by people who owned or were authorized to access the information. Thus, besides recording the activities, solid log management would be significantly required. | ||
<IT infrastructure Break-In> | |||
<IT infrastructure Break-In><br> | |||
Varied solutions both for consumers and corporations have been developed in this segment. Nowadays, anti-Virus technologies are essential to protect personal information. Viruses which analyze and send out the privacy stored in PC hard drive are often attached in email and downloaded files from web sites. Moreover, P to P software installed in private PCs such as Winny has caused numerous leak cases for confidential information including customer databases. Firewall is necessary to prevent intrudes from other computers. Corporations are required higher level of approach shown in the diagram. | Varied solutions both for consumers and corporations have been developed in this segment. Nowadays, anti-Virus technologies are essential to protect personal information. Viruses which analyze and send out the privacy stored in PC hard drive are often attached in email and downloaded files from web sites. Moreover, P to P software installed in private PCs such as Winny has caused numerous leak cases for confidential information including customer databases. Firewall is necessary to prevent intrudes from other computers. Corporations are required higher level of approach shown in the diagram. | ||
==Enablers:== | |||
Internet technology <br> | |||
Leak cases<br> | |||
Privacy policy<br> | |||
Digital advertising technology<br> | |||
==Inhibitors:== | |||
==Paradigms:== | |||
Development of security technology would enable people and corporations to fully leverage the benefit from internet technologies while it removes the reluctance to give out the private information. Security technologies also prevent companies which achieves such private information from unintentionally leaking to outside. Furthermore, the technology accelerates the development of digital advertisements which require solid personal information, such as life pattern, liking, and values, to be effective. Consequently, digital advertisement could replace the traditional advertisement approach. | |||
==Experts:== | |||
IT consulting company (IBM, Cisco, Accenture..etc)<br> | |||
Security consulting firms | |||
==Timing:== | |||
Analysis prediction that the market will keep growing to 2013 encouraged by upcoming regulations indicates that the prevalence of security technology would be accelerated in this five years. | |||
==WebSources:== |
Latest revision as of 20:42, 17 September 2009
Description:
Numerous leak cases through both physical and IT infrastructures have been making consumers and corporations reluctant to give out their privacy information for digital advertisements. The prevalence of security technology can be a key to mitigate the trend and prosper the digital advertisement. Security technology can be categorized into the one against physical break-in and the one against IT infrastructure break-in.
<Physical Break-In>
Privacy information can be leaked through physical break-ins. Safety box, surveillance camera and entering and leaving management technologies contribute to protecting from such leakage. According to the research from Secom, 80% of the leak cases attribute to the internal leakage, that is, the leakage caused by people who owned or were authorized to access the information. Thus, besides recording the activities, solid log management would be significantly required.
<IT infrastructure Break-In>
Varied solutions both for consumers and corporations have been developed in this segment. Nowadays, anti-Virus technologies are essential to protect personal information. Viruses which analyze and send out the privacy stored in PC hard drive are often attached in email and downloaded files from web sites. Moreover, P to P software installed in private PCs such as Winny has caused numerous leak cases for confidential information including customer databases. Firewall is necessary to prevent intrudes from other computers. Corporations are required higher level of approach shown in the diagram.
Enablers:
Internet technology
Leak cases
Privacy policy
Digital advertising technology
Inhibitors:
Paradigms:
Development of security technology would enable people and corporations to fully leverage the benefit from internet technologies while it removes the reluctance to give out the private information. Security technologies also prevent companies which achieves such private information from unintentionally leaking to outside. Furthermore, the technology accelerates the development of digital advertisements which require solid personal information, such as life pattern, liking, and values, to be effective. Consequently, digital advertisement could replace the traditional advertisement approach.
Experts:
IT consulting company (IBM, Cisco, Accenture..etc)
Security consulting firms
Timing:
Analysis prediction that the market will keep growing to 2013 encouraged by upcoming regulations indicates that the prevalence of security technology would be accelerated in this five years.