Emerging Security Concerns in 2011
As the barriers to hacking are removed, the number of hackers will rise and the hunt will be on for the quickest route to the biggest payouts.
With the number of available addresses under the IPv4 protocol rapidly nearing exhaustion, it's a good thing that, as Carl Weinschenk points out, "executives are realizing that the sky indeed is falling-and that they must do something to prop it up."
Those executives can prepare for the looming IPv6 era, especially when it comes to deploying the protocol securely and avoiding malware risks, by checking out these resources:
- A Profile for IPv6 in the U.S. Government - This document recommends a technology acquisition profile for common IPv6 devices to be procured and deployed in operational U.S. government IT systems. This standards profile is meant to define a simple taxonomy of common network devices; define their minimal mandatory IPv6 capabilities and identify significant configuration options; and provide the basis to further define the technical meaning of specific governmental policies.
- Guidelines for the Secure Deployment of IPv6 - This document provides guidelines for organizations to aid in securely deploying IPv6 and focuses on networks that run both IPv4 and IPv6.
- Malware Tunneling in IPv6 - IPv6 can be misused to deliver malware in a way that eludes detection by firewalls and intrusion detection systems (IDS). This guide addresses minimizing those malware-oriented risks.
Use the recommendations and guidelines in these documents to make a well-informed, proactive transition to the new addressing protocol for your business.
More from IT Business Edge and Our Network
R.I.P. IPv4 Address Supply
IPv6 is Coming
Is There Life in IPv4 After All?