Engineers from La Salle-URL share the latest news and projects in the field of network solutions in telematic engineering.

15 April 2022 | Posted by userDataCenter

Miguel García Bueno Talking on Cybersecurity Concepts on a CPD

On today's talking we Miguel has shared his knowledge on the NGDC Next Generation Datacenters cybersecuruty concepts, arquitecture and trends.

Nowadays the world of cybersecurity has become more complex and, there are many different kinds of attacks and it's almost imposible to have an expert with knowledge in all of them. In numbers we can see the trends lastly has been a big incresing on ransomware attacks.

Ransomware is a type of malware from cryptovirology that threatens to publish the victim's personal data or perpetually block access to it unless a ransom is paid. While some simple ransomware may lock the system without damaging any files, more advanced malware uses a technique called cryptoviral extortion. It encrypts the victim's files, making them inaccessible, and demands a ransom payment to decrypt them. In a properly implemented cryptoviral extortion attack, recovering the files without the decryption key is an intractable problem – and difficult to trace digital currencies such as paysafecard or Bitcoin and other cryptocurrencies are used for the ransoms, making tracing and prosecuting the perpetrators difficult.

So for companies and Datacenters one of the key questions is; Is it better a good strategy or better products?
On Palo Alto they are experts for the resolution of this problematical and, the answer is always a better strategy. On today's datacenter the requirements on cibersecurity are high for example referred to the firewalls at least layer 7 is required, this means the firewall has to be able to analyze the traffic and appications running. On the new products, is not only about hardware, there are softwares that automatizes the attacks detection due to the fact is really difficult or almost imposible to have the knowledge on the different technologies.The 70% of malware uses the DNS protocol for the attacks due to is required. Now, we can have a clearer idea of the NGDC on cibersecurity.

Eduard Lecha Puig

Share

Add new comment

CAPTCHA
This question is for testing whether or not you are a human visitor and to prevent automated spam submissions.
3 + 6 =
Solve this simple math problem and enter the result. E.g. for 1+3, enter 4.