Information Technology Reference
In-Depth Information
It would be possible but perhaps unsafe to also perform real-time global monit-
oring of client names and identities in case a new identity is being created illegally.
Ideally, the computer security engine would have connections to major banks and
businesses so that any suspicious account activity could be reported to the sub-
scriber in real time.
The computer security engine would also have a constantly updated list of the
security contacts at every bank or store, as well as the contact numbers for the cy-
bercrime units of local and state police, the FBI, and other government agencies.
Some of these features are available today, but they are fragmented. Antivirus
vendors try to keep tabs on zero-day threats. Banks and major stores keep tabs on
suspicious credit card transactions. However, nobody keeps real-time tabs on hu-
man identities, and the faster duplicate identities can be recognized, the easier it is
to stop damages.
Because many security breaches are due to the theft of notebook computers and
tablets or smartphones, the physical security of portable devices also needs to be
considered. It would not be difficult to include GPS tracking in every notebook
and tablet, because they are already in cell phones. With GPS tracking, stolen com-
puters could easily be found.
It would not be difficult to include an electromagnet inside the cases of com-
puter hard drives. If the computer is reported as stolen, a signal would trigger the
electromagnet and degauss the hard drive to erase all data. This would need a sep-
arate battery because thieves would no doubt remove the main battery.
Other kinds of physical security for portable computers and tablets include
switching from passwords to biometric data such as retina prints.
Data encryption should be offered as a standard feature on all computers. Every
saved file such as a spreadsheet or a Quicken bank statement could be saved in an
encrypted form instead of plain text. Encryption should also be at least an optional
feature on thumb drives because they are easily stolen and easily read by any com-
puter.
It would also be possible to have the built-in cameras on portable computers
take a picture of whoever opens the case each time it is opened. These pictures
could be sent to the computer security engine cloud site. This feature might be set
up to activate when a computer is reported as stolen.
This would probably be a secret feature used only on computers assigned to
FBI agents and others who might have very high security information on their
Search WWH ::




Custom Search