Imagine yourself working for a big corporation, envision thousands of computers interconnected, and visualize all the data flowing through the network. Having acces to multiple applications makes our lives easier. We can connect with other companies through mail services, buy from our houses, withdraw money from online banks…
As daily users of the Internet, the truth is that we do not need much imagination to see this functionality that started to be conceived around the 60’s and 70’s. As a matter of fact, the OSI (Open Systems Interconnection) model, forged in 1984, was set as a reference for the future of systems connectivity. However, years later, the TCP/IP model prevailed despite its errors at a theoretical level. Its theoretical bases are the cornerstone of both, local networks, and the global network (the Internet).
However, due to the relatively slow implementation of new protocols such as IPv6, we must be aware of the existence of new vectors of attack concerning the services and functionality of this protocol. The differences with IPv4 demand a new paradigm of learning instead of a process of adjustment.
It is likely that most users will not pay attention to the implementation of IPv6. Nonetheless, it is undeniable that if their online communication is intercepted, their data will be leaked and exposed. Any company or user is vulnerable to these attacks. There are several examples of credential theft against web services, anonymous people and big companies such as SONY.
If we analyze these hacks, we come to the conclusion that most attacks take place within the company, where security measures are looser. Also, many IT technicians focus too much on functionality and end up overlooking security. If we take a look to the past, we realize that network protocols were implemented to make our communications faster, with more services, and with a greater number of PCs, but not necessarily more secure.
Top comments (0)