- Welcome Guest |
- Publish Article |
- Blog |
- Login
Almost every new computer device has voice recognition capabilities, which presents a whole new arena for securing data transmissions. The reality is that it's impossible to completely secure wireless transmissions. There are ways to hinder the attack process down and almost guarantee virtual security. There are the logical and physical aspects with logical being encryption and physical being vaults and passwords. So what is the best way to secure that transmission activated by voice, or sent entirely by wireless communications?
A combination of logical and physical security protocols is the best possible method available. One benefit to voice recognition is the key-logger method of attack seemingly vanquished by voice recognition. If the keys aren't being pressed then important information is safe, for the time being. This is another case of combining security types. If you type in your username and password, and then, speak an entire document with voice recognition, the door was opened when the password was typed. There is the dilemma of how to secure what is spoken because there are malware programs that can monitor the voice bandwidth section of the complete transmission.
This doesn't seem like such a big problem except almost every new computer has a built-in webcam, and what do most people do to connect with friends? Ah, the social networks. This is where your level of use or the type of activity you're transmitting comes into play. If it's personal use then not much risk is involved, but if your the CFO, video conferencing about your newest product upgrade to potential clients; it's a different story. I have some ideas about usernames/passwords and what they can actually unlock, but it's a programming feature that will have more research and an entire systems development life cycle in place, but it does involve tricking the enemy "malware" or Black Hatters.
There are a few things the common users can do with using physical and logical security, even in our smartphones, and that is make sure the WEP is activated and you know the password. If it's still ten zeros then it's a good idea to personalize it. Our places of work have their protocols in place, but with smartphones being small computers, more documents are being sent via cell technology and the absolute best way to protect the sensitive information is the combination of both physical (password protection) and logical (encryption) security until that perfect algorithm secures the airwaves.
Article Views: 1807 Report this Article