ipl-logo

Acct 391 Unit 1 Business Security And The Future

1670 Words7 Pages

Marques Underwood
INSS 391
Security and the Future With the transition of companies leaning towards advancing through the usage of big data, cybersecurity and the trends in technology are creating an increase in threats. The goal is to protect the databases and devices used at these companies before they are hacked and compromised for unwanted reasons. We’ll see the general concerns with security in the IT field, and steps that specific companies are taking to prevent and adopt to the landscape of the future in security. Devices are increasing at a rapid pace these days, meaning the more data is being expanding. Of course, this means that some of the data are structured and some are unstructured, increasing the opportunities to be hacked. …show more content…

With iOS 9 though, Apple expanded on this feature to work in tandem with biometric-approved logins developers outside of their niche, with less money. Developers are able to create and use ECC keys inside secure enclave, which are protected by Touch ID. Apps can reach the keys through Keychain, which uses SecKey. Apple give permission to Touch ID confirmations by not utilizing keys that have a possibility to be stolen. With everybody having Smart TV’s these days, consumers don’t understand the likelihood and possibility that their TV is spying on you, without consistent given. With Apple TV, Apple wants to connect a customer’s iPhone and their other equipment in their house, but maintain the sensitive information used to only that particular user to not be hacked. Apple tries to stray potential hackers away from the Apple TV through a two-step process to make iCloud accounts credible by having the Apple TV and the device that’s being used send and receive temporary public keys via iCloud. When the items are on a LAN, the temporary keys will get a connection through the use of Station-to-Station protocol and the other per-session keys, to decode to establish that everything is similar among all platforms that are being used. Over the same connection, the customer’s device will exchange the public-private key pairs to Apple TV to secure the relationship that the Apple TV and other iOS

Open Document