Why computer security's so primitive

Tuesday, 11 May 2004, 11:39 AM EST

It is no wonder computer networks are vulnerable to attack. It took millions of years for human beings to evolve the abilities they use in ordinary encounters. Now, in a few years, we are attempting to emulate them for electronic encounters.

Take, for instance, this fact: The average person can accurately identify a friend, seen from a distance at an awkward angle and in a poor light. This is a remarkable ability, and is pretty reliable, despite the billions of people in the world. Seemingly effortless recognition of faces is a skill that has resulted from generation after generation of evolution. It is not understood in detail, and certainly involves some amazing information processing.

By Martin Brampton at Silicon.

[ Read more ]




Spotlight

Whitepaper: Zero Trust approach to network security

Posted on 20 November 2014.  |  Zero Trust is an alternative security model that addresses the shortcomings of failing perimeter-centric strategies by removing the assumption of trust.


Weekly newsletter

Reading our newsletter every Monday will keep you up-to-date with security news.
  



Daily digest

Receive a daily digest of the latest security news.
  

DON'T
MISS

Fri, Nov 21st
    COPYRIGHT 1998-2014 BY HELP NET SECURITY.   // READ OUR PRIVACY POLICY // ABOUT US // ADVERTISE //