ABSTRACT

This chapter focuses on some developing technologies that might have a profound impact on security infrastructure in the future. The use of personal digital assistants also results in security concerns. The file–sharing applications introduce a number of vulnerabilities into the corporate network. The Peer–to–peer file swapping networks have been growing in popularity ever since Napster, with Morpheus, Gnutella, and KaZaA the most popular. A honeypot is a server designes to lure attackers into a secure, controlled environment. The software honeypots are virtual systems that act like another server, whether Linux or Windows. The Honeynet Project is also working to analyzes data to better predict attack trends or find new tools that are out in the “wild.” The major security issues introduced by running storagearea network (SAN) over Internet Protocol networks is the opportunity to sniff network traffic. The concept of zoning is popular in SANs and is similar to virtual local area networks.