Recently, a lot of mend and upgrade the chief information officer CIO that feel tired of to system and software day by day To inquire I, new the intersection of operation and system such as GoogleChrome the intersection of IT and system manager Whether can shake Microsoft on the desk type computer operating system dominates the status exclusively, and will the question of information security be improved to some extent after five years? In fact, this is a question very difficult to answer. Five years later, IT industry will certainly present more breakthrough technology. So, answer this kind of question the safest way is, review the present present situation.
Very clear, we are carrying on competition of a network. Party that attack through hostile procedure, break, relieve oneself law and other hostile activity obtain sudden huge profits and network criminal that strengthen constantly. The reason why these people can succeed, because the desk type computer is basically monopolized by the single operating system. If you are a hacker, so long as you specially focus on the platform of Microsoft, can find enough victims, let your pocket be full. This is a very simple economic scale effect. With other operating systems such as Mac OS Begin welcome, city rate grow up gradually, corresponding hostile procedure its it begins to be thereupon growth too. This does not even make people surprised and different.
However, if is a very small operating system, and adopt open primitive yard? If store all data and application programs in the cloud, like Chrome operating system practice? Be very unsafe like this?
In theory, know. A bit smaller for operating system, software mistake commonly called as bugs Will be a bit fewer naturally because the procedure code that may make mistakes becomes less ,In addition because operating system as so strong now, so until widely used hostile procedure probably just unable to exist like this at present. I do not think, the open primary code will let the hacker find out easily therefore the systematic weakness is more dangerous this is the excuse which we often hear . Improve security by concealing, not always very useful!
Even so, perhaps some attack tactics are still feasible:
1.The ones that grasped and led to the cloud are on-line.
So long as move some tricks to the operating system, for example revise DNS record, can be transferred to underground hostile websites first in the application program of webpage on connecting with by the user, then just reach one’s own webpage application program page. So long as can not totally blockade the communication pipeline, the user’s data may be totally exposed. Even there are protective measures such as IP V6, encrypting, evidence,etc., this is still a possible attack way.
If cloud application program and cloud operating system become the mainstream, then how important is 99.999% of the usability? It is very important: If can’t deposit and withdraw information and application program on the host computer, your computer is equal to the wastes. If the assailant utilizes the standard Bot network should will also see that adopt Bot of the multi-purposed standard operating system to infect the computer within the following ten years To let the host computer on the basic framework of cloud overload and is paralysed? If the industry that requires hacker person must offer smallly ” It is donated that happy ” Let the cloud host computer already paralysed resume running, OK? To hacker, I believe this is a lucrative business. It sounds somewhat like the science fiction? Not at all! Such a situation has already taken place in fact, just small. But once hacker present tactics let first, computer infected the hostile procedure then use for the illegal use at type the desk No longer economic inducement can’t find enough victims again ,There is another method that is replaced naturally to appear.
3.From the cloud directly because the data have already been moved to the cloud Pick up the valuable data, for example: Credit card, identity card number, landing the account number,etc..
The cloud service provider must guarantee the data will not be deposited and withdrawn illegally, will not let the hacker duplicate several million user’s data, land the account number password, data of network bank, account data, conclude the business to record etc. easily. To put it briefly, must prevent the data from letting out, direct against this, I clasp the attitude suspected.
A word after all, I do not want to surmise whether Chrome operating system will succeed, I do not hope which operating system will become the mainstream after predicting the following five years. However, a thing is definite, that is: The information security industry will not disappear, but will develop the new defence method out to the new attack way.
Needn’t install one yard of files of huge virus on this plane again then, but is dependent on cloud webpage, E-mail and file prestige the service of commenting etc.. In addition, the intact safeguard procedures of certainly need the loophole to assess, protect, encrypt tooing etc. guarantee the security of digital information exchange.
Global technological research and advisory company Gartner points out, though come from other operating systems OS Competition fierce day by day,by 2015 year,will last computer markets dull and stereotypeds global apple iOS. Because the apple iPad succeeds, in 2011, iOS will account for the market share of the dull and stereotyped computer operating system 69%, would account for 47% of the market of dull and stereotyped computer in 2015.
Gartner analyst thinks, the apple iPad contribution made toward market of dull and stereotyped computer is just as iPhone contribution done toward market of intellectual mobile phone: Recreation. The dull and stereotyped computer does not mean carry out the same tasking, just shape different computers. In view of the ecosystem supported by it, the dull and stereotyped computer can consume and offer more abundant experience around the content. How abundant the ecosystem is, how strong the pulling of consumers is.
Gartner studies executive vice president Carolina Milanesi lady to represent: “In view of consumers and the response to iPad of enterprise, a lot of manufacturers all compete in the hardware is handed over at first, attempt to utilize the ecosystem of platform subsequently. However, a lot of manufacturers have made and looked like the same mistakes made in iPone upsurge, above they locate in the application, service and user, experience the intersection of hardware and function wholly. And the dull and stereotyped computer will depend on the latter even more than the intellectual mobile phone, the association of dealers of factory getting ahead of others realizes it is this’s their preferably chance to compete head-on against apple. ”
Gartner is expected, global dull and stereotyped computer use the intersection of Google Android and market share of operating system rise to 39% of 2015 years see tables one from 20% of 2011 year . Gartner think Google determine, prevent the system from being decentralized first used for dull and stereotyped computer the intersection of operating system and method that Honeycomb open to third party their, but this will slow the decrease speed of prices down, and will limit its market share finally.
Gartner chief analyst Roberta Cozza lady shows: “The joining of numerous manufacturers will promote the growth of the dull and stereotyped computer production, the application ecosystem of letting the dull and stereotyped computer be more competitive and platform flexibility can reduce prices. The new mandate mode of Honeycomb that Google puts out enables Google to promote more control, allow the dull and stereotyped computer to realize optimal implementation, will not miss and experience quality. Perhaps this means prices will be by dropping than the slower speed which we see on the intellectual market. ”
Table one: The global dull and stereotyped computer based on operating system sells ‘ Regard a thousand Taiwan as the unit
Operating system 2010 2011 2012 2015 IOS 14, 76647, 96468, the share of 670138,497 markets % 83.968.763.547.1Android2, 50213, 89826, the share of 382113,457 markets % 14.219.924.438.6MeeGo1077881, the share of 2713,057 markets % 0.61.11.21.0WebOS02, 7964, the share of 2458,886 markets % 0.04.03.93.0QNX03, 9017, the share of 13429,496 markets % Share of market of 0.05.66.610.0 other operating systems 234432510700 % 188.8.131.52.2 Total 17,610 69,780 108,211 294,093
Source: Gartner April of 2011 years
2012, as the apparatus of the black strawberry is turned to QNX system that used on its Playbook, RIM can offer concerted users to experience and create the simplex developer’s community on its whole product series. And QNX is a strong platform that can offer the characteristic, figure and mulitasking function. Gartner analyst thinks, success of the market of dull and stereotyped computer will be promoted by the abundant ecosystem.
Milanesi lady shows: “RIM will need time and a large number of energy to attract developers and hand over an ecosystem of fascinating application and service around QNX in order to regard as apple or A Ndroid feasible substitution. This will limit RIM growth of market share within forecast period. The ones that are interested in RIM dull and stereotyped computer will been mainly those already disposing RIM infrastructure or having organizations of the strict safe demand. ”
Gartner analyst thinks MeeGo and WebOS platform behaves on the market of intellectual mobile phone weakly, unless they can expand their business, otherwise it is difficult that there is superior manifestation.
Milanesi lady then shows: “Intellectual cellphone subscriber hope, buy, run same dull and stereotyped computer of operating system with intellectual mobile phone by one, so that they can share employing and familiar sense of user interface on all apparatuses. Because some users settle on the operating system but not brand even more while buying the products, the manufacturer based on that Android develops should look out for the ownership of stepping the brand. The improvement of cognition degree of usability and brand is the maximum difference that they can lay particular emphasis on. ”