Providers, large Web content providers and home router makersteamed together on Wednesday to launch their services on thenext-generation Internet Protocol version 6, or IPv6. The effort, known as IPv6 World Launch Day, should change littlefor enterprise users and consumers, but IT groups at companiesshould take notice. Like any technology transition, the change toIPv6 can cause problems, including issues that can affectcompanies' security. Security researchers and some attackers havealready started looking at IPv6 security and most enterprisesecurity teams will be behind the curve, said John Spence, vicepresident of IP services for consulting firm Nephos6. "One of the significant risks is that the hacker community isahead n exploiting V6 f the security professionals who aresecuring V6," he said. "So there is a temporary advantage[for the] attacker, because of the V6 transition that, hopefully,will get corrected." On Wednesday, Facebook, Google, Microsoft's Bing and Yahoo allpermanently enabled their presence on the IPv6 Internet. Inaddition, at least 65 Internet providers have committed totransitioning at least 1 percent of their subscribers to IPv6.Large home router manufacturers have also made IPv6 the defaultcommunications protocol for their hardware. The Internet Society claimed that this new support for the protocolmeant that adoption is taking off. "IPv6 is not just a 'nice to have'; it is ready for businesstoday and will very soon be a 'must have,'" Leslie Daigle,chief Internet Technology officer for the Internet Society , said in a statement on June 6. Yet companies thinking of moving their infrastructure to IPv6should beware of two major issues, said Nephos6's Spence. Companies need to be mindful of the gap between their IT teams'knowledge of IPv4 and their lack of expertise with IPv6. Thetechnology and corporate IT staff will not be ready to completelyhandle IPv6, and that could leave security lacking, he said.Companies should do their research and only deploy IPv6 technologywhen their staff is properly trained and the security software andappliances on which they rely are mature enough to provideprotection similar to the level on IPv4. "It is important not to deploy V6 in advanced of having thesecurity tools at V6 at parity of the security tools for V4,"he said. Also, companies should beware of networking hardware and computingsystems that are configured to be IPv6-friendly. In many cases,routers and operating systems will attempt to connect to any IPv6devices first user-friendly situation for consumers, but apotential pitfall for enterprises. Many companies may have systemsthat have created inadvertent tunnels to the IPv6 Internet,effectively a backdoor that could be exploited by hackers, Spencesaid. Making devices easy to set up on home networks "is probably agood thing in an unmanaged environment," he said. "Butyou don't want PCs in the enterprise to build back doors to theIPv6 Internet [just] because they're trying to be helpful.". I am an expert from hydropower-turbine.com, while we provides the quality product, such as Solar Power Panel Manufacturer , Hydraulic Power Generator, Turgo Turbine,and more.
Related Articles -
Solar Power Panel Manufacturer, Hydraulic Power Generator,
|