In  2012 there will be new and increasingly sophisticated ways used to
capture and exploit user data, as well as escalated battles over the control of
online information which will threaten to compromise content and erode public
trust and privacy. In the Georgia Tech Emerging Cyber Threats Report for 2012
reportspecific issues which are expected to cause the most problems to
organizations are:


alt="Security Manual - Sarbanes-Oxley" vspace=3 align=right
src="http://www.it-toolkits.com/images/Securitymanual.gif"
longDesc="Security Manual Template - Sarbanes-Oxley">The mobile
threat vector - managing tensions between usability, security and
scale



  • Mobile applications rely increasingly on the browser, presenting unique
    challenges to security in terms of usability and
  • Expect compound threats targeting mobile devices to use SMS, e-mail and
    the mobile Web browser to launch an attack, then silently record and steal
    data.
  • While USB flash drives have long been recognized for their ability to
    spread malware, mobile phones are becoming a new vector that could introduce
    attacks on otherwise-protected systems.
  • Encapsulation and encryption for sensitive portions of a mobile device can
    strengthen security.

Botnets - the evolving nature of adversaries, tactics,
techniques and procedure



  • Botnet controllers build massive information profiles on their compromised
    users and sell the data to the highest bidder.
  • Advanced persistent adversaries query botnet operators in search of
    already compromised machines belonging to their attack targets.
  • Bad guys will borrow techniques from Black Hat SEO to deceive current
    botnet defenses like dynamic reputation systems.

Controlling information online - a new frontier in information
security



  • Security researchers are currently debating whether personalization online
    could become a form of censorship.
  • Attackers are performing search engine optimization to help their
    malicious sites rank highly in search results.
  • The trend in compromised certificate authorities exposes numerous
    weaknesses in the overall trust model for the Internet.
  • Advanced persistent threats and the intersection of cyber threats with
    physical and critical infrastructure

Advanced persistent threats will adapt to security measures until
malicious objectives are achieved



  • Human error, lack of user education and weak passwords are still major
    vulnerabilities.
  • Cloud computing and computer hardware may present new avenues of attack,
    with all malware moving down the stack.
  • Large, flat networks with perimeter defenses at the Internet
    ingress/egress point break down quickly in the face of advanced persistent
    threats.

Resources
Post Your Resume to 65+ Job Sites
Resume Service

Post to Twitter Tweet This Post