Security threats to increase according to a University of Georgia report
In 2012 there will be new and increasingly sophisticated ways used to
capture and exploit user data, as well as escalated battles over the control of
online information which will threaten to compromise content and erode public
trust and privacy. In the Georgia Tech Emerging Cyber Threats Report for 2012
reportspecific issues which are expected to cause the most problems to
organizations are:
alt="Security Manual - Sarbanes-Oxley" vspace=3 align=right
src="http://www.it-toolkits.com/images/Securitymanual.gif"
longDesc="Security Manual Template - Sarbanes-Oxley">The mobile
threat vector - managing tensions between usability, security and
scale
- Mobile applications rely increasingly on the browser, presenting unique
challenges to security in terms of usability and
- Expect compound threats targeting mobile devices to use SMS, e-mail and
the mobile Web browser to launch an attack, then silently record and steal
data.
- While USB flash drives have long been recognized for their ability to
spread malware, mobile phones are becoming a new vector that could introduce
attacks on otherwise-protected systems.
- Encapsulation and encryption for sensitive portions of a mobile device can
strengthen security.
Botnets - the evolving nature of adversaries, tactics,
techniques and procedure
- Botnet controllers build massive information profiles on their compromised
users and sell the data to the highest bidder.
- Advanced persistent adversaries query botnet operators in search of
already compromised machines belonging to their attack targets.
- Bad guys will borrow techniques from Black Hat SEO to deceive current
botnet defenses like dynamic reputation systems.
Controlling information online - a new frontier in information
security
- Security researchers are currently debating whether personalization online
could become a form of censorship.
- Attackers are performing search engine optimization to help their
malicious sites rank highly in search results.
- The trend in compromised certificate authorities exposes numerous
weaknesses in the overall trust model for the Internet.
- Advanced persistent threats and the intersection of cyber threats with
physical and critical infrastructure
Advanced persistent threats will adapt to security measures until
malicious objectives are achieved
- Human error, lack of user education and weak passwords are still major
vulnerabilities.
- Cloud computing and computer hardware may present new avenues of attack,
with all malware moving down the stack.
- Large, flat networks with perimeter defenses at the Internet
ingress/egress point break down quickly in the face of advanced persistent
threats.
Leave a Reply