New Cyber ​​Threats for 2014 [

7:38 PM
New Cyber ​​Threats for 2014 [ -

Cybercriminals continue to develop new ways to exploit weaknesses in network systems that the company's infrastructure suffers dramatic changes.

Recent developments and trends, including the use of cloud storage, BYODs (Bring Your Own Devices) and insecure mobile devices present new challenges for security professionals.

As company data finds its way into more platforms and channels, protection of intellectual property ownership appears to be a major concern for the area. In this post, we'll examine the main challenges facing security professionals in the coming year, as stated in a recent report published by the Georgia Institute of Technology.

Cloud Computing requires reliance on third parties

"The Cloud", a network-located servers that offer the ubiquitous storage for consumers and businesses, has seen increased use in the business in recent years. As much as 70% of organizations are aware, and make little use of employees of third cloud technologies for storage of business information. Because of its adoption and unproven safety protocols, cloud computing should be a major concern for security professionals

Paramount Concerns :.

  • Dependence of the security protocols and third party staff - cloud storage companies (like Dropbox or Google Drive) design and maintain their own security standards outside the scope of internal security teams
  • Threat of natural disasters in physical storage hardware -. Storage media are prone to national disasters, leading to a potential loss of data
  • storage of business information on a moderate cloud storage employees -. Solution requires security settings to prevent loss of intellectual property in the event of failure of third-party security.
  • insecurity of unencrypted data against the drawbacks of encryption -. In-house encryption solutions offer protection to the detriment of the benefits of cloud added while unencrypted data remains vulnerable

Create mobile ecosystems potential intrusion points

The use unsecured mobile devices associated with the company wireless network vulnerabilities to attack. The implementation of bring your own device (BYOD) practices complicate this when privacy precedence over the security of information. Measures should be taken to secure these platforms as criminals adapt accordingly intrusion methods

Paramount Concerns:

  • Malware - Levels infection remain low, but the intrusion of mobile malware. are on the rise, often without the knowledge of the infected part
  • jailbroken cellular devices - .. risk is highest for cellular devices jailbroken due to open the application markets
  • App security protocols store - Apple "gated" market has been proven by Georgia Tech researchers have sufficient security vulnerabilities to allow malicious applications on its market

information Handling Threats legitimacy. data

the use of digital records means the risk of manipulation of information is high. Registration falsification, profile and the infiltration website, and information pollution permit manipulation of digital reputation, which is potentially damaging to business. Review the control of suppliers, advertisers and entrepreneurs should guide security professionals in technology selection and personnel for the implementation

Paramount Concerns:

  • analyzing Big Data - Business. the use of large amounts of data in the analysis creates vulnerabilities in the processes of decision making
  • Search Engine Optimization - .. dependence search functions on authentic metadata creates potential research manipulation ranking
  • poison or bleaching reputation - personal profile or corporate website intrusion is a threat of poisoning the reputation that can harm the commercial interests if not remedied. Moreover, suppliers and reliable staff can handle reputation data to clear their records.

connected devices Lacking Capabilities for the necessary security

unsecured platforms on the Internet devices allowed to present a risk to security intrusion. The "Internet of things", which includes devices powered by software platforms unable to perform appropriate security protocols, making detection more difficult network intrusions. Security professionals must also consider the possibility of counterfeit devices using context unique input device in corporate networks

Paramount Concerns:

  • primitive platforms - enabled Internet. devices without worrying about the design before security breaches and lack of sophistication required to implement security protocols at risk of intrusion to secure networks
  • threat detection -. Device traffic analysis is still largely theoretical, which makes the detection and identification of specific threats from a distance. objective
  • supply chain of corruption -. devices subject to intrusions of malicious software over the Internet generation and has put in place to secure networks pose a considerable threat

security professionals must anticipate emerging threats to establish practical and appropriate infrastructure. In particular, professionals must take into account the challenges of cloud computing, nonstandard mobile devices, manipulation of information, and connected devices not securable in establishing security protocols. Each threat poses its own challenges that require specialized housing to secure sensitive information such threats arise.

Previous
Next Post »
0 Komentar