Страницы

Tuesday, December 30, 2014

Information Security

Cyber threats: Looking ahead to 2015
Kevin G. Coleman, SilverRhino12:09 p.m. EST December 29, 2014
635548444348680337-Kevin-Coleman-lg-
(Photo: Courtesy)

The New Year is just about upon us and with it comes the continued advancement of cyber technology and the ever increasing challenge of cyber security. Needless to say the challenge of cyber security will not get easier – in all reality it is likely to become far more frequent, complex, and challenging.
A few of us with an interest in the cyber domain recently got together and began sounding off about what the new year is likely to hold. Here are the top three predictions that came out of that discussion. (Although by no stretch of the imagination could this be considered a scientific endeavor.)
We will begin to see the hacking of personal and commercial drones. It is anticipated that hackers will take over control of the drones, steer them to where they desire, and cause them to crash into each other and stationary object of their choice. The hackers will take pleasure in this for sure. Remember Iran already claims to have hacked and brought down a CIA drone.
Home appliances that are connected to the Internet will become the target of hackers. We have already seen a so called "smart refrigerator" that fell victim to hackers and was used in a cyber attack. Now hackers will penetrate these devices, change their settings, cause malfunctions and in some cases use them as a component of a larger cyber attack that receives much greater attention.
Clothing (eTextiles) that includes computing and sensors will become more common, and a widely publicized cyber attack that alters the functioning or data of the wearable devices/electronics will occur. We also could see HIPAA violations after medical professionals recommend the use of the clothing to monitor the medical conditions/health of patients even though limited protection is currently available and a successful attack is documented.
What is interesting that all three of these forecasted event focus on non-traditional computing that have limited, if any, cyber security built-in as well as minimal use of third-part cyber security technology. Perhaps even more interesting is the question of how long into 2015 it will take for each of these to come true – if they do.



No comments:

Post a Comment