Information Security
Cyber threats:
Looking ahead to 2015
Kevin G. Coleman, SilverRhino12:09
p.m. EST December 29, 2014
(Photo: Courtesy)
The New Year is just about upon us and with it comes
the continued advancement of cyber technology and the ever increasing challenge
of cyber security. Needless to say the challenge of cyber security will not get
easier – in all reality it is likely to become far more frequent, complex, and challenging.
A few of us with an interest in the cyber domain
recently got together and began sounding off about what the new year is likely
to hold. Here are the top three predictions that came out of that discussion.
(Although by no stretch of the imagination could this be considered a
scientific endeavor.)
We will begin to see the hacking of personal and
commercial drones. It is anticipated that hackers will take over control of the
drones, steer them to where they desire, and cause them to crash into each
other and stationary object of their choice. The hackers will take pleasure in
this for sure. Remember Iran already claims to have hacked and brought down a
CIA drone.
Home appliances that are connected to the Internet
will become the target of hackers. We have already seen a so called "smart
refrigerator" that fell victim to hackers and was used in a cyber attack.
Now hackers will penetrate these devices, change their settings, cause
malfunctions and in some cases use them as a component of a larger cyber attack
that receives much greater attention.
Clothing (eTextiles) that includes computing and
sensors will become more common, and a widely publicized cyber attack that
alters the functioning or data of the wearable devices/electronics will occur.
We also could see HIPAA violations after medical professionals recommend the
use of the clothing to monitor the medical conditions/health of patients even
though limited protection is currently available and a successful attack is
documented.
What is interesting
that all three of these forecasted event focus on non-traditional computing
that have limited, if any, cyber security built-in as well as minimal use of
third-part cyber security technology. Perhaps even more interesting is the
question of how long into 2015 it will take for each of these to come true – if
they do.
No comments:
Post a Comment