Georgia Tech Releases Cyber Threats Forecast for 2011

The Georgia Tech Information Security Center announced the release of the GTISC Emerging Cyber Threats Report for 2011, outlining the top three areas of security risk and concern for consumer and business Internet and computer users. The report was released today at the annual GTISC Security Summit on the Evolving Nature of Cyber Security Threats. The summit gathers leading industry and academic leaders who have distinguished themselves in the field of cyber security.

According to the report, an increase in the number of mobile and networked devices provides an enticing target for cyber criminals to steal data and thwart the functioning of systems in a variety of venues from hospitals to utility providers.

For 2011, GTISC is forecasting three key cyber security areas where threats are expected to increase and evolve:

    * Cyber Threats Targeting Physical Systems: As infrastructure services such as electric grid and utilities become networked and connect to the Internet, they will face greater risk of disruption and misuse. In addition, cyber attack is also a growing risk for healthcare systems as more medical offices and hospitals become connected. What's more, the speed of updating the security of devices in these environments may be hampered as devices involved with such systems may be subject to regulatory guidelines.
    * Botnets: Specifically large-scale attacks that utilize more targeted malware to evade detection; in addition cyber criminals are now making more efficient use of malicious software and have been re-launching previously thwarted attacks.
    * Mobile Devices and Social Networking: As more open mobile device platforms grow in popularity and more applications become available, these devices will become more attractive targets of attacks. In addition, cyber criminals are using Twitter and Facebook accounts to lure users into handing over personal and sensitive information.

"We have to move away from the reactive mode of addressing cyber security threats and must proactively work to understand new threats and develop effective ways to contain them," said Mustaque Ahamad, director of GTISC. "We are doing this for several of the key threats outlined in the Emerging Threats report and we look forward to working with our partners to build a more secure cyber space."

Featured

  • Progressing in Capabilities

    Progressing in Capabilities

    Hazardous areas within industries like oil and gas, manufacturing, agriculture and the like, have long-sought reliable video surveillance cameras and equipment that can operate safely in these harsh and unpredictable environments. Read Now

  • A Comprehensive Nationwide Solution

    A Comprehensive Nationwide Solution

    Across the United States, manufacturing facilities, distribution centers, truck yards, parking lots and car dealerships all have a common concern. They are targets for catalytic converters. In nearly every region, cases of catalytic converter thefts have skyrocketed. Read Now

  • Planning for Your Perimeter

    Planning for Your Perimeter

    The perimeter is an organization’s first line of defense and a critical element of any security and surveillance program. Even if a building’s interior or exterior security is strong, without a solid perimeter surveillance approach any company or business is vulnerable. Read Now

  • The Key Issue

    The Key Issue

    It is February 2014. A woman is getting ready in her room on a cruise ship when she hears a knock on the door; it is a crewmember delivering breakfast. She is not presentable so she tells him to leave it by the door. Read Now

Featured Cybersecurity

New Products

  • Dahua 2-Wire IP Video Intercom System

    Dahua 2-Wire IP Video Intercom System

    Dahua Technology is introducing a new line of expandable 2-wire IP video intercom solutions for the North America market. The New 2-wire IP video intercom is more advanced, cost effective, and designed to help businesses increase their security. 3

  • Camden Door Controls Application Spec Guide

    Camden Door Controls Application Spec Guide

    Camden Door Controls, an industry-leading provider of innovative, high quality door activation and locking products, has published a new application spec guide for specification writers designing a wireless barrier-free restroom control system. 3

  • Genetec Security Center

    Genetec Security Center

    This major new release allows more system components to run in the cloud, reducing the gap between cloud and on-premises security systems. It also makes it easier to connect external systems and tap external data for use in dashboards, maps and investigations without relying on complex, specialized integrations. 3