The last article for this blog project is a fitting one,
as it takes a look at the cyber threat predictions made by Georgia Tech for the
coming year. Topping the Georgia Tech Information Security Center
's and the Georgia Tech
Research Institute's Georgia Tech Emerging Cyber Threats Report for
2013 is cloud computing. The panel that
compiled the list of predictions feels cloud computing will abused for
malicious purposes, namely creating networks of "zombie machines" to
do their bidding. The panel also voiced
concern that cyber criminals might "[use] cloud computing resources to
create clusters of temporary virtual attack systems. 2013 might also see problems with globalized
supply chains. Here is a list of some of
the other issues deemed serious by the panel:
Globalized Supply Chains - There is a very
real risk that products manufactured in other countries could have security
flaws that allow for cyber espionage and even cyber attack.
Search History Poisoning - Manipulating search
engine algorithms and controlling what information is seen by an internet user
can be a powerful tool for someone who wants control over what people see.
Mobile Threats including Browser and Wallet
Vulnerabilities - This threat is not as severe as previously thought thanks to
the app store model. However, the growth
in popularity of mobile devices, combined with the high use of the mobile web
and mobile wallet, makes mobile devices a tempting target for cyber criminals.
Malware Counteroffensive - Malware authors will
make every effort to make their malicious code more robust. They might incorporate techniques similar to
DRM and find new ways to make their malware less detectable.
Clearly education is the key
to protecting the public. With the push
toward cloud computing and mobile devices, businesses and consumers will need to
be more vigelent in the protection of their data.