Risk
12/29/2010
10:46 PM
George V. Hulme
George V. Hulme
Commentary
Connect Directly
RSS
E-Mail
50%
50%

Information Security Predictions 2011

Here's my take on what big events will shape information security in the year ahead. (Or, maybe not).

Here's my take on what big events will shape information security in the year ahead. (Or, maybe not).Prediction Number 1: Hackers Get Back To Basics. There are two trends that will come into play and full fruition in the next year that will force hackers back to the basics. First, the current enterprise defenses organizations employ: intrusion detection systems, firewalls, content filtering, data leak prevention, and especially anti-virus software become so effective that many of the less skilled attackers just can't get through them anymore. Second, a global law enforcement crackdown on criminal hacking turns out to be extremely successful.

All of this means that hackers who really aren't any good get discouraged - and just stop hacking- toward the second half of next year. Those criminal hackers who are good enough at their craft to make a living are all arrested and imprisoned. The result: those who are left bring hacking back to the golden age of cracking networks for the joy and mischief of it all.

Prediction Number 2: Cyberwar is obsolete before it gets started. Nations realize that no matter how well equipped their offensive cyber warfare capabilities become - they can't adequately defend their networks, data, and critical infrastructure from the attack of others. Most every nation agrees to enter into a cyber warfare treaty that outlaws nation-backed attacks on the critical infrastructure of other nations. Overall, the treaty is viewed by the world as a great success. However there is a serious increase in the Chinese unemployment rate as a result of the treaty. This is solved when Google hires the unemployed Chinese hackers to develop cool new beta applications as long as they agree to stop attacking the search engine giant.

Prediction Number 3: Zero-defect ultra-secure code becomes attainable. An application security vendor develops a secure coding framework that works with all development languages. When laying this framework on top of the development environment, all security related business logic and coding errors are flagged and code can't be compiled until properly remedied. Administrators around the globe cheer that they finally get their second Tuesday of every month back. Adobe and Microsoft stock soars.

Prediction Number 4: Security industry moves from FUD to data. That's right: The language of Fear, Uncertainty, and Doubt is replaced by the language of science. Enterprises start analyzing the security related data they have, and start gathering more difficult to obtain data. Organizations start to study and share this data. The data is turned into useful information. They begin to test their hypothesis about which security practices work, and which do not. By 2013 the amount of budget spent annually on information security plummets by 55 percent while the security for most organizations rises exponentially.

Prediction Number 5: Operating System Stupid User Behavior Parser. One of the major operating systems becomes equipped with a Stupid User Behavior Parser, of SUBP. SUBP identifies links, files, applications, and web sites that the user shouldn't engage and blocks the user from being able to make the mistakes that jeopardize the security of their systems.

For my security and technology observations throughout the day, find me on Twitter.

Comment  | 
Print  | 
More Insights
Register for Dark Reading Newsletters
White Papers
Cartoon
Current Issue
Dark Reading, September 16, 2014
Malicious software is morphing to be more targeted, stealthy, and destructive. Are you prepared to stop it?
Flash Poll
Video
Slideshows
Twitter Feed
Dark Reading - Bug Report
Bug Report
Enterprise Vulnerabilities
From DHS/US-CERT's National Vulnerability Database
CVE-2014-0560
Published: 2014-09-17
Use-after-free vulnerability in Adobe Reader and Acrobat 10.x before 10.1.12 and 11.x before 11.0.09 on Windows and OS X allows attackers to execute arbitrary code via unspecified vectors.

CVE-2014-0561
Published: 2014-09-17
Heap-based buffer overflow in Adobe Reader and Acrobat 10.x before 10.1.12 and 11.x before 11.0.09 on Windows and OS X allows attackers to execute arbitrary code via unspecified vectors, a different vulnerability than CVE-2014-0567.

CVE-2014-0562
Published: 2014-09-17
Cross-site scripting (XSS) vulnerability in Adobe Reader and Acrobat 10.x before 10.1.12 and 11.x before 11.0.09 on OS X allows remote attackers to inject arbitrary web script or HTML via unspecified vectors, aka "Universal XSS (UXSS)."

CVE-2014-0563
Published: 2014-09-17
Adobe Reader and Acrobat 10.x before 10.1.12 and 11.x before 11.0.09 on Windows and OS X allow attackers to cause a denial of service (memory corruption) via unspecified vectors.

CVE-2014-0565
Published: 2014-09-17
Adobe Reader and Acrobat 10.x before 10.1.12 and 11.x before 11.0.09 on Windows and OS X allow attackers to execute arbitrary code or cause a denial of service (memory corruption) via unspecified vectors, a different vulnerability than CVE-2014-0566.

Best of the Web
Dark Reading Radio
Archived Dark Reading Radio
CISO Insider: An Interview with James Christiansen, Vice President, Information Risk Management, Office of the CISO, Accuvant