Risk
12/29/2010
10:46 PM
George V. Hulme
George V. Hulme
Commentary
Connect Directly
RSS
E-Mail
50%
50%

Information Security Predictions 2011

Here's my take on what big events will shape information security in the year ahead. (Or, maybe not).

Here's my take on what big events will shape information security in the year ahead. (Or, maybe not).Prediction Number 1: Hackers Get Back To Basics. There are two trends that will come into play and full fruition in the next year that will force hackers back to the basics. First, the current enterprise defenses organizations employ: intrusion detection systems, firewalls, content filtering, data leak prevention, and especially anti-virus software become so effective that many of the less skilled attackers just can't get through them anymore. Second, a global law enforcement crackdown on criminal hacking turns out to be extremely successful.

All of this means that hackers who really aren't any good get discouraged - and just stop hacking- toward the second half of next year. Those criminal hackers who are good enough at their craft to make a living are all arrested and imprisoned. The result: those who are left bring hacking back to the golden age of cracking networks for the joy and mischief of it all.

Prediction Number 2: Cyberwar is obsolete before it gets started. Nations realize that no matter how well equipped their offensive cyber warfare capabilities become - they can't adequately defend their networks, data, and critical infrastructure from the attack of others. Most every nation agrees to enter into a cyber warfare treaty that outlaws nation-backed attacks on the critical infrastructure of other nations. Overall, the treaty is viewed by the world as a great success. However there is a serious increase in the Chinese unemployment rate as a result of the treaty. This is solved when Google hires the unemployed Chinese hackers to develop cool new beta applications as long as they agree to stop attacking the search engine giant.

Prediction Number 3: Zero-defect ultra-secure code becomes attainable. An application security vendor develops a secure coding framework that works with all development languages. When laying this framework on top of the development environment, all security related business logic and coding errors are flagged and code can't be compiled until properly remedied. Administrators around the globe cheer that they finally get their second Tuesday of every month back. Adobe and Microsoft stock soars.

Prediction Number 4: Security industry moves from FUD to data. That's right: The language of Fear, Uncertainty, and Doubt is replaced by the language of science. Enterprises start analyzing the security related data they have, and start gathering more difficult to obtain data. Organizations start to study and share this data. The data is turned into useful information. They begin to test their hypothesis about which security practices work, and which do not. By 2013 the amount of budget spent annually on information security plummets by 55 percent while the security for most organizations rises exponentially.

Prediction Number 5: Operating System Stupid User Behavior Parser. One of the major operating systems becomes equipped with a Stupid User Behavior Parser, of SUBP. SUBP identifies links, files, applications, and web sites that the user shouldn't engage and blocks the user from being able to make the mistakes that jeopardize the security of their systems.

For my security and technology observations throughout the day, find me on Twitter.

Comment  | 
Print  | 
More Insights
Register for Dark Reading Newsletters
White Papers
Cartoon
Current Issue
Dark Reading, September 16, 2014
Malicious software is morphing to be more targeted, stealthy, and destructive. Are you prepared to stop it?
Flash Poll
Video
Slideshows
Twitter Feed
Dark Reading - Bug Report
Bug Report
Enterprise Vulnerabilities
From DHS/US-CERT's National Vulnerability Database
CVE-2012-1032
Published: 2014-09-17
Cross-site scripting (XSS) vulnerability in the Euroling SiteSeeker module 3.x before 3.4.5 for EPiServer allows remote attackers to inject arbitrary web script or HTML via unspecified vectors. NOTE: the provenance of this information is unknown; the details are obtained solely from third party inf...

CVE-2012-1417
Published: 2014-09-17
Multiple cross-site scripting (XSS) vulnerabilities in Local Phone book and Blacklist form in Yealink VOIP Phones allow remote authenticated users to inject arbitrary web script or HTML via the user field to cgi-bin/ConfigManApp.com.

CVE-2012-1506
Published: 2014-09-17
SQL injection vulnerability in the updateStatus function in lib/models/benefits/Hsp.php in OrangeHRM before 2.7 allows remote authenticated users to execute arbitrary SQL commands via the hspSummaryId parameter to plugins/ajaxCalls/haltResumeHsp.php. NOTE: some of these details are obtained from th...

CVE-2012-1507
Published: 2014-09-17
Multiple cross-site scripting (XSS) vulnerabilities in OrangeHRM before 2.7 allow remote attackers to inject arbitrary web script or HTML via the (1) newHspStatus parameter to plugins/ajaxCalls/haltResumeHsp.php, (2) sortOrder1 parameter to templates/hrfunct/emppop.php, or (3) uri parameter to index...

CVE-2012-2583
Published: 2014-09-17
Cross-site scripting (XSS) vulnerability in Mini Mail Dashboard Widget plugin 1.42 for WordPress allows remote attackers to inject arbitrary web script or HTML via the body of an email.

Best of the Web
Dark Reading Radio