Risk
12/29/2010
10:46 PM
George V. Hulme
George V. Hulme
Commentary
50%
50%

Information Security Predictions 2011

Here's my take on what big events will shape information security in the year ahead. (Or, maybe not).

Here's my take on what big events will shape information security in the year ahead. (Or, maybe not).Prediction Number 1: Hackers Get Back To Basics. There are two trends that will come into play and full fruition in the next year that will force hackers back to the basics. First, the current enterprise defenses organizations employ: intrusion detection systems, firewalls, content filtering, data leak prevention, and especially anti-virus software become so effective that many of the less skilled attackers just can't get through them anymore. Second, a global law enforcement crackdown on criminal hacking turns out to be extremely successful.

All of this means that hackers who really aren't any good get discouraged - and just stop hacking- toward the second half of next year. Those criminal hackers who are good enough at their craft to make a living are all arrested and imprisoned. The result: those who are left bring hacking back to the golden age of cracking networks for the joy and mischief of it all.

Prediction Number 2: Cyberwar is obsolete before it gets started. Nations realize that no matter how well equipped their offensive cyber warfare capabilities become - they can't adequately defend their networks, data, and critical infrastructure from the attack of others. Most every nation agrees to enter into a cyber warfare treaty that outlaws nation-backed attacks on the critical infrastructure of other nations. Overall, the treaty is viewed by the world as a great success. However there is a serious increase in the Chinese unemployment rate as a result of the treaty. This is solved when Google hires the unemployed Chinese hackers to develop cool new beta applications as long as they agree to stop attacking the search engine giant.

Prediction Number 3: Zero-defect ultra-secure code becomes attainable. An application security vendor develops a secure coding framework that works with all development languages. When laying this framework on top of the development environment, all security related business logic and coding errors are flagged and code can't be compiled until properly remedied. Administrators around the globe cheer that they finally get their second Tuesday of every month back. Adobe and Microsoft stock soars.

Prediction Number 4: Security industry moves from FUD to data. That's right: The language of Fear, Uncertainty, and Doubt is replaced by the language of science. Enterprises start analyzing the security related data they have, and start gathering more difficult to obtain data. Organizations start to study and share this data. The data is turned into useful information. They begin to test their hypothesis about which security practices work, and which do not. By 2013 the amount of budget spent annually on information security plummets by 55 percent while the security for most organizations rises exponentially.

Prediction Number 5: Operating System Stupid User Behavior Parser. One of the major operating systems becomes equipped with a Stupid User Behavior Parser, of SUBP. SUBP identifies links, files, applications, and web sites that the user shouldn't engage and blocks the user from being able to make the mistakes that jeopardize the security of their systems.

For my security and technology observations throughout the day, find me on Twitter.

Comment  | 
Print  | 
More Insights
Register for Dark Reading Newsletters
White Papers
Cartoon
Current Issue
Flash Poll
Video
Slideshows
Twitter Feed
Dark Reading - Bug Report
Bug Report
Enterprise Vulnerabilities
From DHS/US-CERT's National Vulnerability Database
CVE-2015-5084
Published: 2015-08-02
The Siemens SIMATIC WinCC Sm@rtClient and Sm@rtClient Lite applications before 01.00.01.00 for Android do not properly store passwords, which allows physically approximate attackers to obtain sensitive information via unspecified vectors.

CVE-2015-5352
Published: 2015-08-02
The x11_open_helper function in channels.c in ssh in OpenSSH before 6.9, when ForwardX11Trusted mode is not used, lacks a check of the refusal deadline for X connections, which makes it easier for remote attackers to bypass intended access restrictions via a connection outside of the permitted time ...

CVE-2015-5537
Published: 2015-08-02
The SSL layer of the HTTPS service in Siemens RuggedCom ROS before 4.2.0 and ROX II does not properly implement CBC padding, which makes it easier for man-in-the-middle attackers to obtain cleartext data via a padding-oracle attack, a different vulnerability than CVE-2014-3566.

CVE-2015-5600
Published: 2015-08-02
The kbdint_next_device function in auth2-chall.c in sshd in OpenSSH through 6.9 does not properly restrict the processing of keyboard-interactive devices within a single connection, which makes it easier for remote attackers to conduct brute-force attacks or cause a denial of service (CPU consumptio...

CVE-2015-1009
Published: 2015-07-31
Schneider Electric InduSoft Web Studio before 7.1.3.5 Patch 5 and Wonderware InTouch Machine Edition through 7.1 SP3 Patch 4 use cleartext for project-window password storage, which allows local users to obtain sensitive information by reading a file.

Dark Reading Radio
Archived Dark Reading Radio
What’s the future of the venerable firewall? We’ve invited two security industry leaders to make their case: Join us and bring your questions and opinions!