Risk

12/29/2010
10:46 PM
George V. Hulme
George V. Hulme
Commentary
50%
50%

Information Security Predictions 2011

Here's my take on what big events will shape information security in the year ahead. (Or, maybe not).

Here's my take on what big events will shape information security in the year ahead. (Or, maybe not).Prediction Number 1: Hackers Get Back To Basics. There are two trends that will come into play and full fruition in the next year that will force hackers back to the basics. First, the current enterprise defenses organizations employ: intrusion detection systems, firewalls, content filtering, data leak prevention, and especially anti-virus software become so effective that many of the less skilled attackers just can't get through them anymore. Second, a global law enforcement crackdown on criminal hacking turns out to be extremely successful.

All of this means that hackers who really aren't any good get discouraged - and just stop hacking- toward the second half of next year. Those criminal hackers who are good enough at their craft to make a living are all arrested and imprisoned. The result: those who are left bring hacking back to the golden age of cracking networks for the joy and mischief of it all.

Prediction Number 2: Cyberwar is obsolete before it gets started. Nations realize that no matter how well equipped their offensive cyber warfare capabilities become - they can't adequately defend their networks, data, and critical infrastructure from the attack of others. Most every nation agrees to enter into a cyber warfare treaty that outlaws nation-backed attacks on the critical infrastructure of other nations. Overall, the treaty is viewed by the world as a great success. However there is a serious increase in the Chinese unemployment rate as a result of the treaty. This is solved when Google hires the unemployed Chinese hackers to develop cool new beta applications as long as they agree to stop attacking the search engine giant.

Prediction Number 3: Zero-defect ultra-secure code becomes attainable. An application security vendor develops a secure coding framework that works with all development languages. When laying this framework on top of the development environment, all security related business logic and coding errors are flagged and code can't be compiled until properly remedied. Administrators around the globe cheer that they finally get their second Tuesday of every month back. Adobe and Microsoft stock soars.

Prediction Number 4: Security industry moves from FUD to data. That's right: The language of Fear, Uncertainty, and Doubt is replaced by the language of science. Enterprises start analyzing the security related data they have, and start gathering more difficult to obtain data. Organizations start to study and share this data. The data is turned into useful information. They begin to test their hypothesis about which security practices work, and which do not. By 2013 the amount of budget spent annually on information security plummets by 55 percent while the security for most organizations rises exponentially.

Prediction Number 5: Operating System Stupid User Behavior Parser. One of the major operating systems becomes equipped with a Stupid User Behavior Parser, of SUBP. SUBP identifies links, files, applications, and web sites that the user shouldn't engage and blocks the user from being able to make the mistakes that jeopardize the security of their systems.

For my security and technology observations throughout the day, find me on Twitter.

Comment  | 
Print  | 
More Insights
Comments
Newest First  |  Oldest First  |  Threaded View
Register for Dark Reading Newsletters
Dark Reading Live EVENTS
INsecurity - For the Defenders of Enterprise Security
A Dark Reading Conference
While red team conferences focus primarily on new vulnerabilities and security researchers, INsecurity puts security execution, protection, and operations center stage. The primary speakers will be CISOs and leaders in security defense; the blue team will be the focus.
White Papers
Video
Cartoon Contest
Write a Caption, Win a Starbucks Card! Click Here
Latest Comment: This comment is waiting for review by our moderators.
Current Issue
Security Vulnerabilities: The Next Wave
Just when you thought it was safe, researchers have unveiled a new round of IT security flaws. Is your enterprise ready?
Flash Poll
[Strategic Security Report] How Enterprises Are Attacking the IT Security Problem
[Strategic Security Report] How Enterprises Are Attacking the IT Security Problem
Enterprises are spending more of their IT budgets on cybersecurity technology. How do your organization's security plans and strategies compare to what others are doing? Here's an in-depth look.
Slideshows
Twitter Feed
Dark Reading - Bug Report
Bug Report
Enterprise Vulnerabilities
From DHS/US-CERT's National Vulnerability Database
CVE-2017-0290
Published: 2017-05-09
NScript in mpengine in Microsoft Malware Protection Engine with Engine Version before 1.1.13704.0, as used in Windows Defender and other products, allows remote attackers to execute arbitrary code or cause a denial of service (type confusion and application crash) via crafted JavaScript code within ...

CVE-2016-10369
Published: 2017-05-08
unixsocket.c in lxterminal through 0.3.0 insecurely uses /tmp for a socket file, allowing a local user to cause a denial of service (preventing terminal launch), or possibly have other impact (bypassing terminal access control).

CVE-2016-8202
Published: 2017-05-08
A privilege escalation vulnerability in Brocade Fibre Channel SAN products running Brocade Fabric OS (FOS) releases earlier than v7.4.1d and v8.0.1b could allow an authenticated attacker to elevate the privileges of user accounts accessing the system via command line interface. With affected version...

CVE-2016-8209
Published: 2017-05-08
Improper checks for unusual or exceptional conditions in Brocade NetIron 05.8.00 and later releases up to and including 06.1.00, when the Management Module is continuously scanned on port 22, may allow attackers to cause a denial of service (crash and reload) of the management module.

CVE-2017-0890
Published: 2017-05-08
Nextcloud Server before 11.0.3 is vulnerable to an inadequate escaping leading to a XSS vulnerability in the search module. To be exploitable a user has to write or paste malicious content into the search dialogue.