본문 바로가기
IT 와 Social 이야기/Security

18 곳의 2013년 보안 전망 요약 18 Security Prediction for 2013

by manga0713 2012. 12. 27.

 

 

 

 

Fortinet

 

1. APTs Target Individuals through Mobile Platforms

2. Two Factor Authentication Replaces Single Password Sign on Security Model

3. Exploits to Target Machine-to-Machine (M2M) Communications

4. Exploits Circumvent the Sandbox

5. Cross Platform Botnets Mobile Malware Growth Closes in on Laptop and Desktop PCs

 

 

Kaspersky

 

1. Targeted attacks and cyber-espionage

2. The onward march of ‘hacktivism’

3. Nation-state-sponsored cyber-attacks

4. The use of legal surveillance tools

5. Cloudy with a chance of malware

6. Dude, where’s my privacy?!

7. Who do you trust?

8. Cyber extortion

9. Mac OS malware

10. Mobile malware

11. Vulnerabilities and exploits

 

 

McAfee

 

1. Targeted attacks

2. Signed malware

3. Big business at risk

4. Non-Windows attacks

5. Ransomware

6. Impact of changing regulations

7. Need for incident response

8. Security Process Automation

9. Connected devices

10. Bring Your Own Application (BYOA)

 

 

Sophos

 

1. Basic web server mistakes

2. More “irreversible” malware

3. Attack toolkits with premium features

4. Better exploit mitigation

5. Integration, privacy and security challenges

 

 

Symantec

 

1. Cyber conflict becomes the norm

2. Ransomware is the new scareware

3. Madware adds to the insanity

4. Monetization of social networks introduces new dangers

5. As users shift to mobile and cloud, so will attackers

 

 

Trend micro 

 

1. The volume of malicious and high-risk Android apps will hit 1 million in 2013

2. Windows 8 offers improved security—but only to consumers

3. Cybercriminals will heavily abuse legitimate cloud services

4. As digital technology plays a larger role in our lives, security threats will appear in unexpected places

5. Consumers will use multiple computing platforms and devices. Securing these will be complex and difficult

6. Politically motivated electronic-based attacks will become more destructive

7. Cloud storage or not, data breaches will remain a threat in 2013

8. Efforts to address global cybercrime will take two or more years to reach full implementation

9. Conventional malware threats will only gradually evolve, with few, if any, new threats. Attacks will become more sophisticated in terms of deployment

10. Africa will become a new safe harbor for cybercriminals

 

 

Websense

 

1. CROSS-PLATFORM THREATS: Mobile devices will be the new target for cross-platform threats

2. MALWARE IN APP STORES: Legitimate mobile app stores will host more malware in 2013

3. GOVERNMENT-SPONSORED ATTACKS: Government-sponsored attacks will increase as new players enter

4. BYPASS OF SANDBOX DETECTION: Cybercriminals will use bypass methods to avoid traditional sandbox detection

5. NEXT LEVEL HACKTIVISTS: Expect hacktivists to move to the next level as simplistic opportunities dwindle

6. MALICIOUS EMAILS: Malicious emails are making a comeback

7. CMS ATTACKS: Cybercriminals will follow the crowds to legitimate content management systems and web platforms

 

 

WatchGuard

 

1. Malware Enters the Matrix through a Virtual Door

2. It’s Your Browser - Not Your System - that Malware Is After

3. Strike Back Gets a Lot of Lip Service, but Does Little Good

4. We’ll Pay for Our Lack of IPv6 Expertise

5. Android Pick Pockets Try to Empty Mobile Wallets

6. An Exploit Sold on the “Vulnerability Market” Becomes the Next APT

7. Important Cyber Security-related Legislation Becomes Law

8. A Cyber Attack Results in a Human Death

 

 

Microsoft

 

1. Criminals will benefit from unintended consequences of espionage

2. Attackers will increasingly use apps, movies and music to install malware

3. Drive-by attacks and cross-site scripting attacks will be attacker favorites

4. Software updating gets easier and exploiting vulnerabilities gets harder

5. Rootkits will evolve in 2013

 

 

Security Lab 

 

1. Targeted Attacks Grow More Damaging and Complex

2. Illicit Social Media Scams Escalate

3. Mobile Malware Menaces Users and Organizations

4. Third-Party Software Exploits Gain Traction

5. Exploit Kits and Malware Reuse Proliferate

 

 

Imperva 

 

1. Government Malware Goes Commercial

2. Black Clouds on the Horizon

3. APT Targets the Little Guy

4. Security in Numbers

5. Hacktivism Gets Process Driven

 

 

Verizon

 

1. Authentication related failures [stolen/weak passwords]

2. Web application exploits

3. Social engineering attacks

4. Targeted espionage & hactivism attacks

5. Lost or stolen devices are the primary mobile threat

 

 

Zscaler

 

1. Mild – Mobile device management application providers will see consolidation

2. Mild – Traditional security tool vendors will get on the “big data” bus and figure out how to leverage the large amounts of security data being collected

3. Medium – Organizations will begin spending more money on detective security controls and less on preventive security controls

4. Medium – Increased scrutiny of mobile application providers use of private information

5. Medium – Embedded devices (thermostats, security systems, garage door openers, etc) become a significant target for attackers

6. Bold – Microsoft gets into the bug bounty game

7. Bold – Privatized malware specifically tuned to target an attacker’s victim

 

 

RSA

 

1. The hackers will likely get even more sophisticated

2. Our attack surfaces will continue to expand and any remaining semblance of a perimeter will continue to wither away

3. These changes will occur whether security teams are ready or not

4. And, national governments will continue to diddle or, should I say, fiddle (while Rome burns),  failing to legislate on rules of evidence, information sharing and the reforming of privacy laws

5. It is highly likely that a rogue nation state, hacktivists or even terrorists will move beyond intrusion and espionage to attempt meaningful disruption and, eventually, even destruction of critical infrastructure

6. Responsible people in organizations from all verticals, industries and governments will move to that newer intelligence-based security model and pressure governments to act on our collective behalf

7. I also predict a significant uptake in investment for cloud-oriented security services to mitigate the effects of that serious shortage in cyber security skills

8. Big Data analytics will be used to enable an intelligence-based security model

 

 

Lancope

 

1. State-sponsored espionage and sabotage of computer networks

2. Monster DDoS attacks

3. The loss of visibility and control created by IT consumerization and the cloud

4. The password debacle

5. Insider threats

 

 

F-Secure

 

1. The end of the Internet as we know it? (The ITU is working on a new regulations treaty for the Internet)

2. Leaks will reveal more government-sponsored espionage tools

3. Commoditization of mobile malware will increase

4. Another malware outbreak will hit Macs

5. Smart TVs will become a hacker target

6. Mobile spy software will go mainstream

7. Free tablets will be offered to prime content customers

 

 

Booz Allen Hamilton

 

1. Business/Information Risk Protection is not Just a Technology Issue: Spending on new technology alone is not enough to protect a firm’s information and business

2. Data Disruption Attacks May Become Data Destruction Attacks: The potential of threat actors actually destroying data is a major concern among risk and security professionals

3. Nation States and Threat Actors Are Becoming More Sophisticated: We now have to face more sophisticated threat actors such as smaller nation states and terrorist elements obtaining similar capabilities

4. Legislation Could Push Industry Standards Around Cyber Risks: Banks already share information, but they will need to do more in light of possible legislation to set standards for cyber protection

5. Predictive Threat Intelligence Analytics Will Create a More Effective Risk Management Capability: Financial services firms must begin to employ a more predictive threat intelligence capability to determine who might be trying to attack them and how

6. Vendor Risk Management Is Becoming an Increasingly Important Concern Among Firms: Most firms buy much of their information technology and services from suppliers

7. Cyber Risk Continues to be a Board-Level Issue: Information, legal documents, communications with clients and employees are all becoming more and more electronic every day to include an even greater usage of mobile technologies and social media

8. Firms Must Continue to Embrace and Adapt to the New “Boundless Network”: Cloud, social and mobile technologies, including “Bring Your Own Device” (BYOD), are simply too cost efficient and effective for institutions to ignore them

9. Identity and Access Management Is Becoming a Key Security Control Area: The days of focusing solely on perimeter defense have long since past

10. The Financial Services Industry Will Rely More Heavily on Cyber Benchmarking: The FS industry is investing more and more in protecting its information assets and wisely spending these scarce dollars is becoming increasing important, not only from an effectiveness standpoint, but to also be able to articulate to business leaders, the value of such an investment

 

 

Georgia Institute

 

1. Information Manipulation

2. Insecurity of the Supply Chain

3. Mobile Security Reanalyzed

4. Cloud Security Enters Its Teenage Years