Moving forward there are potential challenges for autonomous vehicles that may create for the future of cybersecurity. Risks such as hacking are one of the many threats linked with these cars. The Alliance for Telecommunications Industry Solutions (ATIS), the risks of cyber intrusion can vary from access to the personal and financial information of the owner, driver or passenger, to even the loss of control of the vehicle. The stat that I also found interesting is that more cars become connected, the more cyber security concerns will rise, especially since the connected car market is expected to quadruple by 2021.It is no longer just GPS or satellite radio, cars are connected throughout and into dealerships and personal homes.
How To Stop Hackers
https://www.popsci.com/technology/article/2013-09/how-stop-hackers-teach-students-hack
This article starts with the concept that Schools should teach students learn how to stop malicious hackers by learning their ways. Imagine a world where security guards learn to be robbers first. The first step for students, before moving into a government or corporate job where they work to prevent hacks, is to learn the darker side of the trade: exploiting loopholes, thieving from servers, cracking passwords–and not just learning and performing them, in a classroom set up especially for the experience. Students learn the tricks they need to break past a system’s defenses, but not when to use which tricks. Imagine getting the keys, not the locks is the analogy the author used. I think this article even though is a few years old relates to our program and what we are learning. The classes listed in this article have the same names as in our program.
Citizen-Warrior of month: Vermont cyber-security expert
https://www.army.mil/article/197597/citizen_warrior_of_month_vermont_cyber_security_expert
Air Force Major Jack Skoda, a cyber defense instructor in Vermont Air National Guard’s Information Operations Squadron, believes that cyberspace is “all around us, all the time.” I found it interesting how he likens cyber defense specialists as having the same attributes as military minds. His thoughts are that “they understood their domain, and they used that understanding to bring the effect they needed at the time of their choosing to win decisively,” said Skoda. “And that doesn’t change in cyber.” Major Skoda teaches Cyber Security in the military and a local community college and switched his mentality accordingly. Military personnel are problem solving, they are already thinking about budget, number of people to get a job done and how long a specific task may or may not take whereas a traditional college student doesn’t have that experience. He uses his military experience to emphasize why security protocols are important. underlying message to all his students remains consistent: know your trade, frontwards and backwards. That is why there is a shortage of warriors like him in cyber-security – the ones who have mastered this trade.
Uber ‘Extorted’ By Hackers as Breach Details Surface a Year Later
Recently appointed Uber CEO Dara Khosrowshahi recently learned that in late 2016 that two individuals outside of the company had inappropriately accessed user data stored on a third-party cloud-based service: GitHub.Khosrowshahi said names, email addresses and phone numbers of 57 million Uber users worldwide were accessed, as well as the driver’s license numbers of about 600,000 U.S. drivers that the company employs He also stated that there was no indication that trip location history, credit card numbers, bank account numbers, Social Security numbers or dates of birth were downloaded. Regardless there was confidential uber customer information that was compromised. The hackers are believed to have accessed information through GitHub, a software development platform used by Uber’s engineering and coding team, to carry out the breach. The hackers reached an agreement with Uber to delete the compromised data and be silent in exchange for $100,000.
Our top 7 cyber security predictions for 2018
This article taught me that there will be companies that will be subject to the European Union’s (EU) General Data Protection Regulation (GDPR) and most arear behind the May 25 compliance deadline. I found this add as Regulators will not audit for GDPR compliance, so companies are vulnerable to fines only if there is a breach or EU citizens file complaints. Even if a company experiences a breach or complaint, regulators will likely treat it leniently if the company can document good-faith efforts to comply. To me what is the point of a governing body (GDPR) and regulations if there is a possibility of no audit. Therefore unless there is a complaint or visible issue a company may not even pay a fine.
At this point the GDPR is predicted to punish when the companies are caught. The other points that I see at my work place are the decline of password-only authentication will accelerate. Even my job there is dual authentication process for VPN and sign-on. There will be an increase in state-sponsored attacks and IOT which should not be a surprise to anyone. We are aware of how countries like Russia, Korea, etc are attempting to increase security hacking.
What I did find interesting is how there is a risk of more automation of threats. I always expected hackers to be precise and hands-on. Lastly the big issue will be trust. Who can companies trust with guarding and protection and implementing security measures.
The Internet of Things Is Going to Change Everything About Cybersecurity
https://hbr.org/2017/12/the-internet-of-things-is-going-to-change-everything-about-cybersecurity
Cybersecurity is such a volatile industry in so many aspects. In 2016, breaches cost businesses nearly $4 billion in 2017 the number will be roughly 6 billion. The constant number of threats and attacks is becoming so mainstream that businesses are investing more than $93 billion in cyber defenses by 2018. Congress is attempting to quickly to pass laws that will hope to improve the situation.
Despite increased spending and innovation in the cybersecurity market, there is every indication that the situation will only worsen. The number of unmanaged devices being introduced onto networks daily is increasing towards 20 billion in a few years. Attacks on Internet of Things (IOT) devices were up 280% in 2017. Traditional security solutions have not be effective in addressing these devices or in protecting them from hackers. Moving toward 2020 most attacks will be toward IOT devices.
The article explained that this IOT issue is changing the security game. Executives who are preparing to handle future cybersecurity challenges with the same mindset and tools that they’ve been using all along are setting themselves up for continued failure.
Top 5 cybersecurity facts, figures and statistics for 2017
This article was shocking. First of all between now and 2021 cyber-security spending will exceed 1 TRILLION. What is more amazing is that that 1 trillion is not enough as hackers will commit cyber-security crimes that will result in totals of over 6 trillion. I am curious how the numbers were calculated for those 2 stats. What did not surpise me is how the article detailed the amount of open security jobs and that the number of people using the internet will continue to increase rapidly. Lastly ransomware throughout the worldwide damage was roughly 5 billion. The article conclusion was very true: “During the next five years, cyber crime might become the greatest threat to every person, place and thing in the world.”
India’s Ethical Hackers Rewarded Abroad, Ignored at Home
It seems as India is producing an army of “ethical hackers”, who earn millions protecting foreign corporations and global tech giants from security issues but are largely ignored at home in India. The skills are either misunderstood or distrusted. India produces more ethical hackers, the ones who break into computer networks to expose, rather than exploit, weaknesses – than anywhere else in the world. An unwillingness to hire its homegrown hackers has backfired spectacularly for a number of Indian startups. This has forced a long-overdue rethink of attitudes toward cyber-security. Multi-national corporations like Facebook are hiring Indians who are highest ranked bug hunters, or those who get rewarded for finding red-flagging security loopholes. Companies have previously not compensated hackers accordingly or even appreciated them. Hence many have been going oversees for opportunities.
The ethics of Hacking 101
Professors are teaching students how to hack into pipelines, powerplants, and break into networks. Some Universities, such as Carnegie Mellon are even creating hacking teams. Teachers in the technology and hacking practice of what is loosely called “cyberoffense.” In a world in which businesses, the military and governments rely on computer systems that are potentially vulnerable, having the ability to break into those systems provides a strategic advantage. Ethics is a big issue in this field. Professors want to build an ethics component into their curriculum. Yet the academic community is not taking ethics seriously enough, and professors are not accepting responsibility for the potentially dangerous skills they are teaching. Some are only teaching students if the guarantee the student only takes a government job and would qualify to get clearance. This is the skill set learned will help society and our nation.
Most hacking skills are outside the realm of academia and students need to find ways to keep up in the world of cyberoffense. Students find vulnerabilities and agrees that it is dangerous to share vulnerabilities or exploits with anyone but the software vendor or the U.S. government. If sold in the free market it may get in the wrong hands.
Are Ethical Hackers the Alchemists of Our Time… The Masters of the Binary Evolution?
https://www.wired.com/insights/2014/01/ethical-hackers-alchemists-time-masters-binary-evolution/
Plenty of people envision hackers as evil people who intend to harm the innocent. Ethical Hackers are now kind of becoming the alchemists of the 21st century, they speak the language of code, the language that drives so much of our lives. Hackers speak many languages, but in principle what makes them alchemists — is they all speak the mysterious language of code. The coders, the developers, the designers, the user experience experts are driving our world. Ethical hackers speak the language of code that is the lingo that essentially is binding us all into one universal binary language. There are many sponsored hackathons and hacker events as there is a growing appreciation of their skill and expertise. Hackers are becoming the new elite, the solvers of some of societies largest issues and are cutting apps that are fundamentally changing the way we evolve and live today.