New User? Need help? Click here to register for free! Registering removes the advertisements.

Computer Cops
image image image image image image image image
Donations
If you found this site helpful, please donate to help keep it online
Don't want to use PayPal? Try our physical address
image
Prime Choice
· Head Lines
· Advisories (All)
· Dnld of the Week!
· CCSP News Ltrs
· Find a Cure!

· Ian T's (AR 23)
· Marcia's (CO8)
· Bill G's (CO11)
· Paul's (AR 5)
· Robin's (AR 2)

· Ian T's Archive
· Marcia's Archive
· Bill G's Archive
· Paul's Archive
· Robin's Archive
image
Security Central
· Home
· Wireless
· Bookmarks
· CLSID
· Columbia
· Community
· Downloads
· Encyclopedia
· Feedback (send)
· Forums
· Gallery
· Giveaways
· HijackThis
· Journal
· Members List
· My Downloads
· PremChat
· Premium
· Private Messages
· Proxomitron
· Quizz
· RegChat
· Reviews
· Google Search
· Sections
· Software
· Statistics
· Stories Archive
· Submit News
· Surveys
· Top
· Topics
· Web Links
· Your Account
image
CCSP Toolkit
· Email Virus Scan
· UDP Port Scanner
· TCP Port Scanner
· Trojan TCP Scan
· Reveal Your IP
· Algorithms
· Whois
· nmap port scanner
· IPs Banned [?]
image
Survey
How much can you give to keep Computer Cops online?

$10 up to $25 per year?
$25 up to $50 per year?
$10 up to $25 per month?
$25 up to $50 per month?
More than $50 per year?
More than $50 per month?
One time only?
Other (please comment)



Results
Polls

Votes: 989
Comments: 20
image
Translate
English German French
Italian Portuguese Spanish
Chinese Greek Russian
image
image prvy: Security HeadLines: Will Computing Be More Secure in 2004? image
Privacy
Will Computing Be More Secure in 2004?
Spammers will get more creative and worms will worsen, one expert predicts.
Peter H. Gregory,
Computerworld
Friday, January 02, 2004

In 2004, information security professionals will experience more of the darker side of human behavior, but organizations will also take more control over their network and computing infrastructures, particularly end-user systems.

Here are my predictions on what to expect in information security in the next year.

R.a..n,d,o,m P,u,,n,c.t,,u_a.t.1..0.n
Spam operators are getting more creative in their efforts to get around spam filters. R.a..n,d,o.,m p,u,,n,c.t,,u_a.t.1..0.n makes it nearly impossible to block spam messages by filtering keywords. Operators are changing to GIF (Graphics Interchange Format) images with no searchable text. Some spammers send messages in encoded formats, like Base64, to circumvent keyword filters altogether, and relay through IP addresses that have no Domain Name System domains associated with them. These recent developments are challenging spam-filter vendors and frustrating users.

More organizations will quantify the productivity losses and processing costs incurred by spam. Increasingly, IT security departments will be saddled with solving the problem, since it's a content-management issue.

Consumer and office-worker definitions of spam will shift, thanks to the capabilities found on desktop spam-control products. Spam, once the domain of unsolicited junk e-mail, will become plain unwanted e-mail. Mail I requested last week is spam this week. A worker who subscribes to a mailing list in January will no longer want it in April. It will be easier to mark the message as spam than it will be to unsubscribe to the list. The messages will keep on flowing--at the user's request--but will be blocked before the user sees it.


Filtered Content
Speaking of productivity, larger organizations will get more serious about managing and filtering employee access to Web sites. Three justifications will dominate: productivity, security, and legal liability. I'll explain these in more detail.

A handful of sexual harassment lawsuits have been filed by employees who happen to see their colleagues surfing porn sites at work. Employees sue the employer for the distress of seeing these images and for the employer's failure to do anything about it.


Desktop Control
Enterprises will begin to clamp down on users' ability to install software and make other configuration changes to their desktop systems. Windows 2000 had this capability, but thanks to the relatively uncontrollable Windows 95 and 98 platforms, users are accustomed to owning their desktop/laptop systems, with the ability to make systems configuration changes and install, update, or remove software at will.

Unpopular as it will be, this has to change if IT is to regain control of its environment. A sizable portion of IT help-desk call volume is associated with power users misconfiguring their systems and the problems brought about by non-IT-approved software. As a result, fewer users will have administrator privileges on their systems.

You may ask, what does desktop management have to do with security? An environment that lacks integrity (such as one where PC users are able to make configuration changes at will) will suffer a corresponding reduction in security, because users' changes will sometimes make their workstations more vulnerable, and in other cases, user changes may be downright malicious.


Personal Protection
Thanks to Blaster, Nachi, and perhaps another worm in the final weeks of 2003, personal firewall software on end-user systems will finally get traction. Many companies found that these worms got into their networks via infected laptops that didn't have firewall software. The laptops became infected when connected to the Internet at home, where there was no firewall to protect them.

Senior managers who want to keep their jobs by avoiding a repeat of 2003 are funding enterprise-wide personal firewall deployments. Now let's hope they will be able to manage the firewalls effectively and still retain the ability to manage the PCs.


Flash Fixes
One or more major companies will attempt to ban the use of Universal Serial Bus flash drives on the grounds that unscrupulous employees are using them to leak proprietary information. The result will be embarrassing, negative publicity for a policy that's ineffective in the first place.

Seriously, though, this is a problem for organizations. Many will begin to understand that the problem isn't with the technology, it's with the people!


Wi-Fi Worries
There will be at least one well-publicized break-in to a corporate Wi-Fi network. The cause of this attack will either be that the network was supported by IT but poorly protected, or a rogue access point was installed by an unauthorized employee. Regardless, the incident will shed light on this still-neglected vulnerability and spur companies into action.


Bluetooth Uses and Abuses
The same people who hack computers, send spam, make Pringle-can antennas, and drive funny cars will discover Bluetooth and begin to experiment with its uses and abuses. Negative publicity may cause Bluetooth to go back to the drawing board.

Does any of this sound familiar? Will hackers build high-gain Bluetooth antennas from discarded ChapStick dispensers? And what will Bluetooth hacking be called? War nibbling? Bluejacking? Why someone would want to carry out such acts within six feet of a potential victim is beyond me, but people with too much time on their hands will figure this out, you can be sure of it.


Hacking Goes Mobile
Mobile phones are acting a lot more like wireless data terminals with very lightweight operating systems. We're building another monoculture, this time on almost-free devices that may outnumber PCs in a couple of years. Perhaps in 2004, we'll see more malicious code attacks than in years past.


IM Incidents
Internet-based instant-messaging services by America Online, MSN, and Yahoo are in wide use inside large corporations whose IT departments may be unaware of the extent of IM use and are unable or unwilling to stop it. In most cases, corporate IT has no centralized control over IM.

But the greatest concern should be that corporate messages sent via IM are traversing the Internet with no encryption. Any eavesdropper can see all of the messages flying by. I think there will be at least one well-publicized incident wherein a hacker publicizes a big company's proprietary information sent via IM.


Public Break-In
Many public utilities have connected their SCADA infrastructure to the Internet. It must have seemed like a good idea at the time. SCADA stands for Supervisory Control and Data Acquisition. It's the mechanism that utilities use to monitor and control substations, water systems and power plants. I think that in 2004, a break-in to a public utility's SCADA system will be publicized.


Organized Defense
The FBI and the U.S. Secret Service have made tremendous progress in their ability to track down and apprehend cybercriminals. Cooperation through public/private partnerships such as InfraGard will likewise improve. Those of us on the good side of security have a vested interest in the success of these efforts.


Organized Crime
We're already seeing this in Eastern Europe, South America, and Southeast Asia: Gangs of hackers extort money from Web site operators and Internet service providers that are unable to defend themselves from denial-of-service attacks. Sadly, we're sure to see an increase in this sort of activity. Hacking for protection money and other sources of revenue will become a big business synonymous with drug and credit card trafficking.

Someday, in 2004 or beyond, I think we'll see standard language incorporated into many of the standard treaties between countries that will make it easier to identify and apprehend cybercriminals. Today, it's far too easy for these perpetrators to hide themselves in countries unwilling or unable to ferret them out.


Shorter Time to Exploitation
This is a fancy term that refers to the length of time (previously measured in calendar quarters, now measured in days or hours) it takes for hackers to build proof-of-concept worms or viruses that exploit recently announced Microsoft (and other vendors') security vulnerabilities.

No kidding, you are probably thinking, everyone knows this. But I have placed this section immediately following organized crime for a reason. I daresay Microsoft recognized this when it developed its Anti-Virus Reward Program. The company is simply balancing the profit motive to even the score.


In Summary
There are three themes that I hope you've picked up on before getting to this paragraph. First, it's not necessarily a good idea to connect something to the Internet just because you can. Second, whenever a new technology comes out, its developers generally do a poor job of designing security into it, but we embrace it anyway. And third, whenever a new technology is available to do good things, there's always someone who figures out how to do something bad with it that the rest of us never thought of.

More at PCWorld
Posted on Saturday, 03 January 2004 @ 18:23:05 EST by phoenix22
image

 
Login
Nickname

Password

· New User? ·
Click here to create a registered account.
image
Related Links
· TrackBack (0)
· Microsoft
· Microsoft
· Themes.org
· HotScripts
· W3 Consortium
· Spam Cop
· America Online
· More about Privacy
· News by phoenix22


Most read story about Privacy:
Ad-aware 6 Release from Lavasoft

image
Article Rating
Average Score: 5
Votes: 1


Please take a second and vote for this article:

Bad
Regular
Good
Very Good
Excellent


image
Options

Printer Friendly Page  Printer Friendly Page

image
"Login" | Login/Create an Account | 0 comments
Threshold
The comments are owned by the poster. We aren't responsible for their content.

No Comments Allowed for Anonymous, please register