dcsimg

Advanced Persistent Threats

  • Advanced Persistent Threats-

    Some of the other concerns surrounding emerging threats to critical infrastructure and business in general include the move to cloud com­puting, the transition from IPv4 to IPv6, computing monocultures and hardware supply chains. Cloud computing is still relatively ill-defined yet highly complex, presenting a giant target for adversaries.

    “The cloud complicates today’s traditional defensive techniques,” said Hensley. “A threat actor could build infrastructure in the cloud using highly available on-line developer tools, then use it to command-and-control exploited computers by hiding in what we thought was benign traffic.”

1 | 2 | 3 | 4 | 5 | 6 | 7 | 8 | 9 | 10 | 11 | 12 | 13 | 14 | 15 | 16 | 17 | 18

Advanced Persistent Threats

  • 1 | 2 | 3 | 4 | 5 | 6 | 7 | 8 | 9 | 10 | 11 | 12 | 13 | 14 | 15 | 16 | 17 | 18
  • Advanced Persistent Threats-16

    Some of the other concerns surrounding emerging threats to critical infrastructure and business in general include the move to cloud com­puting, the transition from IPv4 to IPv6, computing monocultures and hardware supply chains. Cloud computing is still relatively ill-defined yet highly complex, presenting a giant target for adversaries.

    “The cloud complicates today’s traditional defensive techniques,” said Hensley. “A threat actor could build infrastructure in the cloud using highly available on-line developer tools, then use it to command-and-control exploited computers by hiding in what we thought was benign traffic.”

In the past year, we have witnessed cyber attacks of unprecedented sophistication and reach. These attacks demonstrate that malicious actors have the ability to com­promise and control millions of computers that belong to governments, private enterprises and ordinary citizens. If we are going to prevent motivated adversaries from attack­ing our systems, stealing our data and harming our critical infrastructure, the broader community of security research­ers — including academia, the private sector and govern­ment — must work together to understand emerging threats and to develop proactive security solutions to safeguard the Internet and physical infrastructure that relies on it.

This slideshow features emerging cyber threats for 2012, identified by the Georgia Tech Information Security Center and the Georgia Tech Research

Institute.

More

Slideshows

:


Ten Apple Apps for BusinessApple apps to help increase business productivity.

Top Eight Features in Windows Server 8 Windows Server 8 is a technically sophisticated operating system that is crammed with features that bring many previously enterprise-only capabilities to small and mid-sized businesses.

Seven Points CIOs Must Know About the Board of Directors Seven areas that CIOs must understand and act upon in order to effectively work with the board.