2013 Network threat Prediction: Cloud computing, search and mobile

Source: Internet
Author: User
Keywords Network threats cloud computing

Researchers at the Georgia Tech Information Security Center recently released a 2013-year network threat forecast detailing the most serious computer security problems they see in the coming year.

Cloud

The first list is: Use cloud computing for malicious purposes. The flexible configuration that allows legitimate business to quickly add or subtract computing power can also be used to quickly build a powerful zombie computer network to complete an attacker's various ulterior motives.

"If I were an attacker and I had a 0 vulnerability and the cloud provider didn't fix its vulnerabilities in time, it meant I could do all kinds of things," Yousef Khalidi, an outstanding engineer at Microsoft Windows Azure, said in the report. ”

Supply Chain

Researchers at the Georgia Tech University say global suppliers pose another security problem, possibly even more serious security issues. The ongoing debate over the safety of products produced by some Chinese companies, such as Huawei and ZTE, has left US companies worried that their systems may have a built-in backdoor that makes them vulnerable to attack. On the other hand, other reports say Chinese companies are also worried about the same problem with products produced in the United States.

According to the report, the problem is difficult to solve, and the researchers believe that the central reason for the problem is that the cost of monitoring from beginning to end is needed.

Search poisoning

The report also pointed out that companies should also pay special attention to search engine poisoning. While all kinds of black hat SEO and attacks on legitimate sites are serious security threats, researchers say tampering with the user's search history provides a new attack vector.

"If you attack a computer, the victim can always find a way to clean up the computer, and your attack is over," Wenke Lee said. "If you tamper with the user's search history and its online profile, then no matter where the victim is logged in, he will get a malicious search result." ”

Mobile Security

There is no doubt that mobile security is also an issue of concern, although the mobile threat has not yet reached a serious level. While the App store that publishes mobile apps offers the first layer of defense against many base phone malware, researchers say more aggressive fixes from OEMs and operators will help improve mobile security.

Solution

"These issues require joint efforts from all sectors," said Bo Rotoloni, director of the Network Technology and Information Security Laboratory at the Georgia Tech Institute. "Our best defense against growing cyber threats is to develop the best tools and strong policies through industry, academia and government, At the same time, strengthen education, improve people's safety awareness. The

Contact Us

The content source of this page is from Internet, which doesn't represent Alibaba Cloud's opinion; products and services mentioned on that page don't have any relationship with Alibaba Cloud. If the content of the page makes you feel confusing, please write us an email, we will handle the problem within 5 days after receiving your email.

If you find any instances of plagiarism from the community, please send an email to: info-contact@alibabacloud.com and provide relevant evidence. A staff member will contact you within 5 working days.

A Free Trial That Lets You Build Big!

Start building with 50+ products and up to 12 months usage for Elastic Compute Service

  • Sales Support

    1 on 1 presale consultation

  • After-Sales Support

    24/7 Technical Support 6 Free Tickets per Quarter Faster Response

  • Alibaba Cloud offers highly flexible support services tailored to meet your exact needs.