Computerworld Malaysia presents, in completely random order, extracts of interviews and commentaries from industry leaders, which include some of the key challenges and opportunities for the ICT sector in Malaysia in 2015.
Though industry drivers are more interconnected than ever, the responses have been loosely grouped into 'episodes' with the following themes: National Enterprise & Talent; App Development, Mobile & Social; Cloud, Networking & Data Centres; Big Data Analytics & IoT; and Cybersecurity.
While "security is a growing concern across all ICT areas and industry sectors" has become a cliché - perhaps fuelled by the current fashion to break down the security conversation into different themes such as Internet of Things [IoT], social and mobility, and even different industry sectors - it can be still useful to tackle the threat landscape as a whole - as the Security of Everything.
Nigel Tan, Director of Systems Engineering, Symantec Malaysia (pic) starts this segment with some overall predictions from Symantec and Norton:
1. Attacks on the Internet of Things (IoT) will focus on smart home automation: With smart home automation gaining popularity amongst consumers across Asia Pacific and Japan, Symantec anticipates that commoditized "plug and play" consumer devices such as CCTV cameras and remote access controls for alarms, lighting and climate control will be exploited by cybercriminals.
While the embedded and small devices continue to become more prevalent, unfortunately not many of these devices are deployed with internet security in mind. These devices tend to have limited memory and system resources and do not have the computing power of a typical desktop.
Obviously there is a search engine that allows people to do an online search for Internet-enabled devices, ranging from security cameras, to cars, home heating systems and more. Although the search engine does not reveal vulnerabilities, it makes it easier for IoT devices to be found, which cybercriminals can then target and exploit. For instance, the recent news about Insecam.com, a website believed to be from Russia, is broadcasting feeds from or IP cameras all over the world.
That said, we won't see any large-scale attacks leveraging IoT, but instead one-off attacks against connected devices such as home routers, Smart TVs and connected car apps, for example, for sensitive and private information.
2. Privacy will continue to be sacrificed for mobile apps: We believe that some mobile users will continue to trade their privacy in exchange for mobile apps. While many Internet users are reluctant to share banking and personal identifiable information online, others are willing to share information about their location, and mobile device battery life as well as allow access to photos, contact lists and fitness information, all in exchange for mobile apps.
In addition, many consumers really don't know what they are agreeing to when downloading apps. For example, Norton Research has shown that while Millennials may think they know what they are allowing access to, the reality is they have very little idea of what they are agreeing to when it comes to trading information for apps.
3. Mobile devices will become even more attractive targets: Mobile devices will continue to become a target for cyber attackers especially when mobile devices store up a trove of personal and confidential information and are left switched on all the time, making them the perfect targets for attackers.
Mobile devices will become even more valuable as mobile carriers and retail stores transition to mobile payments. For example, Apple Pay certainly addresses some of the weaknesses that have facilitated recent attacks on PoS systems. However, this should not be cause for complacency, since attackers will usually look for other weaknesses once an avenue of attack has been closed off. Should Apple Pay take off as a payment method, attackers are likely to rigorously test the security in place around near field communication (NFC) payments.
4. Scammers will continue to run profitable ransomware scams: According to Symantec's Internet Security Threat Report, ransomware attacks grew by 500 percent and turned vicious in the latter part of 2013. This growth was largely due to the success of Ransomcrypt, commonly known as Cryptolocker. This threat is designed to encrypt a user's files and request a ransom for the files to be unencrypted.
Ransomware causes even more damage to businesses where not only the victims' files are encrypted but also files on shared or attached network drives. Holding encrypted files for ransom is not entirely new, but getting the ransom paid has previously proven problematic for the crooks. However recently ransomware makers have started leveraging online and electronic payment systems such as Bitcoins, Webmoney, Ukash, greendot (MoneyPak) to get around this challenge.
Crooks like the relative anonymity and convenience of electronic payments and these are already readily available, putting businesses and consumers at greater risk from losing data, files or memories.
5. The prominent data leaks of 2014 will keep cybersecurity in the spotlight in 2015: With the interconnected nature of a global internet and cloud infrastructures, cross-border flow of data is unavoidable and needs to be appropriately addressed. 2015 will see the evolution of the Personal
Data Protection Act especially in the Asia Pacific region as it makes a real impact in people's lives, towards ensuring that individuals and organisations have the right mindset with regards to online security and cybercrime prevention.
6. Distributed denial-of-service (DDoS) will continue to rise as a threat: Yet another trend seen in 2014 is the increase in Unix servers being compromised and their high bandwidth being used in DDoS attacks. The motivation of the attacker can vary widely, with hacktivism, profit, and disputes being the main reasons. Considering the ease of conducting large DDoS attacks, Symantec expects that the DDoS growth trend will continue in the future. The likelihood of being targeted by short but intensive DDoS attacks is rising.
7. Machine learning will be a game changer in the fight against cybercrime: A new generation of business platforms is emerging from the convergence of machine learning and big data and it will be a game changer in cybersecurity. Machine learning is a form of deep learning that may be considered as the first step in artificial intelligence. There is a critical need to stay "proactive" against threats, instead of reacting to them and machine learning will help security vendors stay on step ahead of cybercriminals. The ability for machine learning to predict cyberattacks will improve detection rates and may just be the key that reverses the trend on cybercrime.
8. User behaviour will take centre stage as security moves beyond passwords: With the password system constantly under attack by cybercriminals, security vendors and providers are facing increasing challenges on ways to balance the need for convenience against complexity while providing users with the seamless experience that they demand. Adopting multi-factor authentication techniques such as one-time passwords or iris and fingerprint scanning may provide alternate safeguard methods, but at times they may not be the safest options. The true solution to protecting valuable information lies in users' behaviour, which is ultimately how we can prevent our personal online assets and identities from being compromised.
9. The Cloud will take us to Infinity and Beyond: In 2015, we expect to see more and more data hosted in the cloud but as this move occurs, businesses will need to take a closer look at data governance and ensuring their data is cleaned before it is hosted in the cloud. Legacy data left unmanaged will continue to accumulate and present a persistent challenge for businesses. For consumers, the cloud in 2015 represents an infinite amount of personal information being hosted remotely and debate around the right to access, control, and protect private data in the cloud will continue to escalate.
10. The front lines of cybersecurity will be strengthened by closer industry partnerships and collaborations: The fight against cybercrime cannot be won alone and the security industry together with telecommunication providers and governments from around the world are joining forces to beat the war on cybercrime. The security industry is one of few in the world that has a 'nemesis industry' constantly working against it to bring it down. That's why beating the war on cybercrime requires a different approach.
For example, while in 2015, attackers will continue to look for new vulnerabilities so that they can "hack the planet", open source platforms will continue to address these vulnerabilities through greater industry coordination, collaboration and response. We see this as a positive sign and Symantec believes that open source platforms can only get better in the future.
Sign up for Computerworld eNewsletters.