Advertisement
Guest User

Untitled

a guest
Apr 22nd, 2018
99
0
Never
Not a member of Pastebin yet? Sign Up, it unlocks many cool features!
text 4.08 KB | None | 0 0
  1. Theme 1: Disruption of an over-reliance on fragile connectivity
  2. Premeditated internet outages bring trade to its knees
  3. : As Technology becomes more and more integrated into life and everything around us we need to be prepared for it all to come crashing down unless we risk losing everything. As we reach a point where attacks could cause massive outages and damage to systems that require constant connectivity, there always needs to be a backup system(s) in place to use until they are repaired.
  4. Ransomware hijacks the internet of things
  5. : As every-day household items and office equipment become "smart" they also require a network connection. With that comes more vulnerability as items such as smart bulbs and appliances don't always have the best security built into them. These devices are not only easy to hack into they also become tears and holes in network security if not handled properly and are dangerous if left uncontrolled.
  6. Privileged insiders coerced into giving up the crown jewels
  7. : With trust between employees and internal secrets not only confined to systems throughout the infrastructure of a company but also in the hands of admins, network support and anyone with the need for said info. This is making it more and more simple to find information (or a way to get to it) through workers. Companies need to layout measures in-order to protect people with sensitive info.
  8. Theme 2: Trust in the integrity of information is lost to distortion
  9. Automated misinformation gains instant credibility
  10. : AI and chatbots are becoming harder and harder to distinguish from real users. It is becoming more and more common to see mass waves of them flooding the social media and online resources with misinformation. This can be used to spread falsified claims against people and groups and there isn't much that can be done to stop it.
  11. Falsified information compromises performance
  12. : It is becoming more and more common to see organizations rely on collected data to drive decision-making. This adds a weak point in the system as misinformation can usually be added to the mix with malicious intent. This can affect any system that requires feedback to remain automated. Counterfeit or distorted data can and will skew results and could cause havoc over time. Preparations need to start now to ensure information risk assessments address the likelihood and impact of attacks on integrity.
  13. Subverted blockchains shatter trust
  14. : Blockchains are becoming more and more, a replacement for third-party accounting and transactions (ea. PayPal), is becoming more and more popular and many companies are considering switching over. This could be great for companies looking to get rid of the middle man, but as always there’s a catch. Like any other technology, blockchains are vulnerable to compromise. There will need to be extra attention paid towards the building and continued maintenance of these blockchains.
  15.  
  16. Theme 3: Deterioration when controls are eroded by regulations and technology
  17. Surveillance laws expose corporate secrets
  18. : As technology expands and advances, so will the governments and communities that use them. Some have already begun collecting and storing data related to voice communications to monitor for terrorism and other illegal activities. And, while this could lead to a safer and cleaner community, it is also likely that this information won't be adequately protected from attackers looking to exploit the data leading to a negative impact to those affected.
  19. Privacy regulations impede the monitoring of insider threats
  20. : In 2015 McAfee (a popular cybersecurity application) did a study on data branches and discovered almost half of them were inside jobs. User Behavior Analytics Tools are just about the only way companies can guard themselves against these types of attacks. Unfortunately, new privacy regulations are showing up around the world that could all but break these tools and leave companies out in the open. They are going to need to increase their own security measures and make employees even more aware of these rising issues.
  21. A headlong rush to deploy AI leads to unexpected outcomes
  22. :
Advertisement
Add Comment
Please, Sign In to add comment
Advertisement