{"51395":{"#nid":"51395","#data":{"type":"news","title":"GTISC Releases 2008 Cyber Threats Forecast","body":[{"value":"\u003Ch2\u003ESocial Networking Attacks, Web 2.0 Vulnerabilities and Threats to Mobile Networks are among Next Year\u2019s High-Risk Areas for Internet Users\u003C\/h2\u003E\n\u003Cp\u003E\u003Cbr \/\u003EATLANTA (October 2, 2007) \u2013 The Georgia Tech Information Security Center (GTISC), a national leader in information security research and education, today announced the release of the GTISC Emerging Cyber Threats Report for 2008. As the inaugural edition of this annual forecasting report, the GTISC Emerging Cyber Threats Report for 2008 outlines the top five areas of security concern and risk for consumer and enterprise Internet users for the coming year. The report was released at the annual GTISC Security Summit on Emerging Cyber Security Threats and Countermeasures \u2013 a gathering of industry and academic leaders from organizations with a stake in protecting the online user community including Google, the College of Computing at Georgia Tech, the National Security Agency (NSA), IBM Internet Security Systems (ISS), McAfee, Secure Computing, S.P.I. Dynamics, Inc. and Symantec.\u003C\/p\u003E\n\u003Cp\u003EFor 2008, GTISC is forecasting five key areas in which cyber security threats are expected to increase and evolve:\u003C\/p\u003E\n\u003Cul\u003E\n\u003Cli\u003EWeb 2.0 and Client-Side Attacks \u2013 including social networking attacks and new attacks that will exploit Web 2.0 vulnerabilities\u003C\/li\u003E\n\u003Cli\u003ETargeted Messaging Attacks \u2013 including Instant Messaging attacks and malware propagation via online video-sharing\u003C\/li\u003E\n\u003Cli\u003EBotnets \u2013 specifically the spread of botnet attacks to wireless and peer-to-peer networks\u003C\/li\u003E\n\u003Cli\u003EThreats Targeting Mobile Convergence \u2013 including voice spam, vishing and smishing\u003C\/li\u003E\n\u003Cli\u003EThreats to Radio Frequency Identification (RFID) Systems \u2013 evolving and varied threats in this emerging technology sector\u003C\/li\u003E\n\u003C\/ul\u003E\n\u003Cp\u003EFinancial gain will continue to be the primary motivator behind all five emerging threat categories. As the rapid rate of application development for cyber mediums continues to outpace information security technologies and countermeasures, GTISC advocates closer coordination between the security industry, carriers, Internet Service Providers (ISPs), application developers and the user community to begin closing the security gap in 2008. Representatives from the organizations that participated in the GTISC Security Summit contributed to the development of this report.\u003C\/p\u003E\n\u003Cp\u003E\u0022As newer and more powerful applications enabled by technologies like Web 2.0 continue to grow, and converged communications applications increasingly rely on IP-based platforms, new challenges will arise in safegaurding these applications and the services they rely on,\u0022 said Mustaque Ahamad, director of GTISC. \u0022The GTISC Emerging Cyber Threats Report for 2008 highlights those areas of greatest risk and concern, particularly as continued convergence of enterprise and consumer technologies is expected over the coming year. We wish to thank the esteemed members of the GTISC Security Summit panel who assisted us with the creation of this report.\u0022\u003C\/p\u003E\n\u003Cp\u003EMore than 200 corporate executives, industry leaders and technologists from across the country attended the GTISC Security Summit on Emerging Cyber Security Threats and Countermeasures Summit, keynoted by Dr. Vint Cerf, vice president and chief Internet evangelist at Google. Following Cert\u2019s address on the continued research and development needs to secure the multi-layered systems of the Internet, Summit panelists engaged in a lively discussion moderated by Chris Rouland, chief technology officer of IBM Internet Security Systems and IBM distinguished engineer. The panel discussion helped educate the audience on the proliferation of cyber threats, including those listed in the report, and highlighted possible countermeasures to safeguard the user and business communities. \u003C\/p\u003E\n\u003Cp\u003E\u003Ca href=\u0022http:\/\/www.gtisc.gatech.edu\/pdf\/GTISC%20Cyber%20Threats%20Report.pdf\u0022\u003ERead the entire report\u003C\/a\u003E\u003C\/p\u003E\n\u003Cp\u003E\u003Ca href=\u0022http:\/\/www.gtisc.gatech.edu\u0022\u003EVisit the GTISC Website\u003C\/a\u003E\u003C\/p\u003E\n\u003Cp\u003E\u003Ca href=\u0022http:\/\/www.gtisc.gatech.edu\/summit1007_webcast.html\u0022\u003EWatch a pre-recorded Web cast of the event\u003C\/a\u003E \u003C\/p\u003E\n\u003Ch3\u003EAbout Georgia Tech Information Security Center (GTISC)\u003C\/h3\u003E\n\u003Cp\u003EThe Georgia Tech Information Security Center, a National Center of Academic Excellence in Information Assurance Education, is an interdisciplinary center involving faculty from the College of Computing, School of Electrical and Computer Engineering, Georgia Tech Research Institute (GTRI), the Sam Nunn School of International Affairs and the School of Public Policy.\u003C\/p\u003E","summary":null,"format":"limited_html"}],"field_subtitle":"","field_summary":[{"value":"\u003Cp\u003EThe GTISC Emerging Cyber Threats Report for\n2008, released at the annual GTISC Security Summit on\nEmerging Cyber Security Threats and Countermeasures, outlines the top five areas of security concern and risk for consumer and\nenterprise Internet users for the coming year.\u003C\/p\u003E","format":"limited_html"}],"field_summary_sentence":"","uid":"27154","created_gmt":"2010-02-09 21:43:50","changed_gmt":"2016-10-08 03:04:46","author":"Louise Russo","boilerplate_text":"","field_publication":"","field_article_url":"","dateline":{"date":"2007-10-02T00:00:00-04:00","iso_date":"2007-10-02T00:00:00-04:00","tz":"America\/New_York"},"extras":[],"groups":[{"id":"47223","name":"College of Computing"}],"categories":[],"keywords":[{"id":"8424","name":"information_security"}],"core_research_areas":[],"news_room_topics":[],"event_categories":[],"invited_audience":[],"affiliations":[],"classification":[],"areas_of_expertise":[],"news_and_recent_appearances":[],"phone":[],"contact":[],"email":[],"slides":[],"orientation":[],"userdata":""}}}