{"61507":{"#nid":"61507","#data":{"type":"news","title":"Georgia Tech Information Security Center Releases Cyber Threats Forecast for 2011","body":[{"value":"\u003Cp\u003EThe Georgia Tech Information Security Center (GTISC), a\nnational leader in information security research and education, today announced\nthe release of the GTISC Emerging Cyber Threats Report for 2011, outlining the\ntop three areas of security risk and concern for consumer and business Internet\nand computer users. The report was released today at the annual GTISC Security\nSummit on the Evolving Nature of Cyber Security Threats. The summit gathers\nleading industry and academic leaders who have distinguished themselves in the\nfield of cyber security.\u003C\/p\u003E\n\n\n\n\u003Cp\u003EAccording to the report, an increase in the number of mobile\nand networked devices provides an enticing target for cyber criminals to steal\ndata and thwart the functioning of systems in a variety of venues from\nhospitals to utility providers.\u003C\/p\u003E\n\n\n\n\u003Cp\u003EFor 2011, GTISC is forecasting three key cyber security\nareas where threats are expected to increase and evolve:\u003C\/p\u003E\n\n\n\n\u003Cul\u003E\u003Cli\u003ECyber Threats Targeting Physical Systems: As\ninfrastructure services such as electric grid and utilities become networked\nand connect to the Internet, they will face greater risk of disruption and\nmisuse. In addition, cyber attack is also a growing risk for healthcare systems\nas more medical offices and hospitals become connected. What\u2019s more, the speed\nof updating the security of devices in these environments may be hampered as\ndevices involved with such systems may be subject to regulatory guidelines.\u003C\/li\u003E\u003C\/ul\u003E\n\n\n\n\u003Cul\u003E\u003Cli\u003EBotnets: Specifically large-scale attacks that\nutilize more targeted malware to evade detection; in addition cyber criminals\nare now making more efficient use of malicious software and have been\nre-launching previously thwarted attacks. \u003C\/li\u003E\u003C\/ul\u003E\n\n\n\n\u003Cul\u003E\u003Cli\u003EMobile Devices and Social Networking: As more\nopen mobile device platforms grow in popularity and more applications become\navailable, these devices will become more attractive targets of attacks. In\naddition, cyber criminals are using Twitter and Facebook accounts to lure users\ninto handing over personal and sensitive information. \u003C\/li\u003E\u003C\/ul\u003E\n\n\n\n\u003Cp\u003E\u201cWe have to move away from the reactive mode of addressing\ncyber security threats and must proactively work to understand new threats and\ndevelop effective ways to contain them,\u201d said Mustaque Ahamad, director of\nGTISC. \u201cWe are doing this for several of the key threats outlined in the\nEmerging Threats report and we look forward to working with our partners to\nbuild a more secure cyber space.\u201d\u003C\/p\u003E\n\n\u003Cp\u003EMore than 400 corporate and industry leaders,\ntechnologists and cyber security experts from across the country are expected\nto attend the GTISC Security Summit on the Evolving Nature of Cyber Security\nThreats. The keynote will de delivered by Ken Silva, senior vice president and\nchief technology officer of VeriSign. Following the address, panelists will\ncommence a discussion and debate moderated by Rich DeMillo, distinguished\nprofessor and former dean of Georgia Tech\u2019s College of Computing. Panelists\ninclude: Paul Judge, chief scientist at Barracuda Networks; Chris Rouland,\nchief executive officer of Endgame Systems; David Aucsmith, senior director of the\nMicrosoft Institute for Advanced Technology in Governments; Greg Conti, U.S.\nMilitary Academy at West Point; David Dagon, post-doctoral fellow at Georgia\nTech; Marc Sachs, executive director of National Security and Cyber Policy at\nVerizon; and Val Rahmani, chief executive officer of Damballa. \u003C\/p\u003E\u003Cp\u003ETo obtain a copy of the report, either download the file on this page or go to \u003Ca href=\u0022http:\/\/www.gtisc.gatech.edu\/index.html\u0022 title=\u0022http:\/\/www.gtisc.gatech.edu\/index.html\u0022\u003Ehttp:\/\/www.gtisc.gatech.edu\/index.html\u003C\/a\u003E to download the report.\u003C\/p\u003E","summary":null,"format":"limited_html"}],"field_subtitle":"","field_summary":[{"value":"\u003Cp\u003EThe Georgia Tech\nInformation Security Center (GTISC), a national leader in information security\nresearch and education, today announced the release of the GTISC Emerging Cyber\nThreats Report for 2011, outlining the top three areas of security risk and\nconcern for consumer and business Internet and computer users. The report was\nreleased today at the annual GTISC Security Summit on the Evolving Nature of Cyber Security\nThreats.\u003C\/p\u003E","format":"limited_html"}],"field_summary_sentence":[{"value":"Hospitals and utilities may be vulnerable in the coming year."}],"uid":"27310","created_gmt":"2010-10-07 08:33:26","changed_gmt":"2016-10-08 03:07:34","author":"David Terraso","boilerplate_text":"","field_publication":"","field_article_url":"","dateline":{"date":"2010-10-07T00:00:00-04:00","iso_date":"2010-10-07T00:00:00-04:00","tz":"America\/New_York"},"extras":[],"hg_media":{"46038":{"id":"46038","type":"image","title":"Klaus building","body":null,"created":"1449174347","gmt_created":"2015-12-03 20:25:47","changed":"1475894409","gmt_changed":"2016-10-08 02:40:09","alt":"Klaus building","file":{"fid":"190089","name":"tuv62996.jpg","image_path":"\/sites\/default\/files\/images\/tuv62996_0.jpg","image_full_path":"http:\/\/hg.gatech.edu\/\/sites\/default\/files\/images\/tuv62996_0.jpg","mime":"image\/jpeg","size":40752,"path_740":"http:\/\/hg.gatech.edu\/sites\/default\/files\/styles\/740xx_scale\/public\/images\/tuv62996_0.jpg?itok=jbQqRtvf"}}},"media_ids":["46038"],"related_files":{"248616":{"fid":null,"name":"The Role of Sanctions in Curtailing Russia","file_path":"\/sites\/default\/files\/images\/Econ%20692%20x%20500%20%281384%20%C3%97%201000%20px%29%20%286%29.png","file_full_path":"http:\/\/hg.gatech.edu\/\/sites\/default\/files\/images\/Econ%20692%20x%20500%20%281384%20%C3%97%201000%20px%29%20%286%29.png","mime":"image\/png","size":1775188,"description":null}},"groups":[{"id":"1183","name":"Home"}],"categories":[{"id":"153","name":"Computer Science\/Information Technology and Security"}],"keywords":[{"id":"10872","name":"bots"},{"id":"344","name":"cyber"},{"id":"345","name":"cyber security"},{"id":"10835","name":"Facebook"},{"id":"2254","name":"gtisc"},{"id":"7772","name":"malware"},{"id":"167055","name":"security"},{"id":"314","name":"twitter"},{"id":"4292","name":"virus"}],"core_research_areas":[],"news_room_topics":[],"event_categories":[],"invited_audience":[],"affiliations":[],"classification":[],"areas_of_expertise":[],"news_and_recent_appearances":[],"phone":[],"contact":[{"value":"\u003Cp\u003EDavid Terraso\u003C\/p\u003E\u003Cp\u003ECommunications and Marketing\u003C\/p\u003E\u003Cp\u003EGeorgia Institute of Technology\u003C\/p\u003E\u003Cp\u003E404-385-2966\u003C\/p\u003E","format":"limited_html"}],"email":["david.terraso@comm.gatech.edu"],"slides":[],"orientation":[],"userdata":""}}}