<node id="61507">
  <nid>61507</nid>
  <type>news</type>
  <uid>
    <user id="27310"><![CDATA[27310]]></user>
  </uid>
  <created>1286440406</created>
  <changed>1475896054</changed>
  <title><![CDATA[Georgia Tech Information Security Center Releases Cyber Threats Forecast for 2011]]></title>
  <body><![CDATA[<p>The Georgia Tech Information Security Center (GTISC), a
national leader in information security research and education, today announced
the release of the GTISC Emerging Cyber Threats Report for 2011, outlining the
top three areas of security risk and concern for consumer and business Internet
and computer users. The report was released today at the annual GTISC Security
Summit on the Evolving Nature of Cyber Security Threats. The summit gathers
leading industry and academic leaders who have distinguished themselves in the
field of cyber security.</p>



<p>According to the report, an increase in the number of mobile
and networked devices provides an enticing target for cyber criminals to steal
data and thwart the functioning of systems in a variety of venues from
hospitals to utility providers.</p>



<p>For 2011, GTISC is forecasting three key cyber security
areas where threats are expected to increase and evolve:</p>



<ul><li>Cyber Threats Targeting Physical Systems: As
infrastructure services such as electric grid and utilities become networked
and connect to the Internet, they will face greater risk of disruption and
misuse. In addition, cyber attack is also a growing risk for healthcare systems
as more medical offices and hospitals become connected. What’s more, the speed
of updating the security of devices in these environments may be hampered as
devices involved with such systems may be subject to regulatory guidelines.</li></ul>



<ul><li>Botnets: Specifically large-scale attacks that
utilize more targeted malware to evade detection; in addition cyber criminals
are now making more efficient use of malicious software and have been
re-launching previously thwarted attacks. </li></ul>



<ul><li>Mobile Devices and Social Networking: As more
open mobile device platforms grow in popularity and more applications become
available, these devices will become more attractive targets of attacks. In
addition, cyber criminals are using Twitter and Facebook accounts to lure users
into handing over personal and sensitive information. </li></ul>



<p>“We have to move away from the reactive mode of addressing
cyber security threats and must proactively work to understand new threats and
develop effective ways to contain them,” said Mustaque Ahamad, director of
GTISC. “We are doing this for several of the key threats outlined in the
Emerging Threats report and we look forward to working with our partners to
build a more secure cyber space.”</p>

<p>More than 400 corporate and industry leaders,
technologists and cyber security experts from across the country are expected
to attend the GTISC Security Summit on the Evolving Nature of Cyber Security
Threats. The keynote will de delivered by Ken Silva, senior vice president and
chief technology officer of VeriSign. Following the address, panelists will
commence a discussion and debate moderated by Rich DeMillo, distinguished
professor and former dean of Georgia Tech’s College of Computing. Panelists
include: Paul Judge, chief scientist at Barracuda Networks; Chris Rouland,
chief executive officer of Endgame Systems; David Aucsmith, senior director of the
Microsoft Institute for Advanced Technology in Governments; Greg Conti, U.S.
Military Academy at West Point; David Dagon, post-doctoral fellow at Georgia
Tech; Marc Sachs, executive director of National Security and Cyber Policy at
Verizon; and Val Rahmani, chief executive officer of Damballa. </p><p>To obtain a copy of the report, either download the file on this page or go to <a href="http://www.gtisc.gatech.edu/index.html" title="http://www.gtisc.gatech.edu/index.html">http://www.gtisc.gatech.edu/index.html</a> to download the report.</p>]]></body>
  <field_subtitle>
    <item>
      <value><![CDATA[]]></value>
    </item>
  </field_subtitle>
  <field_dateline>
    <item>
      <value>2010-10-07T00:00:00-04:00</value>
      <timezone><![CDATA[America/New_York]]></timezone>
    </item>
  </field_dateline>
  <field_summary_sentence>
    <item>
      <value><![CDATA[Hospitals and utilities may be vulnerable in the coming year.]]></value>
    </item>
  </field_summary_sentence>
  <field_summary>
    <item>
      <value><![CDATA[<p>The Georgia Tech
Information Security Center (GTISC), a national leader in information security
research and education, today announced the release of the GTISC Emerging Cyber
Threats Report for 2011, outlining the top three areas of security risk and
concern for consumer and business Internet and computer users. The report was
released today at the annual GTISC Security Summit on the Evolving Nature of Cyber Security
Threats.</p>]]></value>
    </item>
  </field_summary>
  <field_media>
          <item>
        <nid>
          <node id="46038">
            <nid>46038</nid>
            <type>image</type>
            <title><![CDATA[Klaus building]]></title>
            <body><![CDATA[]]></body>
                          <field_image>
                <item>
                  <fid>190089</fid>
                  <filename><![CDATA[tuv62996.jpg]]></filename>
                  <filepath><![CDATA[/sites/default/files/images/tuv62996_0.jpg]]></filepath>
                  <file_full_path><![CDATA[http://hg.gatech.edu//sites/default/files/images/tuv62996_0.jpg]]></file_full_path>
                  <filemime>image/jpeg</filemime>
                  <image_740><![CDATA[]]></image_740>
                  <image_alt><![CDATA[Klaus building]]></image_alt>
                </item>
              </field_image>
            
                      </node>
        </nid>
      </item>
      </field_media>
  <field_contact_email>
    <item>
      <email><![CDATA[david.terraso@comm.gatech.edu]]></email>
    </item>
  </field_contact_email>
  <field_location>
    <item>
      <value><![CDATA[]]></value>
    </item>
  </field_location>
  <field_contact>
    <item>
      <value><![CDATA[<p>David Terraso</p><p>Communications and Marketing</p><p>Georgia Institute of Technology</p><p>404-385-2966</p>]]></value>
    </item>
  </field_contact>
  <field_sidebar>
    <item>
      <value><![CDATA[]]></value>
    </item>
  </field_sidebar>
  <field_boilerplate>
    <item>
      <nid><![CDATA[]]></nid>
    </item>
  </field_boilerplate>
  <!--  TO DO: correct to not conflate categories and news room topics  -->
  <!--  Disquisition: it's funny how I write these TODOs and then never
         revisit them. It's as though the act of writing the thing down frees me
         from the responsibility to actually solve the problem. But what can I
         say? There are more problems than there's time to solve.  -->
  <links_related> </links_related>
  <files> </files>
  <og_groups>
          <item>1183</item>
      </og_groups>
  <og_groups_both>
          <item>
        <![CDATA[Computer Science/Information Technology and Security]]>
      </item>
      </og_groups_both>
  <field_categories>
          <item>
        <tid>153</tid>
        <value><![CDATA[Computer Science/Information Technology and Security]]></value>
      </item>
      </field_categories>
  <core_research_areas>
      </core_research_areas>
  <field_news_room_topics>
      </field_news_room_topics>
  <links_related>
      </links_related>
  <files>
          <item>
        <fid><![CDATA[The Role of Sanctions in Curtailing Russia]]></fid>
        <filename><![CDATA[The Role of Sanctions in Curtailing Russia]]></filename>
        <filepath><![CDATA[/sites/default/files/images/Econ%20692%20x%20500%20%281384%20%C3%97%201000%20px%29%20%286%29.png]]></filepath>
        <filemime><![CDATA[image/png]]></filemime>
        <filesize><![CDATA[1775188]]></filesize>
        <description><![CDATA[]]></description>
      </item>
      </files>
  <og_groups>
          <item>1183</item>
      </og_groups>
  <og_groups_both>
          <item><![CDATA[Home]]></item>
      </og_groups_both>
  <field_keywords>
          <item>
        <tid>10872</tid>
        <value><![CDATA[bots]]></value>
      </item>
          <item>
        <tid>344</tid>
        <value><![CDATA[cyber]]></value>
      </item>
          <item>
        <tid>345</tid>
        <value><![CDATA[cyber security]]></value>
      </item>
          <item>
        <tid>10835</tid>
        <value><![CDATA[Facebook]]></value>
      </item>
          <item>
        <tid>2254</tid>
        <value><![CDATA[gtisc]]></value>
      </item>
          <item>
        <tid>7772</tid>
        <value><![CDATA[malware]]></value>
      </item>
          <item>
        <tid>167055</tid>
        <value><![CDATA[security]]></value>
      </item>
          <item>
        <tid>314</tid>
        <value><![CDATA[twitter]]></value>
      </item>
          <item>
        <tid>4292</tid>
        <value><![CDATA[virus]]></value>
      </item>
      </field_keywords>
  <field_userdata><![CDATA[]]></field_userdata>
</node>
