{"71844":{"#nid":"71844","#data":{"type":"news","title":"GTISC Releases Emerging Cyber Threats Forecast","body":[{"value":"\u003Cp\u003EThe Georgia Tech Information Security Center (GTISC), a national leader in information security research and education, today announced the release of the GTISC Emerging Cyber Threats Report for 2008. As the inaugural edition of this annual forecasting report, the GTISC Emerging Cyber Threats Report for 2008 outlines the top five areas of security concern and risk for consumer and enterprise Internet users for the coming year. The report was released at the annual GTISC Security Summit on Emerging Cyber Security Threats and Countermeasures - a gathering of industry and academic leaders from organizations with a stake in protecting the online user community including Google, the College of Computing at Georgia Tech, the National Security Agency (NSA), IBM Internet Security Systems (ISS), McAfee, Secure Computing, S.P.I. Dynamics, Inc. and Symantec. \n\u003C\/p\u003E\n\u003Cp\u003EFor 2008, GTISC is forecasting five key areas in which cyber security threats are expected to increase and evolve:\u003Cbr \/\u003E\n-\tWeb 2.0 and Client-Side Attacks - including social networking attacks and new attacks that will exploit Web 2.0 vulnerabilities\u003Cbr \/\u003E\n-\tTargeted Messaging Attacks - including Instant Messaging attacks and malware propagation via online video-sharing\u003Cbr \/\u003E\n-\tBotnets - specifically the spread of botnet attacks to wireless and peer-to-peer networks\u003Cbr \/\u003E\n-\tThreats Targeting Mobile Convergence - including voice spam, vishing and smishing\u003Cbr \/\u003E\n-\tThreats to Radio Frequency Identification (RFID) Systems - evolving and varied threats in this emerging technology sector\n\u003C\/p\u003E\n\u003Cp\u003EFinancial gain will continue to be the primary motivator behind all five emerging threat categories. As the rapid rate of application development for cyber mediums continues to outpace information security technologies and countermeasures, GTISC advocates closer coordination between the security industry, carriers, Internet Service Providers (ISPs), application developers and the user community to begin closing the security gap in 2008. Representatives from the organizations that participated in the GTISC Security Summit contributed to the development of this report.\n\u003C\/p\u003E\n\u003Cp\u003E\u0022As newer and more powerful applications enabled by technologies like Web 2.0 continue to grow, and converged communications applications increasingly rely on IP-based platforms, new challenges will arise in safegaurding these applications and the services they rely on,\u0022 said Mustaque Ahamad, director of GTISC. \u0022The GTISC Emerging Cyber Threats Report for 2008 highlights those areas of greatest risk and concern, particularly as continued convergence of enterprise and consumer technologies is expected over the coming year. We wish to thank the esteemed members of the GTISC Security Summit panel who assisted us with the creation of this report.\u0022\n\u003C\/p\u003E\n\u003Cp\u003EMore than 200 corporate executives, industry leaders and technologists from across the country attended the GTISC Security Summit on Emerging Cyber Security Threats and Countermeasures Summit, keynoted by Dr. Vint Cerf, vice president and chief Internet evangelist at Google. Following Cert\u0027s address on the continued research and development needs to secure the multi-layered systems of the Internet, Summit panelists engaged in a lively discussion moderated by Chris Rouland, chief technology officer of IBM Internet Security Systems and IBM distinguished engineer. The panel discussion helped educate the audience on the proliferation of cyber threats, including those listed in the report, and highlighted possible countermeasures to safeguard the user and business communities. \n\u003C\/p\u003E\n\u003Cp\u003ETo view the entire GTISC Emerging Cyber Threats for 2008 report and for more information on GTISC, please visit \u003Ca href=\u0022http:\/\/www.gtisc.gatech.edu\u0022 title=\u0022http:\/\/www.gtisc.gatech.edu\u0022\u003Ehttp:\/\/www.gtisc.gatech.edu\u003C\/a\u003E. To watch a pre-recorded Web cast of the event, please visit \u003Ca href=\u0022http:\/\/www-static.cc.gatech.edu\/streaming\/gtisc\u0022 title=\u0022http:\/\/www-static.cc.gatech.edu\/streaming\/gtisc\u0022\u003Ehttp:\/\/www-static.cc.gatech.edu\/streaming\/gtisc\u003C\/a\u003E. \n\u003C\/p\u003E\n\u003Cp\u003EAbout Georgia Tech Information Security Center (GTISC)\u003Cbr \/\u003E\nThe Georgia Tech Information Security Center, a National Center of Academic Excellence in Information Assurance Education, is an interdisciplinary center involving faculty from the College of Computing, School of Electrical and Computer Engineering, Georgia Tech Research Institute (GTRI), the Sam Nunn School of International Affairs and the School of Public Policy.\n\u003C\/p\u003E","summary":null,"format":"limited_html"}],"field_subtitle":"","field_summary":[{"value":"The Georgia Tech Information Security Center (GTISC), a national leader in information security research and education, today announced the release of the GTISC Emerging Cyber Threats Report for 2008.","format":"limited_html"}],"field_summary_sentence":[{"value":"Social and mobile networking, Web 2.0 vulnerable"}],"uid":"27310","created_gmt":"2007-10-02 00:00:00","changed_gmt":"2016-10-08 03:01:05","author":"David Terraso","boilerplate_text":"","field_publication":"","field_article_url":"","dateline":{"date":"2007-10-02T00:00:00-04:00","iso_date":"2007-10-02T00:00:00-04:00","tz":"America\/New_York"},"extras":[],"hg_media":{"71845":{"id":"71845","type":"image","title":"Tech Tower","body":null,"created":"1449177405","gmt_created":"2015-12-03 21:16:45","changed":"1475894644","gmt_changed":"2016-10-08 02:44:04"}},"media_ids":["71845"],"related_links":[{"url":"http:\/\/www.gtisc.gatech.edu\/","title":"GTISC"}],"groups":[{"id":"1214","name":"News Room"}],"categories":[{"id":"153","name":"Computer Science\/Information Technology and Security"},{"id":"135","name":"Research"}],"keywords":[{"id":"208","name":"computing"},{"id":"2254","name":"gtisc"},{"id":"1620","name":"Information"},{"id":"2229","name":"Internet"},{"id":"167055","name":"security"}],"core_research_areas":[],"news_room_topics":[],"event_categories":[],"invited_audience":[],"affiliations":[],"classification":[],"areas_of_expertise":[],"news_and_recent_appearances":[],"phone":[],"contact":[{"value":"\u003Cstrong\u003ERebecca Biggs\u003C\/strong\u003E\u003Cbr \/\u003EGCI Group\u003Cbr \/\u003E\u003Ca href=\u0022mailto:press@robocup-us.org\u0022\u003EContact Rebecca Biggs\u003C\/a\u003E\u003Cbr \/\u003E\u003Cstrong\u003E404-260-3510\u003C\/strong\u003E","format":"limited_html"}],"email":["press@robocup-us.org"],"slides":[],"orientation":[],"userdata":""}}}