IoT Predictions 2017: Frost & Sullivan on Cyber Security in Asia

By Ken Briodagh December 29, 2016

Cyber security received heightened interest in 2016 due to a spate of cyber attacks, including on the database of 55 million voters at the Philippines Commission on Elections (COMELEC), the National Payment Corporation of India (NPCI), $81 million cyber heist at the Bangladesh Central Bank and the massive data leaks as shown by the Yahoo data incidents.

As more industries become increasingly connected to the Internet due to the Internet of Things, it is more essential than ever to consider preparing for IoT security in 2017. Frost & Sullivan’s (News - Alert) Asia Pacific Cyber Security practice analysts have shared the following cyber security predictions for 2017.


1. Business Email Compromise (BEC) attacks will overtake Ransomware and Advanced Persistent Threat (APT (News - Alert)) attacks

BEC generally happens when email accounts of key executives are compromised and involves payments made to fraudulent bank accounts. There was a 20 percent increase in number of such cases as compared to the same period last year, according to Frost & Sullivan. Police investigations revealed that the scam usually involves businesses with overseas dealings with email as the main form of communication in the dealings.


2. DDoS attacks might cause the Internet to be down for an entire day in a country

Globally, Distributed Denial of Service (DDoS) volumetric attacks hit over 1 Tbps of traffic and shut down several popular online services in 2016. While government authorities attempt to implement strict security regulations, manufacturers are still delivering insecure IoT devices to the market. This, and the fact that internal volumetric attacks to DNS servers for service providers are not well defended, cyber attackers will most likely attempt to exploit the vulnerability to the next level and bring down the internet in a country for at least a day, the analysts said.
 

3. Greater enforcement expected for IoT devices to meet cyber security standards

As authorities become increasingly concerned about the threats unsecured IoT devices will pose to the community, it will be illegal for these manufacturers to sell their products in countries that demand these devices comply with security standards. The recent Mirai botnets exploiting the vulnerabilities of IP cameras are an example of how manufacturers did not include a security process of changing default passwords when connecting the devices to the Internet.

4. The healthcare sector will have more stringent regulations for critical operations

Globally, ransomware attacks on computer systems of healthcare providers in 2016 had infected computer systems and disrupted operations hence patients in need of immediate attention had to be diverted to other hospitals. While major healthcare providers in Asia had initiatives to comply with security standards such as HIPAA, their use of legacy security tools to meet minimal compliance standards could not keep up with the new types of cyber attacks. Stolen personal healthcare records are worth more in the dark web than credit card information and medical machines are increasingly connected to the Internet which pose as a possible safety risk to patients.

5. New technologies used to enhance trust and exchange threat intelligence among industries

The setup of more Information Sharing and Analysis Centers will form platforms for both the private and private sector participants to share threat intelligence. However, participants are wary of exposing their weak security posture when contributing intelligence due to a successful attack. Blockchain may emerge as the technology to facilitate the exchange as it authenticates the trusted party to contribute, obfuscates the contributor's detail with anonymity, and offers a tamper proof system that prevents unauthorized alteration of any data shared.


6. More adoption of technologies that focus on threat actors and finding next attacks

Traditionally, enterprise security teams have adopted a “wait and see” posture, and try to build up their defenses to mitigate the known threats. However, more enterprises are working towards trying to know what the attackers are innovating in terms of cyber attack techniques, their next moves, and build up their defenses to counter the new attack vectors.

7. More enterprises will offer bug bounty programs

The idea is simple yet effective: pay the attackers for finding and reporting major vulnerabilities in enterprise and/or developed applications. Enterprises will be able to strengthen their security defenses through the crowdsourcing model and encouraging potential hackers to discover more and do more of the good rather than the bad.

8. More drones will be used to facilitate cyber attacks

A group of researchers from iTrust, a Center for Research in Cyber Security at the Singapore University of Technology and Design, demonstrated that it is possible to launch a cyber attack using a drone and a smartphone.  In the future, it is expected that drones will be an easy way to scan for unsecured wireless traffic as a way of performing war driving attacks.




Edited by Maurice Nagle


Original Page