Subscribe free to our newsletters via your
. Military Space News .




CYBER WARS
Cloud and mobile data the next cyber threat
by Staff Writers
Atlanta GA (SPX) Nov 08, 2013


File image.

As more businesses find their way into the cloud, few engage in security measures beyond those provided by the associated cloud storage firm, a new report from Georgia Tech notes. Even fewer seek heightened data protection because of concerns that usability and access to remote data would be significantly reduced.

These concerns are among findings made by the Georgia Tech Information Security Center (GTISC) and the Georgia Tech Research Institute (GTRI) in the Georgia Tech Emerging Cyber Threats Report for 2014. The report was released at the annual Georgia Tech Cyber Security Summit, a gathering of industry and academic leaders who have distinguished themselves in the field of cyber security.

"With recent revelations of data collection by the federal government, we will continue to see a focus on cloud security," said Wenke Lee, director of GTISC. "But encryption in the cloud often impacts data accessibility and processing speed. So we are likely to see increased debate about the tradeoffs between security, functionality and efficiency."

Encryption challenges were a focus at this year's summit, which featured some of the nation's top information security experts. These included keynote speaker Martin Hellman, professor emeritus at Stanford University and one of the inventors of public key cryptography, a way of securing communications without relying on pre-shared secrets.

In related findings, the report reveals security issues involving the "Internet of Things," referring to the notion that the increase of Internet-capable devices could create opportunities remote hacking and data leakage.

With everything from home automation to smartphones and other personal devices becoming connected to the Internet, these devices will capture more real-world information and could permit outside parties, companies, and governments to misuse that information.

In the mobile space, even though designers of mobile devices and tablets have developed a robust ecosystem to prevent large-scale device compromises, the report finds that the threat of malicious and potentially targeted use remains.

Earlier this year, researchers at Georgia Tech reported that they found ways to bypass the vetting process of Apple's App Store and subsequently showed how malicious USB chargers can be used to infect Apple iOS devices.

"No matter how successful we have been, black hat operatives will continue to attack infrastructure at every angle possible, making cyber security a global issue for years to come," said Bo Rotoloni, director of GTRI's Cyber Technology and Information Security Laboratory (CTISL).

"We must remain vigilant. The purpose of this Summit and Report is to raise awareness, create educational opportunities and maintain an ongoing dialogue among industry, academia and government."

The Georgia Tech Cyber Security Summit is a forum for the IT security ecosystem to gather together, discuss and debate the evolving nature of cyber threats, and to chart the course for creating collaborative solutions. In addition to Hellman's keynote address, the 2013 Summit included a panel of security experts from Microsoft, Splunk, Dell Secureworks, Solera Networks and Georgia Tech.

.


Related Links
Georgia Institute of Technology
Cyberwar - Internet Security News - Systems and Policy Issues






Comment on this article via your Facebook, Yahoo, AOL, Hotmail login.

Share this article via these popular social media networks
del.icio.usdel.icio.us DiggDigg RedditReddit GoogleGoogle








CYBER WARS
Apple details government data requests
Washington (AFP) Nov 05, 2013
Apple on Tuesday released details of government requests for its data while protesting a "gag order" that limits what can be disclosed about US national security orders. The iPhone and iPad maker followed the lead of other US tech giants and released its first report on requests from governments around the world. Most of the requests involve criminal investigations into "robberies and ot ... read more


CYBER WARS
Romania begins work on NATO missile shield base

Upgrades boost ballistic missile defense radar's performance to protect against missile raid

NATO, Russia make no progress on missile defence row

MEADS Tracks Tactical Ballistic Missile for First Time

CYBER WARS
Lockheed Martin, MDA anbd Navy Demonstrate Ashore Missile Defense System

Turkey, US hold talks on China missile deal

Standard Missile-3 IIA completes Critical Design Review

Outside View: NATO needs to talk Turkey

CYBER WARS
Aerostructures Validate Triton Unmanned Aircraft Wing Strength

Northrop Grumman Offers Open Architecture Solutions for Enhanced Avionics Capabilities

Israel drone manufacturing booms

Commercial unmanned aircraft market may be worth $10 billion

CYBER WARS
Raytheon expands international footprint of electronic warfare capability

Latest AEHF Comms Payload Gets Boost From Customized Integrated Circuits

Northrop Grumman Receives Contract to Retrofit Joint STARS Fleet

Latest AEHF Comms Payload Gets Boost From Customized Integrated Circuits

CYBER WARS
Chemical arms treaty meets love-gone-wrong in US high court

Northrop Grumman Demonstrates Micro-Gyro Prototype for DARPA Program

US Army, Raytheon complete AI3 live-fire demonstration

Raytheon test fires enhanced Marine Corps anti-tank weapon system

CYBER WARS
Pentagon cuts risk higher casualties: US generals

Embraer, amid soaring profit, embroiled in bribery probe

BAE set to cut 1,000 shipbuilding jobs in Britain: report

Budget cuts will mean leaner US force: Hagel

CYBER WARS
Hong Kong activists plan new "fishing trip" to disputed islands

Japan putting missiles on Pacific gateway islands

Outside View: The American Follies

Ai Weiwei sends defiant message to China at Sweden film fest

CYBER WARS
Scientists untangle nanotubes to release their potential in the electronics industry

Nano-Cone Textures Generate Extremely "Robust" Water-Repellent Surfaces

Newly discovered mechanism propels micromotors

Densest array of carbon nanotubes grown to date




The content herein, unless otherwise known to be public domain, are Copyright 1995-2014 - Space Media Network. AFP, UPI and IANS news wire stories are copyright Agence France-Presse, United Press International and Indo-Asia News Service. ESA Portal Reports are copyright European Space Agency. All NASA sourced material is public domain. Additional copyrights may apply in whole or part to other bona fide parties. Advertising does not imply endorsement,agreement or approval of any opinions, statements or information provided by Space Media Network on any Web page published or hosted by Space Media Network. Privacy Statement