Synopsys and industry experts discuss cyber threats in 2020

In recent years, cyber attacks become more frequent, more and more high repair costs, regardless of user or software companies to understand the network security is increasingly important. Then we should pay attention to what cyber attacks in 2020, in order to be prepared in advance it? Synopsys dialogue industry experts, discuss privacy, IoT, 5G and other fields.

Higher order network security threats

  • Canadian enterprise information management software company OpenText , vice president of Strategic Development Anthony DiBello

 

As networks continue to improve the maturity, how well people understand the problems faced are deepening, look at what is the essence of "the greatest threat" it has been different. In the past, we may be judged from the perspective of an object or means of attack, believed to be the biggest security threat is the "Internet of Things malware" or "ransomware." For some of these industries, such as manufacturing or healthcare, it is perhaps the greatest threat; but for digital infrastructure or the credibility of the system and institutions concerned is not the case. The threat of higher order in 2020 will be the biggest challenge.

 

Privacy

Speaking of privacy, medical records are the first affected, identity card, bank account information ...... that now? There biometrics, driverless cars, smart home / office / city, genetic testing and so on. More and more personal authentication information is included in the government database and business organizations. Some of us choose to provide (for example, DNA genetic relationship between validation); some of us are drawn (for example, when we walk the streets of the face information) during social activities. Once stolen (without considering the future will not be stolen or not), will only make it easier for criminals to impersonate us, steal our identities, or steal credentials to gain access to the network.

 

Overall, therefore, in 2020 we will face the biggest threat is not a particular type or class of malicious software or attack, but higher-order attacks, they have led to criminals can take advantage of the machine, the use of malicious software (or just a stolen account) to carry out illegal activities.

 

Beware messaging and communications platform phishing attacks

 

In 2020, I was worried that attackers will target the mail fraud turned to social software, such as WhatsApp, LinkedIn and hundreds of other more reliable compared to our e-mail communications platform.

And the old and new economy

-     Information security consulting firm Atredis embedded Things practice responsible Zach Lanier

 

I think there are several of the more important areas of concern in 2020, in alphabetical order:

 

5G . 5G emergence and application may mean "faster" does not mean "safe." With the advance of the deployment of 5G, 5G I expect there will be more security-related disclosures - is likely to be more security issues.

 

Things . Things have been talking about security, also proved its importance. Things, Internet of things industry and other "smart devices" to continue into our family, work and life, at the same time there are security issues.

 

Supply chain security . I expect supply chain security will continue to be a hot topic, because the device and the underlying source components will usher in greater scrutiny. Discussion around a particular component certifications will continue.

 

CPU and related vulnerabilities . If there are more like SPECTRE (ghost vulnerability), Meltdown (blown loopholes), PortSmash and other problems affecting the CPU, I would not be surprised. Even as the trusted platform module such as security-oriented components, it is impossible to say without its problems. So I expect this aspect of the issue will continue to arise.

 

Re-examine the mindset to treat security tools

-     Security Information Exchange Platform TruSTAR co-founder and executive chairman Paul Kurtz

 

在2020年,最大的威胁并不是单一的某个攻击,而是企业不愿意去认真全面地正视他们的安全工具。企业总是在遭遇一个“新”的威胁时才去寻找新的或更高级别的工具去对抗。他们必须调整这种思维模式,更主动地去管理自身安全技术堆叠中的已知信息。在缺少集成的情况下一味地提倡使用更多安全工具去反击特定的威胁并不是明智之举。

 

编者注:

该文章为节选,全文请参考:https://www.synopsys.com/blogs/software-security/biggest-cyber-security-threats-2020/

 

 

发布了0 篇原创文章 · 获赞 2 · 访问量 7276

Guess you like

Origin blog.csdn.net/SIGinChina/article/details/103974353