Sei sulla pagina 1di 2

The Hardware

categories impact using mobile device Threat agents are more sophisticated in their attacks and use of
New Mobile services tools.

Reducing the amount of office space used. Pros Attack patterns are now being applied to mobile devices. This is of
particular concern for mobile and other small digital devices that
brought a number of new risk area are interconnected and often have poor security controls.
Bring Your Own Devices (BYOD)
Multiple nation states have the capabilities to infiltrate government
Cons and private targets (cyberwarfare).

Cloud computing results in large concentrations of data within a


small number of facilities, which are likely targets
Figure 6.9 ENISA Recent trend include
Currnet Threat Landscape for attackers.
is?
Social networks have become a primary channel for
Business Risk communication, knowledge collection, marketing and dissemination
of information. Attackers can misuse social networks to gain
Operational Risk Internet Of Things (IoT) personal data and promulgate misinformation.
Consumerization of IT and Mobile devices
Technical Risk Big data refers to large collections of structured and unstructured
data and the usage of large infrastructure, applications, web
Additional Risk
services and devices. The popularity of big data as an asset allows
for the potential for big data breaches.

Figure 6.10 Defining APT

is? Well -Reserached

Amplified technical impact Big Data Sophisticated


APT Characteristics
Privacy (data collection) Technical Risk Steathly

Privacy (re-identification) Persistent

new Attack Artificial Intelligence Companies


New phenomena for many Organization
Advance Presistance Threat (APT) APT Target
Countries APT Types and Impacts ( Figure 6.3)

Based NIST and CSA , what is Cloud computing


Section 6 : Security Target Selection
Loss of governance

Lock-In
implications and Adoption Target Research

Target Penetration
Isolation failure od Evolving Technology Command and Control
Stages of APT Attack
Compliance Target Discovery
Management interface compromise Data Exflirtation
Risk of cloud Computing
Data protection Intelligence Dissemination
Mallicious insider Information Exploitation
Data Breach

Account hijacking Mobile application


Insecure application programming interfaces (API) Pickpocket

Denial of Service (DoS) Unprotected transient data


Top Cloud Computing Threat
Malicious insider Losing one digital identity with actual devices

Abuse of cloud services Physical Risk

Shared Technology issues Cloud and Digital collaborations


Suspectible to 0-day exploits Cell-based tracking and locating the devices

Recent speciments of malware show a higher Attempt to prevent Remote shutdown/wipe capabilities
Cloud Application Risk
Secondary malware attack Mobile Technology -- Vulnerabilites, Threats and Remote SIM Card block capabilities
risk Organizational Risk BYOD
Market Drive

Scalability

Cost-Effective

Timely and effective updates


Activity monitoring and data retrieval Figure 6.6
Audit and evidence
Unauthorized network connectivity Figure 6.7

Benefit of cloud Computing Web View/ User Interface Impersonation

Technical Risk Sensitive Data Leakage

Figure 6.11 Unsafe sensitive data storage

Coorporate Risk Unsafe sensitive data transmission

Empoloyee Risk Social Media Drive-by Vulnerabilities

Potrebbero piacerti anche