Page 17 - Dataquest
P. 17

INTEllIGENT COMPUTING | SECURITY








          hyBrId NETWOrkS STrETCh aTTaCk SUrfaCES         SECUrITy GOES aUTOMaTEd OUT Of NECESSITy
          The attack surface — the total sum of the ways an organi-  As mentioned earlier, networks are growing increasingly
          zation is susceptible to cyberattack — is like a balloon. It   complex, meaning that IT security teams must contend
          expands with the introduction of new attack vectors and   with  growing  amounts  of  data  that  needs  to  be
          attack targets, like extensions into virtual, cloud and op-  contextualized, analyzed and acted upon. At the same
          erational technology environments. It contracts with the   time,  the  industry  is  suffering  from  a  worrying  talent
          good cyber hygiene and risk reduction. The larger your   shortage,  which  means  that  there  are  fewer  skilled
          attack surface, the more likely it is to pop.   workers available to manage these issues. This is creating
           To control an attack surface that encompasses hybrid   an environment where attack vectors abound, increasing
          networks  and  that’s  affected  by  a  constantly  evolving   the organization’s risk of attack.
          threat landscape, organizations will need to unify visibility   As  a  result,  in  2018  we  expect  to  see  a  surge  in  the
          and  centralize  management.  Gaining  seamless  visibility   adoption of automated solutions, particularly for integrated
          across physical IT and OT networks, as well as virtual and   analytical  workflows.  These  can  deliver  actionable
          cloud  networks,  will  give  them  a  holistic  foundation  on   intelligence to security practitioners of what to focus on —
          which  to  build  a  security  program  ready  to  address  an   such as vulnerabilities posing an imminent threat — what
          agile threat landscape.                         tools are at their disposal to take action and tracking the
           While different technologies, processes and teams may   workflow to ensure tasks are carried out to completion.
          be involved to secure various types of networks, attackers
          don’t  pay  attention  to  such  divisions.  If  anything,  they   ThE SCalES TIP TO ThE ClOUd
          exploit these divisions in security management, and simply   At  present,  most  firms  are  in  a  transition  phase,  with
          follow the path of least resistance to reach their intended   networks  made  up  of  a  hybrid  of  physical,  virtual  and
          target, no matter where the attack originates. In 2018, we’ll   multi–cloud environments. 2018 is set to be the tipping
          likely see attackers leverage hybrid network connectivity   point, as corporate networks become predominantly or
          to  infiltrate  cloud  and  OT  networks  where  traditional   entirely virtual or cloud–based.
          cybersecurity measures are still being fleshed out.  Organizations will need to be sure they understand and
                                                          can support the shared responsibility model of the cloud,
          ONGOING EvOlUTION Of dISTrIBUTEd aTTaCkS        in that the cloud service provider is responsible for security
          While  NotPetya  was  originally  dubbed  a  ransomware   of  the  cloud  while  the  organization  is  responsible  for
          attack,  seemingly  a  new  iteration  of  WannaCry,  it  was   security in the cloud. The assumption that cloud networks
          pretty lousy at the ransom part. What it and WannaCry   are inherently secure needs to be overcome, and security
          demonstrated, though, was the distributed attack model   teams need to have the means to understand how traffic
          on which modern ransomware relies. It targets as many   moves into, out of and within cloud networks to put the
          victims possible, looking for low–hanging fruit, so attacks   proper security controls in place.
          can be carried out easily and automatically, maximizing   The  importance  of  automation,  as  mentioned  above,
          the  attacker’s  ROI.  Ransomware  is  a  perfect  fit  for  this   becomes  even  more  important  in  cloud–networks.  The
          model,  in  that  any  target  can  be  extorted  for  payment.   elasticity of clouds makes their security management too
          Now  that  the  distributed  attacks  have  proven  global–  much to handle via manual processes. If organizations are
          reach  capabilities,  we’re  sure  to  see  more  mass–scale   aiming for a complete move to the cloud, they need to
          attacks in 2018.                                ensure that security programs are poised to support the
           The  good  news  about  the  distributed  attack  model?   approach.
          Cybercriminals sell or share proven attack methods, such
          as vulnerability exploits, to carry out distributed attacks.   INCrEaSEd aTTaCkS ON OPEraTIONal
          Again, this practice gives them a better ROI than developing   TEChNOlOGy
          new, native exploits or exploits for a specific target. It also   The convergence of IT and OT networks presents several
          means a relatively small number of vulnerabilities exploits   advantages in terms of productivity, ease of management
          are being used and reused. If vulnerability management   and  cost–effectiveness.  But  it  has  also  introduced  new
          programs can take a threat–centric approach and focus on   cyber risks to critical infrastructure organizations such as
          this subset of vulnerabilities, they’ll have a greater impact   utilities, energy producers and manufacturers that could
          on their organization’s security than if they targeted only   have very real impacts on uptime, human safety and the
          CVSS critical vulnerabilities.                  environment.

                                   |  A CyberMedia Publication   www.dqindia.com          January, 2018   |  17
   12   13   14   15   16   17   18   19   20   21   22