In the much-hyped world of the Internet of Things, the industry continues to focus on the number of connected devices and machines that will roam the earth today, tomorrow and beyond. The number of Internet-connected automobiles, smart meters and home-monitoring systems has increased dramatically, yet cybersecurity services to safeguard them are proving to be inadequate.
Verizon publishes the DBIR report every year and if we try to look at some of the interesting findings of 2014 DBIR report, there are important indicators that seem to connect the dots as far as online security protection is concerned.
Broadening diversity of victims is increasingly apparent. It is no longer about “who has money”, it is about “who has an IP address” – if you have an IP address, you’re a target. No size or industry excluded.
Bad guys seem to be innovating faster than the good guys. This indicates that current security controls are not enough when it comes to online threats. Techniques used to steal data have become much more diverse and, for the most part, increasingly automated / commoditized. Organizations need to be more pro-active and have a wide and deep insight into what is happening not only within their network but also just outside their network from an intelligence perspective. System/Device log review is not enough, you also need to bother about network traffic.
Two out of threedata breaches exploit weak or stolen passwords. This bring to the forefront that identity and authentication is still under assault.
DNS reflection attacks are growing in number.DDoS attacks on the other hand are getting bigger in terms of bytes per second and packet size. This could act as a big impact to the existence of online business itself. DBIR also observed that attackers useDoS attacks as a “smokescreen” to hide fraudulent automated clearing house (ACH) transfers and other illicit activity.
Payment card breaches continue to rise as we rise in financially motivated cyber-crime. PCI DSS is one of the important standards that provides a structured approach to solving the myriad of security of payment card data.
Top 10 threats for a particular online business could be different from the top 10 threats of another. Organizations need to be cognizant of what is more relevant to them and what information/asset is more critical to protect. Security of the application with reference to the application security flaws and business logic, security of the underlying and support IT infrastructure and processes, security of data transmission and security of identity and access management are some of the key factors that enterprises seek to have assurance. SANS Critical Security Controls could be used industry vertical wise on key areas as per the DBIR report.