1 / 6

Future Predictions on Cybersecurity: Mitigating Malware Threats and Risks

Chapter 11 examines the uncertain future of cybersecurity, emphasizing the challenges of making accurate predictions. The author presents two contrasting forecasts: the possibility of devastating cyberattacks or the hope that malware issues could resolve soon. It explores foundational strategies including disaster recovery plans, education for developers, vendor accountability for security, and the importance of diverse defenses. The chapter concludes by affirming that human vulnerabilities will perpetuate cybersecurity challenges, ensuring a continuous demand for security advancements.

veta
Download Presentation

Future Predictions on Cybersecurity: Mitigating Malware Threats and Risks

An Image/Link below is provided (as is) to download presentation Download Policy: Content on the Website is provided to you AS IS for your information and personal use and may not be sold / licensed / shared on other websites without getting consent from its author. Content is provided to you AS IS for your information and personal use only. Download presentation by click this link. While downloading, if for some reason you are not able to download a presentation, the publisher may have deleted the file from their server. During download, if you can't get a presentation, the file might be deleted by the publisher.

E N D

Presentation Transcript


  1. Chapter 11What Should We Do?

  2. Predictions • “It's tough to make predictions, especially about the future.” --- Yogi Berra • Author provides 2 predictions that reader can choose from: • “Vicious cyberattacks will cause the Internet to melt down” • “All malware-related problems will disappear within a year's time”

  3. Solution to Malware? • No magic solution • “And, if there was, be assured that a bread-crumb trail of patents would cover every part of it” • Recall that human intervention during attacks not always possible • Malware detection is undecidable • Must rely on heuristics (in broad sense) • We discussed lots of technical measures

  4. Not-So-Technical Ideas • Plan B --- disaster recovery plan • Education --- social engineering, security-aware developers, … • Pressure on Vendors --- demand security instead of “frilly features” • Minimalism --- minimize services and features (fewer attack vectors) • Special purpose devices?

  5. Not-So-Technical Ideas • Software Updating --- need efficient and effective ways to update • Layers of Defense --- variety of defenses, each based on different assumptions • Avoiding Monoculture --- different software, different machines, physical separation, ASLR, etc.

  6. The Last Word(s) “Will malware ever go away? Even if all technical vulnerabilities are fixed, there will still be human vulnerabilities. But the point is academic, because human nature virtually guarantees the large-scale availability of technical vulnerabilities for the foreseeable future. Suffice it to say that the computer security industry will continue to flourish, and security researchers will be employed for some time to come.”

More Related