Cyber Security Target Evolution: From Money and Data to Processing Power

Cyber Security Target Evolution: From Money and Data to Processing Power

One of the biggest challenges we face in cyber security is the swift evolution of the threat landscape. With increasing complexity, rapid adoption of new technologies, and emerging risks such as zero-day vulnerabilities, it is impossible to guarantee that any system is 100 per cent secure. While it can be difficult to pinpoint an exact attack vector or vulnerability, understanding the motivation and potential targets of malicious attackers can provide a useful framework for cyber security. This can allow organizations to identify and protect critical assets and systems that are likely to be targeted in a cyberattack. Unfortunately, the targets of cyberattackers are also changing. As I look back at the last two decades, I see a distinct evolution that has occurred in three broad stages.

Stage 1: Show Me the Money

Money was the primary target of early cyberattacks. Whether the cybercriminal was perpetuating fraud, diverting payments, or attacking payment systems, the ultimate aim of the attack was to make money. Most cyber security professionals now treat the targeting of financial transactions and systems as a no-brainer. As a result, anything that comes into contact with such transactions tends to have robust protection. While money remains a significant target for malicious cyberactivity, organizations are aware of and, in most cases, well-prepared for this threat.

Stage 2: Data Is the New Oil

As the recognition of the value of data has grown, malicious actors have shifted their focus to this new commodity. Data can be monetized in various ways by cybercriminals, either through the sale of stolen data or by holding access to the data for ransom. But monetization, particularly by cybercriminals, is not the only motivation for attacking data. The ability to access the intellectual property, knowledge, and know-how of organizations and even nation-states can be very valuable. This means that a host of new actors, including nation-states and private companies practicing corporate espionage, are getting involved in hacking data. There are also those who want to access corporate or government data in order to hold them to account or embarrass them. Multiple motivations exist, but data, not money, is now the ultimate target.

As with money, cyber security professionals are very aware of the interest in data and the potential motivations of attackers who might target it. This has created new cyber security challenges, resulting in the need to protect a larger segment of the information technology landscape beyond financial systems.

Stage 3: I Have the Power

About seven years ago, as part of a strategic foresight exercise, I was involved in examining the evolution of cyber security. A key question was what hackers might target next, beyond money and data. One suggestion I put forward at the time was computing power. While individual devices were getting more powerful, we were starting to see the emergence of large clusters of computers with significant computing power, due to the growth of cloud services. If malicious actors could gain access to vast amounts of computing power, I suggested it might be possible for them to use it in a number of ways, including as a tool for brute-force attacks. This was one of the emerging threats that I flagged for cyber security professionals.

Enter the cryptojacking phenomenon, which seems to have grown rapidly in the past year. Essentially, it involves hijacking some of the computing power of a system to “mine” cryptocurrencies—providing the computing power to validate cryptocurrency transactions and receiving a payment for this service. Malicious scripts in browsers have been implicated in this process, but more recently, reports have emerged of organizations such as Tesla and major utilities having their systems cryptojacked. What makes this type of activity difficult to detect is that it can use a small proportion of the computing power in a major system without targeting data or money, areas that are normally well-protected and heavily monitored.

Although the ultimate motivation for cryptojacking is monetary, other motivations for hijacking computing power may emerge over time. A new target for hackers has emerged, making it necessary to protect computing power in addition to data and finances.

Conclusion

Understanding the potential targets and motivations of attackers can provide a good basis for formulating an effective cyber security strategy. No organization has unlimited funds to protect every aspect of their systems from all potential attacks, but we are better able to invest our security resources wisely if we understand the areas that are likely to be targeted by malicious actors. Protecting money and data are already priorities for cyber security professionals, but we may need to add computing power to that list. While it is possible to build a good picture of emerging cyber security challenges using tools like strategic foresight, the bigger challenge is to proactively deal with these emerging threats, rather than waiting for them to become a significant problem.

Join The Conference Board of Canada’s Cyber Security Centre for regular, in-depth discussions on the latest trends and challenges in cyber security.

I will be running Strategic Foresight training workshops on March 27 in Ottawa, Ontario and April 24 in Calgary, Alberta.

Follow My Team

要查看或添加评论,请登录

Satyamoorthy Kabilan的更多文章

  • Building Resilience: The Lego Brick Model.

    Building Resilience: The Lego Brick Model.

    Through the many emergency events that I have researched and observed, from cyber security incidents and active…

    5 条评论
  • 2019 - A Watershed Year for Canadian Democracy?

    2019 - A Watershed Year for Canadian Democracy?

    In 2019, there will be several major elections in Canada - a Federal election and Provincial elections in Alberta…

    17 条评论
  • AI and The Future of Work: A Foresight Perspective

    AI and The Future of Work: A Foresight Perspective

    One of the biggest debating points around the future of work is the impact that technology and automation will have on…

    2 条评论
  • Facebook and Cambridge Analytica: Insights for Cyber Security and Privacy

    Facebook and Cambridge Analytica: Insights for Cyber Security and Privacy

    The revelations around the use of Facebook data by Cambridge Analytica have been making headlines around the globe…

    4 条评论
  • Remembering The Quebec City Mosque Shooting

    Remembering The Quebec City Mosque Shooting

    On January 29, 2017 six individuals, Azzeddine Soufiane, Mamadou Tanou Barry, Khaled Belkacemi, Aboubaker Thabti…

  • National Security Insights from 2017

    National Security Insights from 2017

    The only constant in the national security threat environment is change and some of the incidents we witnessed during…

  • Cyber Security Insights from 2017

    Cyber Security Insights from 2017

    When I look across the spectrum of offerings in cyber security, one of my concerns has always been the fact that we do…

  • Lessons in Resilience from 2017

    Lessons in Resilience from 2017

    When I speak about emergency management, I often use a quote from FEMA - "The world is changing in ways that can have…

    4 条评论
  • 2017 Insider Threat Survey

    2017 Insider Threat Survey

    My team at the Conference Board of Canada is in the process of updating our research on insider threats in Canada. An…

    2 条评论
  • Dealing with Wildfires: Insights from the Fort McMurray Reviews

    Dealing with Wildfires: Insights from the Fort McMurray Reviews

    In the last few months, a number of reviews covering the 2016 Horse River wildfire, commonly referred to as the Fort…

    5 条评论

社区洞察

其他会员也浏览了