Cybersecurity is the protection of all interconnected systems from threats that could breach and potentially harm hardware, software, and data alike. Cybersecurity is in a constantly evolving state that challenges most organisations because of the varying degree of threats. Due to COVID-19 the need for Cybersecurity has increased as the pandemic has created more remote workforces, making them more vulnerable to cyber-attacks. The rollout of 5G has also made even more devices connected than previous times with the additional trend that most companies also have unprotected data and bad cybersecurity practices (Sobers 2021). To combat data breaches and cybercrime it is important to understand what Cybersecurity can do.
There are many different developments in Cybersecurity but some of the more popular and rising ones today and what they can do are listed according to Writers (2021) suggestions. These are: Context-aware Behavioural Analytics, Next Generation Breach Detection, Virtual Dispersive Networking, Smart Grid Technologies, SAML and The Cloud, Active Defence Measures and Early Warning Systems. These will be stated each briefly to highlight the development and what this means for the current state of Cybersecurity which should lead into what will be developed in the future to continually combat cyber warfare.
Context-aware security is defined according to Avivah Litan of Gartner, as a system of fail-safes deployed to differentiate normal and abnormal anomalies (Donohue 2014). Basically, the security relies on the use of situational information such as identity, geolocation, time of day or type, to track whether a breach has occurred through the unusual behaviours of a user (Botelho 2021). Technologies that are in development according to Donohue (2014) for it are:
Breach detection, according to Eshel et al. (2014), has changed from being focused as a first line of defense and actually focuses on defending the system once the hacker is inside. It takes the approach of combining behavioural analytics, machine learning and other tools to identify the traces that the hacker has left behind. Effectively being able to pick out strange movements and changes that will occur in the data and notifying the users (Writers 2021).
VDN takes Man-in-the-Middle (MiM) attacks and makes them harder to decrypt (Writers 2021). These cyber-attacks are basically moments of when a hacker can monitor, alter or intersect within a communication between sender and receiver. According to Forbes (2014) Dispersive Technologies developed VDN to split the communication into multiple parts, encrypts those individually and routes them across multiple network platforms like how military radio is distributed.
Smart Grid systems emerged in electrical infrastructure to improve operations and improve the transmission, and distribution of resources (Westlund 2007). Smart Grids are continually expanding into more than just energy and so has opened problems in cybersecurity for these industries. In response, the Department of Energy (2014) are few of the many who are developing means to combat breaches, for example:
Security Assertion Markup Language (SAML) is an XML-based open data format used to allow authentication and authorization of credentials to service providers (Petters 2020). On its own it is not sufficient however it is being combined with SSO, encryption and intrusion detection to protect data existing in the cloud. Ohlhorst (2014) explains that company, BitGlass, developed a proxy-based system using SAML to authenticate, secure access and log activity through the cloud. This showed that SAML can be used to detect suspicious activity and the companies would then wipe all information that would relate to the customer if a breach occurred.
Active defence measures are based on the idea that instead of waiting for a security breach, the user takes the proactive measure to go after the breacher. Out of all the securities it is the most controversial due to the ability of some participants having to be involved in illegal activities to combat cybercrimes (Writers 2021). A few that are known are counterintelligence gathering, sink holing, honeypots, and retaliatory hacking (Writers 2021). The most recent and more experimental measure is MonsterMind developed by the NSA (Zetter 2014). According to Edward Snowden this automated program, set like an AI, would use algorithms to search metadata, identify then block malicious network traffic (Zetter 2014). This same program could shut the servers as well within the attacks.
Early warning systems is the most recent innovation which is in the early stages and a glimpse of what is to come. Utilising machine learning and data mining techniques, an algorithm that can predict which web servers are likely to become victim to malware or breach is being developed (Writers 2021). The algorithm considers similar characteristics of vulnerable websites such as software, traffic, filesystem structure and webpage structure. Christin & Soska (2014) applied this algorithm and predicted that 66% of websites turned up potential for being hacked with only 17% as false positives. Other more newer technologies like FIDeS have made the technology more AI like in nature where it can now detect from both local area networks and in wide area networks (LIFARS 2020).
As society is becoming more technologically dependent, the slew of cybercrimes and attacks will not reduce without the continuous development of the aforementioned technologies. According to Tunggal (2021) these developments will continue to give companies and users the ability to protect themselves from theft of their intellectual property, and/or information. Ultimately reducing economic costs on top of protecting the reputations of companies and individuals by ensuring this sensitive data is not shared or improperly used. Whilst being very positive in nature some issues were brought forward in the World Economic Forum (2020) about the posing risks in the increasing nature of cybersecurity. These risks according to the World Economic Forum (2020) were:
Overall cybersecurity is an important feature to have, it does pose risk due to the highly volatile nature of the technology and what is established to be protecting.
This would be very positive regarding daily life. Increased security measures protecting interests as well as for family and friends is beneficial to us all. I believe the most difficult issue is that with the increasing security, the more intricate designs will have to be utilized for just simple amount of data for i.e., using multiple keychains to access personal data or multiple checks to ensure that activity is not suspicious. This will require more paying attention to systems and certain securities behind them so for more elderly members this may prove to be more difficult. Overall, though this will help to protect assets and our digital footprint to ensure that cyberattacks are not committed that could lead to potential harms.
Botelho, B 2021, Context-aware security, Tech Target, viewed 8th July 2021
Christin, N & Soska, K 2014, Automatically Detecting Vulnerable Websites Before They Turn Malicious, Usenix, viewed 12th July 2021
Department of Energy 2014, Smart Grid System Report, US Department of Energy, viewed 14th July 2021
Donohue, B 2014, Avoiding Data Breaches with Context Aware Behavioral Analytics, Threat Post, viewed 10th July 2021
Eshel, P, Moore, B & Shalev, S 2014, Why Breach Detection Is Your New Must-Have, Cyber Security Tool, Tech Crunch, viewed 12th July 2021
Forbes 2014, Cybersecurity: Turning the Tide on Hackers with Dispersive Technologies, Forbes, viewed 12th July 2021
LIFARS 2020, The effectiveness of cyber security Early Warning Systems (EWS), LIFARS, viewed 12th July 2021
Ohlhorst, F 2014, Bitglass Supercharges BYOD and Cloud App Security, Enterprise Networking Planet, viewed 12th July
Petters, J 2020, What is SAML and how does it work?, Varonis, viewed 10th July
Sobers, R 2021, 134 Cybersecurity Statistics and Trends for 2021, Varonis, viewed 8th July 2021
Tunggal, A 2021, Why is Cybersecurity important?, UpGuard viewed 14th July 2021
Westlund, D 2007, The Essential Role of Cyber Security in the Smart Grid, Electrical Energy Online, viewed 11th July 2021
Writers, S 2021, Hot Technologies in Cybersecurity, Cyber Degrees, viewed 10th July 2021
Zetter, K 2014, Meet MonsterMind, the NSA Bot That Could Wage Cyberwar Autonomously, Wired, viewed 12th July 2021