Chapter 13: Embracing the Future of Cyber Security
If you could predict the future, would you want to live in it? Many people are amazed, if not bamboozled, by the current state of the digital environment. Change is inevitable. We must embrace it. If you see some of the amazing inventions that have been created over the past few years, you can almost look forward to the future with great anticipation and excitement. However, it would be a folly to imagine it will be all bliss.
Just as much as we look to the future, so do hackers and other cyber terrorists. Everyone is excited about new technology. As we explained in the fundamentals of cyber security, all technology is of dual use. It can be used for as much damage as it can be used for good deeds. What is important is what nations do with the technology, the resources they have at their disposal and their intentions.
The amount of cloud services, IT systems, and connected devices keeps increasing, which is a good thing, as the more connected a network is, the more value it possesses. All these systems process unimaginable volumes of data, commonly referred to as “Big Data”. We must do all we can to protect this information, lest it falls into the wrong hands. For a world that relies heavily on data analysis, bestowing the right data upon a powerful entity with the right resources and, at times, government backing can lead to disastrous results.
However, not all available data is too sensitive. With this argument, you are probably looking at data security from the point of confidentiality. You can never be too sure what someone does with your data. What you feel is not confidential might be a goldmine for someone else. You might feel the data is worthless, but someone else can use it to trace your location and that’s all they needed to complete a breach or hack, that is vital information. 
Future Cyber Threat Assessment
There is too much data online that can be exploited, digitized and even weaponized.
From individuals to organizations, a lot of people stand to gain a great amount by exploiting the vulnerabilities in your networks and devices. Given the rate at which technology is advancing, the perceived future threats relating to cyber security might fall into any of the categories noted below.
Espionage - Selling privileged information to an enemy is not just limited to inter-country spats; today, companies find themselves in a very tight spot, especially given the lengths at which competitors are willing to go to get an advantage in the market. Some of the information that is traded includes passwords, accounts, hospital records, and credit card details.
Other than that, espionage can also be used to access privileged information. In the scenario above, the goal is to get some money. The hacker obtains information and sells it. However, in this case, the hacker is looking for specific information. The end result might be bigger than the immediate financial benefit of having that information.
Kidnapping - Kidnapping in the digital sphere works in the same way traditional kidnapping works. The hackers intercept information that they deem important, encrypt it, and demand ransom from the owners or recipients to decrypt it for them. Organizations and businesses that handle critical information, such as hospitals, are some of the most common victims of these hacks.
Phishing - Phishing is almost the oldest trick in the book. Today, however, hackers who use this method have to go the extra mile to sell their agenda. Phishing emails are camouflaged to make you believe you are responding to an official email. However, the scam is to trap you into providing important information about yourself. Spear phishing is a directed phishing attack that is aimed at specific people, and their projected yield is very high for the hackers.
Intrusion - Intrusion can be performed for many reasons. Someone who has unwarranted access to your system might do a variety of things in the network. Intrusions can be geared towards specific and targeted damage or general damage. The hackers can also get inside the system and alter information, in the process making everyone else operate on disinformation.
DDoS – ddoS (distributed denial of service) attacks are very common these days. In such an attack, a wide network of computers are programmed to overload a specific service, server, host or website with traffic such that nobody else can access it. DDoS attacks are primarily meant to cripple a certain website, server, service or a specific individual indirectly.
Consequences for the Average User
The world did not just go digital; it also went mobile. There is an amazing list of things that you can do with the data at your disposal. The ease with which you can conduct businesses using your phone is amazing. However, this also calls for heightened caution. If someone gains access to and controls your mobile devices, they can nearly control your entire life. 
Think about everything they will have access to, from your social media accounts, your contact list, your messages, photos, videos, and any other information you might have on the device. Thus, you must take responsibility for your actions and try to protect your devices to the best of your abilities.
Most companies have information that is no longer only restricted to or accessible to system administrators, but also by an interconnected network, meaning that most people in the organization have access to that information. Companies are spending so much to safeguard their information. However, as an employee, you must also do your best to make sure you protect the information under your care.
Social engineering is one of the methods that hackers use to gain access to systems. The victims are unaware they are being targeted. Hackers take time to study their victims and understand the things they do, how they go about their lives, the things they like, and so forth. Social engineering hacks demand a lot of patience for the hacker to cultivate an approach that their victim will never suspect. By the time you are hacked or used to get into a privileged system, you will barely realize your role in the hack. If you do, it might be too late, since the hacker will have already disappeared, wiping all traces of their existence from your life. 
Protecting the Internet of Things
Experts in the industry are currently well aware of the methods they can use to protect conventional devices like computers, smartphones, and other mobile devices. However, since we are venturing into uncertain waters with the internet of things, is everyone ready for the risks that they present? Think about home automation devices, thermostats, refrigerators, self-driving cars, and all the other amazing devices that are shaping the prospect of the future. 
Security is mandatory to protect these devices. Hacking into any of these devices will definitely have extreme ramifications, not just for the user who was hacked, but also for the companies that build or maintain the devices. Effective controls must be built into such products, and they must also be passed through rigorous security testing to ensure they are ready and safe for deployment on a large scale.
Big Data
More and more devices are joining the internet each day. Whenever you purchase a new device, you try to connect it to other devices or systems you own, so that you can enjoy a seamless experience whenever you need to. More devices on networks means more data, whether structured or not.
Mobile adoption has been the heartbeat of the growth of social media over the years. With time, third parties realized they can leverage their services on social networks. They realized people want to play games, date, learn, and do so much more on social networks. They also realized the insane potential that lies therein, with all the data social networks already collect about their users.
Data scientists currently work closely with project development teams to help them understand what data they are accessing and what they can do with it to influence user behavior when interacting with their apps online. One of the pitfalls of this trend is that, while the companies say they collect your data to understand you better and help them build products and applications that can serve you better, what they actually do is use the data to manipulate you into doing whatever it is they please. The end game for most of these companies is the balance sheet. How much money are they making from manipulating you to do something? And what if such companies are hacked? 
If they could manipulate you into decision making, imagine what a hacker could do with that information. Manipulation is not just a matter of clicking a few links online or swiping left and right on your phone. Manipulation is a science. Even the brain, independent of cyberspace, presents important data that researchers can analyze and use to understand human behavior. Some cyber criminals are part of an elaborate network that includes data scientists and researchers, and at times they operate with the backing of a foreign or local government. This is too much power to wield by a shady entity.
Big data is not just about presenting challenges in the form of cyber criminals. It is also a means through which security experts can protect the cyberspace. It takes a lot of planning to execute a cyberattack without leaving traces behind. Most of this is only possible in the movies. However, in the real world, it is still possible to do so, but the planning must be very intimate. Experts can use data patterns to understand their systems and networks better, and in the process, help them predict attacks before they are executed.
The sad bit is that it might take days for experts to comb through unstructured data, during which the hack might have been executed already. To mitigate this challenge, cognitive security is one feature that will be advanced into the future. Experts currently make use of machine learning to process data efficiently. This also gives them an accurate representation of data and the current security position. 
Stringent Regulations
2018 was a significant year in cyber security. The number of data breaches that were reported were record-breaking. This was also the year the GDPR was implemented. There were many learning points from the events that transpired in 2018. 
Companies, for example, were aware of and had more than two years to prepare for the GDPR. However, some took it lightly, and when the resolution was passed, they faced dire consequences barely a year later. About a month after the GDPR resolutions were passed, thousands of complaints were reported, an increase of more than 150 percent compared to a similar period in the previous year.
Issues were raised about GDPR before and after it was implemented. Many wondered whether companies could actually be held accountable for breaches. According to the regulation, companies that are found guilty are liable to fines of more than £16 million, or 4 percent of their turnover worldwide. Companies like Uber have learned the hard way that the GDPR is a serious matter. 
Companies must be held accountable for managing and protecting the consumer data they receive. They must handle it carefully, or they’ll face hefty fines. Companies like Facebook and WhatsApp have also found themselves in hot water with the GDPR. Data protection and responsibility is no longer a laughing matter.
In the broadest sense, GDPR is giving power back to the end user, but at the same time holding companies accountable for any information they request or retrieve from their users. They must protect this data or face the consequences. Sadly, most businesses are only doing the bare minimum to protect the information they have. Companies must encrypt all the data and efficiently manage keys and access control services. Encrypted data is largely useless to anyone who has it unless they have decryption protocols.
Quantum Computing
Crypto-agility has been touted as the future of cyber security. Crypto-agility is a discussion you will come across often as the masses embrace it. The threat to present security protocols become greater with the increase in computing power.
Through crypto-agility, businesses can use algorithms that are flexible such that they can change them without necessarily having to interfere with the system infrastructure, especially if the original encryption fails. What this means is that businesses have the power to protect their interests from threats that are yet to be actualized, like criminals who have harnessed the power of quantum computing before its time. As such, you no longer have to redo the entire security system every year in response to growing computing power.
Artificial Intelligence
The use of artificial intelligence (AI) is rather limited at the moment. However, with increasing computing power, the possibilities of using AI are limitless. There are rumors of a potential AI powered attack with the ability to power down an FTSE 100 company. If this is true, hackers could easily breach a system undetected and obtain as much information as they desire. They will also have time to study the systems and behaviors, adapt to the environment and finally unleash catastrophic attacks that could bring down companies.
AI might soon be implemented in chatbots to engineer unsuspecting victims to click dangerous links, through which their personal files and information are stolen. Hackers might also crack down on websites and applications that are not properly protected, inserting chatbots where they were non-existent.
Ransomware
Until 2017, not many people were aware of ransomware. The WannaCry outbreak and several other attacks that targeted high net worth individuals was just the beginning (“North Korea blamed for WannaCry, PoS attacks and Bitcoin phishing,” 2018; Popli & Girdhar, 2017) . The FBI believes that more than $1 billion has been paid as ransom to the attackers[27] . The ransomware is still in play, though the attacks are relatively subtle. However, experts believe that attackers might come back with a bolder move in the coming years.
This ransomware attacked hundreds of thousands of computers in at least 150 countries. The hackers demand some money to unfreeze computers. Some of the key targets were hospitals, governments, and big companies. Russia, for example, was reported to be one of the hardest hit targets according to a report by Kaspersky Lab. Some of the victims included banks, railways, Russia’s second largest mobile phone operator, Megafon, and the interior ministry.
In Germany, electronic boards at different stations that announce departures and arrivals were affected. However, German representatives do not believe their train services were affected.
Learning institutions in China were victims, too. Students had ransom pop-ups in their laptops, disrupting learning activities in most of the universities. Most learning institutions either use pirated computer software or outdated software, and as a result, students who access their facilities are equally at risk. Students were asked to pay $300 to gain access to their devices and resume working on their projects, most of which having deadlines that were almost due.
The western city of Chongqing struggled to process card payments at petrol stations because the China National Petroleum Corp was infected. In China alone, more than 30,000 businesses, individuals, and institutions were victims.
CJ CGV, the largest cinema chain in South Korea, was also hacked. Their advertisement servers that project to around 50 cinemas were hacked. Japan Computer Emergency Response Team Coordination Center, Hitachi, Dharmais Cancer Hospital in Indonesia, India State Police, NHS in the UK, Telefonica in Spain, Renault in France, Nissan FedEx, and hospitals in Ireland were affected. This is how ransomware can cripple the world. Now imagine a situation where hackers target a country, crippling every important industry.
The interesting thing about the WannaCry ransomware attack is that it exploited a common Windows vulnerability that the NSA also exploits - EternalBlue. EternalBlue is an NSA exploit that was implemented on older Windows operating systems. Microsoft had created patches and released them earlier on to deal with this flaw. Most of those who were affected either ignored the patch or were using older Windows systems that were no longer supported. Through the Windows server message block protocol (SMB), harmful data packets can be sent to your device undetected. The hackers encrypted data in victims’ machines, demanding ransom in Bitcoin. 
Microsoft responded by releasing an emergency patch, helping them stop the attack within a few days. Further research also revealed a kill switch which stopped infected computers from echoing the infection to networks they were connected to. This attack was formally blamed on North Korea by Australia, the UK, and the US in December 2017.
Digital Transformation
Everyone talks about cloud computing or offering cloud services from time to time. Most companies and individuals are migrating their access to cloud service hosts. With most people migrating to the cloud, there is a need to carefully scrutinize the migration processes. Hackers understand that businesses are trying to cut down on operational costs and reduce or eliminate downtime. They could also take advantage of this and piggy-back the migration exercise, then attacking cloud providers and their customers from within.
Nation-State Attacks
Russia is notoriously culpable for targeted cyberattacks to achieve unknown larger objectives. A while back, the FBI revealed that more than half a million home office routers were infected by Sofacy group , a Russian threat actor. This breach also affected networks connected to storage devices all over the world, allowing the hackers enough room to control the systems remotely. Considering that most of the IoT devices are poorly protected, you can expect many other countries to jump on this bandwagon.
Data Weaponization
Did you know that your data and personal information can be used against you? This is a trend that has grown over the years and will only get worse as hackers become more sophisticated. Tech giants are doing their best to safeguard your information. However, are they really doing enough? Look at the case of Facebook, for example. They admitted to using private correspondence and personal data in their possession to generate profits to the tune of billions of dollars. When you like or follow certain brands on Facebook, you further volunteer some information about yourself. This allows Facebook an in-depth look into your life, knowledge that becomes a treasure chest for the advertisers.
Facebook has also been accused of manipulating the moods of their users through an emotional contagion[28] experiment. Facebook was at the center of Cambridge Analytica’s infamous election manipulation practices, as well. Imagine a social network so powerful it can use its data to influence elections in more than one sovereign country. Now, think about hackers wielding this much power; it might be chaotic.
Satellite Attacks
Satellite communications have interested several hack groups in the past. Symantec reported one such successful hack that targeted telecommunication companies in Southeast Asia, especially imaging and geospatial mapping companies. Satellite communications that the military, planes, and ships use to access the internet also have some vulnerabilities that can be exploited.
Some of these scenarios paint a grim picture of the future, but all is not lost yet. Experts believe that multi-factor authentication should be implemented by all businesses. A lot of businesses still use passwords as their only line of defense. Most companies and states have studied the GDPR legislation and are adopting versions of it that are relevant to their cause. In California, for example, as of the year 2020, consumers can sue companies in the aftermath of a data breach. Breaches and vulnerabilities might be impossible to eliminate. However, we can do many things to avoid falling victims and improve our chances of preventing disaster.