Skip to main content
Title

Why Cybersecurity Is a Losing Game

KEY PLAYERS OF CYBER ATTACKS

In the recent publication of MIT Technology Review on "Cyber Attacks"[1], among other things cyber criminals, cyber-spies, hacktivists, and state-sponsored actors are key players.

 

NINE CYBER ATTACK PATTERNS

Nine classification patterns covered the majority (92%) of 100,000 security incidents of past 10 years, according to Verizon's 2013 study [2].

The basic patterns are listed below.

1. Point of Sales Intrusions

2. Web Application Attacks

3. Insider and Privilege Misuse

4. Physical Theft and Loss

5. Crimeware

6. Payment Card Skimmers

7. Cyber Espionage

8. Denial of Service

9. Miscellaneous Errors

 

LOSING GAME

Four main cyber attack categories can be mapped to the nine attack patterns (see Appendix)

1. Attacks on Technical Weaknesses (Vulnerability Attacks)

- Refer to xx-CERT lists and exploit-db items

2. Attacks on Trusted Elements (Trust Exploitation Attacks)

- Install implants / backdoors in hardware and software

3. Attacks on What You Don't Know (Ignorance Attacks)

- Install unnoticed keylogger, wifi access points

4. Attacks on What You Don't Care (Apathy Attacks)

- Physical insecure backdoor, emergency exits, cargo lifts, etc.

 

Most of our current cyber security models and tools focus on Vulnerability Attacks and pay insufficient attention to Trust Exploitation Attacks, Ignorance Attacks and Apathy Attacks. The cyber attackers will continue to exploit the weakest links of technology and people.

 

REFERENCES

[1] http://www.technologyreview.com/view/528861/cyber-attacks/

[2] http://www.verizonenterprise.com/resources/reports/rp_data-breach-investigations-report-2013_en_xg.pdf

 

APPENDIX

APPENDIX