| Luis Medina | |
In 2003 and beyond, hackers will employ new methodologies and schemes to bring users indirectly to the hacker's attacks as opposed to bringing the attacks to network or remote users. Hackers will utilize new techniques and compromise Web sites (banks, universities, businesses, etc.) and transparently recruit users to involuntarily assist in a widespread attack against the compromised Web sites.
The viable venue for a hacker's paradise will continue to be any application resident in memory on a server or host (with a port to spare) outside or behind a firewall. Hackers have written their thesis statement to the industry that no servers nor firewalls nor desktops are out of their reach. They will continue to control the landscape that is the network that controls you.
The new security frontier will continue as an undeveloped field
Requires Free Membership to View
Hackers will continue to operate under the guise of normalcy to recruit hosts and gain an involuntarily start from users in developing their attacks. Another hacker will cross the bridge and surrender his identity to authorities and ask for redemption in an attempt to confound the wise.
>>Visit Luis' Ask the Expert section
>>Read Luis' "Weakest Link" series of security articles
Network Management Strategies for the CIO

Join the conversationComment
Share
Comments
Results
Contribute to the conversation