Emerging Risk Topics

Posted on 2011-04-27
Medium Priority
Last Modified: 2012-05-11
We have been asked to put forward some suggestions on “interesting” IT presentations that would be classed as emerging topics – i.e. advances/new technologies in IT that need to be addressed from a risk angle / security perspective. The target audience will be security/audit/risk professionals.

Has anyone any suggestions or topics you would like to here about if you were invited to a risk/security seminar (needs to be relatively technical but not overly). I though about risks associated with cloud computing / virtualization as they are still relatively new concepts in some businesses, but could do with a list of about 5. It doesn’t have to just be security but any new (last 5 year or so) interesting risk based topics on new emerging IT issues that you are aware of?

So, any emerging issues that would be of interest to security/network/risk professionals that you can think of? And namely the issues that security/risk professionals face with these emerging issues/technologies/arrangements?
Question by:pma111

Accepted Solution

zazagor earned 500 total points
ID: 35474153
One major risk is social engineering with regarding to the new social networks Facebook, Twitter etc.
Social engineering is when manipulating people into performing actions and disclosing confidential information, rather than by breaking in or using technical cracking techniques. While similar to a confidence trick or simple fraud, the term typically applies to trickery or deception for the purpose of information gathering, fraud, or computer system access; in most cases the attacker never comes face-to-face with the victim. Social Engineering has also been employed by bill collectors, skiptracers, and bounty hunters.

"Social engineering" as an act of psychological manipulation was popularized by hacker-turned-consultant Kevin Mitnick. The term had previously been associated with the social sciences, but its usage has caught on among computer professionals.

A study by Google researchers analyzing fake AV distribution found that up to 90% of all domains involved in distributing fake antivirus software used social engineering techniques.

REFERENCE: http://en.wikipedia.org/wiki/Social_engineering_(security)

LVL 63

Assisted Solution

by:☠ MASQ ☠
☠ MASQ ☠ earned 500 total points
ID: 35478531

Featured Post

 The Evil-ution of Network Security Threats

What are the hacks that forever changed the security industry? To answer that question, we created an exciting new eBook that takes you on a trip through hacking history. It explores the top hacks from the 80s to 2010s, why they mattered, and how the security industry responded.

Question has a verified solution.

If you are experiencing a similar issue, please ask a related question

If you are like me and like multiple layers of protection, read on!
The Internet has made sending and receiving information online a breeze. But there is also the threat of unauthorized viewing, data tampering, and phoney messages. Surprisingly, a lot of business owners do not fully understand how to use security t…
The Email Laundry PDF encryption service allows companies to send confidential encrypted  emails to anybody. The PDF document can also contain attachments that are embedded in the encrypted PDF. The password is randomly generated by The Email Laundr…
In a question here at Experts Exchange (https://www.experts-exchange.com/questions/29062564/Adobe-acrobat-reader-DC.html), a member asked how to create a signature in Adobe Acrobat Reader DC (the free Reader product, not the paid, full Acrobat produ…

850 members asked questions and received personalized solutions in the past 7 days.

Join the community of 500,000 technology professionals and ask your questions.

Join & Ask a Question