Identifying Perpetrators of Cyberattacks "Getting Tougher"

Cybersecurity is becoming increasingly challenging as identifying attackers by their weaponry is difficult to their invisible nature wherein attacks can be launched by a group of hacktivist or sponsored by a nation, according to an expert.

Bruce Schneier, a leading voice on cybersecurity, said a majority of organisations and individuals use the same run-of-the-mill 'warlike weaponry' at a time when the attackers are largely unknown, cybercrime is becoming more difficult to combat.

While the IT security industry knows how to deal with high volume, low-focus attacks, security professionals must be resilient and ensure better management of incident responses in order for organisations to thrive even in the face of a cyberattack, he said.

During his keynote presentation at the third Gulf Information Security Expo and Conference (Gisec) held in Dubai recently, Schneier explained that organisations must create crisis management strategies that would allow them to respond quickly and effectively, while those responsible for the attacks are still being identified.

The key learnings from the much talked-about hacking of Sony Entertainment last year and underlined the top seven issues of cyber risks.

These include the theoretic of cyberwar, the vulnerabilities of everyone to cyberattacks, the difficulty of providing cybersecurity, the democratisation of tactics, the difficulty of immediately identifying perpetrators of cyberattacks, the difficulty in responding, and the importance of resilience.

Schneier, who is the chief technology officer of Resilient Systems and a Fellow at the Berkman Center for Internet and Society at Harvard Law School in the US, also showcased his book 'Data and Goliath: The Hidden Battles to Collect Your Data and Control Your World', at Gisec.

Categories: Articles, Text

Photo of Bruce Schneier by Per Ervland.

Schneier on Security is a personal website. Opinions expressed are not necessarily those of IBM Resilient.