Take a Virtual, Interactive Tour 

Cyber Security, People, Places, and Things

  |  
4 Min Read

What’s Trending in 2021 for InfoSec?

The top information security trends of 2021 will be industrial control systems in relation to critical infrastructure and supply chain security. We know that India suffered a targeted cyber attack of their Kudankulam Nuclear Power Plan in 2019 and Pakistan suffered a Netwalker ransomware attack on their power supplier K-Electric. The famous Solar Winds attack is a good representation of failed supply chain security.

Increased tensions globally will continue to fan the flames of cyber warfare. It can be very difficult to directly target a government or military entity and such attacks provide a tremendous risk of retaliation. The best alternative is to simply feign ignorance and blame criminal actors while using tools such as ransomware to disrupt the electrical grid or to destroy manufacturing capabilities of your target.

I do not have a crystal ball and I cannot see into the future, but I can infer from previous attacks that have been found to be successful that we will see attackers continue to target the supply chain of manufacturers as well as software developers and critical infrastructure. These attacks work and they get results and that is the most important aspect of conducting an attack. Any individual who may be concerned about cyber attacks can enhance their security by employing two tools. The first tool is a Network Intrusion Detection System, Snort is a good choice. This allows you to monitor your network for abnormal activity but does require some level of technical acumen and you must also figure out what an appropriate baseline looks like.

The second set of tools you can use are known as Source Code Analysis tools. There are many different tools designed for source code analysis and it will require that you know what languages you are using to find the right one. Individuals who do web development using PHP might be well served by the tool PHPStan. Regardless of the tool you choose, the concepts are the same. You want a tool that will assist you in verifying the integrity and quality of your code while also looking for common mistakes.


Interested in cyber security? UAT offers a variety of degree choices, from associate to master degree options. Review the programs available at https://www.uat.edu/cyber-security-degrees, and contact admissions@uat.edu to get started!

CyberCave_Tom

Comment

The Sixth Day of Techmas: UAT's 6 Top Blogs of 2025

On the 6th day of Techmas, we’re celebrating University of Advancing Technology's (UAT) six top blogs of 2025! From Artificial Intelligence (AI) art reaching the Moon to award-winning hackathon wins, ...
Picture of Katy Toerner Katy Toerner 4 Min Read

The Fourth Day of Techmas - 4 Cybersecurity tips from UAT's Cyber Faculty

On the fourth day of Techmas, University of Advancing Technology's (UAT) Cyber Security Faculty are here to help you stay safe online this holiday season! From phishing scams disguised as festive ...
Picture of Katy Toerner Katy Toerner 4 Min Read

Staying Secure: Best Practices for National Computer Security Day

Happy National Computer Security Day! To celebrate this, we are going to go over 4 tips and why they are important to keep your computer safe. We when we look at risk, one of the biggest indicators ...
Picture of Sarah Bunce Sarah Bunce 4 Min Read