by clicking on the page. A slider will appear, allowing you to adjust your zoom level. Return to the original size by clicking on the page again.
the page around when zoomed in by dragging it.
the zoom using the slider on the top right.
by clicking on the zoomed-in page.
by entering text in the search field and click on "In This Issue" or "All Issues" to search the current issue or the archive of back issues respectively.
by clicking on thumbnails to select pages, and then press the print button.
this publication and page.
displays a table of sections with thumbnails and descriptions.
displays thumbnails of every page in the issue. Click on a page to jump.
allows you to browse through every available issue.
GCN : January 2014
24 GCN JANUARY 2014 • GCN.COM 9. CRITICAL INFRASTRUCTURE AWAKENS TO THREATS. Threats to critical infrastructure are closely related to the Inter- net of Things. The nation's power grids, financial systems and utilities all are becoming networked, often linking control system software that was never intended to be exposed to the Internet. Research on vulnerabilities will lead to increased exploits of this critical infrastructure, says SAFECode's Schmidt. Although malicious exploits so far have been few, breaches and compromises in critical systems have been reported. The financial services sector, which is heavily regulated, has the most mature security posture, but "all areas need to awaken to the problem," says Bit9's Levay. The National Institute of Standards and Technology is devel- oping a cybersecurity framework for critical infrastructure under a presidential policy directive, but compliance will be voluntary. Control system software and device firmware need the same level of scrutiny as higher level software, Schmidt says. 10. THE WILD CARD: WEARABLE COMPUTERS. The idea of wearable computers has been around for a while, but it is now moving from fiction to production. Samsung has its Galaxy Gear smart watch and Microsoft is prototyping its own smart watch, while Google is beta testing its Google Glass. The concept is not yet fully baked, said Prescient's Irvine. But half- baked or not, it looks as if it is here. "I am a new owner of Google Glass," he said. RSA's Nair predicts that "2014 looks to be the year when the wearable trend goes mainstream for government," and other markets. "Vendors should be looking to build security into their wearable devices and applications now --- and not view security as an afterthought. Otherwise, a trend for 2015 could be the stories of personal information being leaked from these devices." However, the government, and especially the military, really wants wearable technology to work. The latest technology buzz belongs to Motorola's HC1 Headset Computer, which might sat- isfy the Air Force's need for a computer for its techs to wear when lugging a notebook won't suffice. Even the best wearable gear requires users to put a hard drive, memory and input devices on their head or in a backpack. Other devices emerged in 2013 that show a possible path for wearable systems. Instead of trying to build everything into a wearable computer, these devices focus on the input side of design, leaving the brains and power of the operation to the smartphone, which most users already carry. Google Glass is the most visible of the new wearable tech- nologies. Essentially, Google Glass adds voice commands and a glasses-based data display to an existing phone. The second big device to hit the market is the Samsung Galaxy Gear watch, which offers a minimalist interface and also connects back to a smartphone. So far, attention to security in these devices appears to be minimal and the introduction of wearable technology can make the mere presence of an individual a cybersecurity risk. "This is not a risk that can be addressed by automation," Irvine said. "It requires policy." --- This story was written by John Breeden, Shawn McCarthy, William Jackson, and Rutrell Yasin. #10 WHAT'S AHEAD IN 2014 #9