Chuck Leaver – Is The Internet Of Things The Newest Cyber Security Threat

Written By David Shefter And Presented By Ziften CEO Charles Leaver

 

 

We are now living in a new world of the Internet of Things (IoT), and the threat of cyber threats and attacks grow greatly. As deployments progress, new vulnerabilities are emerging.

Symantec launched a report this spring which evaluated 50 smart home devices and declared “none of the evaluated devices offered mutual authentication between the client and the server.” Previously this summertime, analysts showed the capability to hack into a Jeep while it was driving on the highway, initially managing the radio, windshield wipers, a/c and lastly cutting the transmission.

Typically, toys, tools, home appliance, and car makers have actually not had to secure against external dangers. Producers of medical devices, elevators, HVAC, electric, and plumbing infrastructure elements (all of which are most likely to be linked to the Web in the coming years) have not always been security conscious.

As we are all mindful, it is tough enough daily to secure PCs, cell phones, servers, and even the network, which have actually been through substantial security monitoring, evaluations and assessments for years. How can you secure alarms, individual electronic devices, and house devices that apparently come out daily?

To start, one must define and think of where the security platforms will be deployed – hardware, software, network, or all the above?

Solutions such as Ziften pay attention to the network (from the device point of view) and utilize innovative machine-type learning to determine patterns and scan for abnormalities. Ziften presently offers a worldwide danger analytics platform (the Ziften KnowledgeCloud), which has feeds from a variety of sources that makes it possible for review of 10s of millions of endpoint, binary, MD5, etc data today.

It will be a challenge to release software onto all IoT devices, a number of which make use of FPGA and ASIC designs as the control platform(s). They are typically incorporated into anything from drones to vehicles to commercial and scada control systems. A large number of these devices run on solid-state chips without a running os or x86 type processor. With inadequate memory to support advanced software, many merely can’t support contemporary security software. In the realm of IoT, additional customization develops risk and a vacuum that strains even the most robust systems.

Solutions for the IoT space need a multi-pronged technique at the endpoint, which encompasses desktops, laptop computers, and servers presently combined with the network. At Ziften, we presently provide collectors for Windows, Linux, and OS X, supporting the core desktop, server, and network infrastructure that contains the intellectual property and assets that the opponents look for to obtain access to. After all, the bad guys do not truly want any info from the company refrigerator, however simply want to use it as a conduit to where the important data resides.

Nevertheless, there is an extra method that we deliver that can help minimize many present concerns: scanning for abnormalities at the network level. It’s thought that generally 30% of devices connected to a corporate network are unknown IP’s. IoT trends will likely double that number in the next ten years. This is one of the reasons connecting is not always an obvious choice.

As more devices are linked to the Web, more attack surfaces will emerge, resulting in breaches that are much more damaging than those of email, financial, retail, and insurance – things that might even position a risk to our lifestyle. Protecting the IoT needs to make use of lessons learned from traditional enterprise IT security – and offer several layers, integrated to supply end-to-end robustness, capable of preventing and detecting risks at every level of the emerging IoT value chain. Ziften can help from a wide range of angles today and in the future.

~leaverchuck1


No Responses Yet to “Chuck Leaver – Is The Internet Of Things The Newest Cyber Security Threat”

Leave a Reply