The senior product manager for the internet of things service at Dell EMC made a presentation recently where he explained that it is possible for the enterprises on the internet to protect their deployments for the internet of things. The concerns about security for the internet of things are growing considerably in number. However, in industrial areas the issues are seen to be the most problematic. In such regions, the devices which are connected are often responsible for controlling the heavy machinery.
It also controls the systems which are too dangerous. The examples include the Stuxnet worm. This took down one of the large nuclear centrifuges. There were attacks which also took down some of the power grids in the Ukraine region. These are seen as weapons that are confined to the region of cyber warfare. A huge number of industrial systems get connected each day. Hence, similar types of attacks can be seen in the businesses of the future. Some of the major trends which affect this industry have been explained through the presentation.
Understanding the Concerns
Many of the IoT devices come with minimum control from the manufacturers. At times, there is no control at all. Some of the concerns include clarity of the ownership of the asset, a lack in the standardization of the product, issues with a flat network, patch management which is inefficient, constraints with resources and so on.
Studying the Trends of the Attacks
The recent denial of services attack which was distributed by the Mirai Botnet took down many popular services offered by DNS. It left a couple of internet companies completely out of commission. Most of the companies associated with the internet of things have very little or no credentials at all. Some have default credentials only. The Mirai Botnet was seen to spread very rapidly. A security framework was also built as a result. It was built in order to surround Mirai. It can be leveraged by a number of different companies in order to protect it against any type of attacks in the future.
Moreover, the ransom ware being used is moving from the different files to the devices. The attackers are beginning to be the target of the internet of things devices. Most of the attackers also exploit the old time vulnerabilities that are present. Such vulnerabilities have not been updated as of now. The services for searches also offer a much wider look in to the open devices of the internet of things.
Evaluating the Risks
The internet of things needs both OT as well as it to function together. The two have completely different aims. IT is more concerned with the infrastructure, governance and security of the system. OT focuses on the yield, efficiency and the quality of the system. Hence, businesses must clearly know who has to be involved in the deployment of the internet of things. It is necessary for all the employees in the company to have a shared mission in order to approach the security in a different manner.