Tuesday, January 19, 2021
Techiexpert.com
No Result
View All Result
  • Login
  • Register
  • Home
  • Tech news
  • Startups
  • AI
  • IOT
  • Big Data
  • Cloud
  • Data Analytics
  • ML
  • Blogging
Techiexpert.com
No Result
View All Result

Industry 4.0 Report , Attack scenarios and recommendations – by Trend Micro Research

Srikanth by Srikanth
May 12, 2020
in Tech news
Reading Time: 3min read
A A
0
Industry 4.0 Report , Attack scenarios and recommendations – by Trend Micro Research
40
SHARES
213
VIEWS
Share on FacebookShare on Twitter

 Trend Micro Incorporated , a global leader in cybersecurity solutions, recently released research describing how advanced hackers could leverage unconventional, new attack vectors to sabotage smart manufacturing environments.

For this report, Trend Micro Research worked with Politecnico di Milano in its Industry 4.0 lab, which houses real manufacturing equipment from industry leaders, to demonstrate how malicious threat actors can exploit existing features and security flaws in Industrial IoT (IIoT) environments for espionage of financial gain.

“Past manufacturing cyber attacks have used traditional malware that can be stopped by regular network and endpoint protection. However, advanced attackers are likely to develop Operational Technology (OT) specific attacks designed to fly under the radar,” said Bill Malik, vice president of infrastructure strategies for Trend Micro. “As our research shows, there are multiple vectors now exposed to such threats, which could result in major financial and reputational damage for Industry 4.0 businesses. The answer is IIoT-specific security designed to root out sophisticated, targeted threats.”

“Politecnico di Milano is fully committed to supporting Industry 4.0 in addressing crucial aspects related to security and reliability of automated and advanced controls, especially as they gain relevance in all production sectors and increasingly impact business,” said Giacomo Tavola, Contract Professor in Design and Management of Production Systems and Stefano Zanero, Associate professor in Advanced Cybersecurity Topics for Politecnico di Milano.

ADVERTISEMENT

Critical smart manufacturing equipment relies primarily on proprietary systems, however these machines have the computing power of traditional IT systems. They are capable of much more than the purpose for which they are deployed, and attackers are able to exploit this power. The computers primarily use proprietary languages to communicate, but just like with IT threats, the languages can be used to input malicious code, traverse through the network, or steal confidential information without being detected.

Though smart manufacturing systems are designed and deployed to be isolated, this seclusion is eroding as IT and OT converge. Due to the intended separation, there is a significant amount of trust built into the systems and therefore very few integrity checks to keep malicious activity out.

The systems and machines that could be taken advantage of include the manufacturing execution system (MES), human machine interfaces (HMIs), and customizable IIoT devices. These are potential weak links in the security chain and could be exploited in such a way to damage produced goods, cause malfunctions, or alter workflows to manufacture defective products.

The report offers a detailed set of defense and mitigation measures, including:

  • Deep packet inspection that supports OT protocols to identify anomalous payloads at the network level
  • Integrity checks run regularly on endpoints to identify any altered software components
  • Code-signing on IIoT devices to include dependencies such as third-party libraries
  • Risk analysis to extend beyond physical safety to automation software
  • Full chain of trust for data and software in smart manufacturing environments
  • Detection tools to recognize vulnerable/malicious logic for complex manufacturing machines
  • Sandboxing and privilege separation for software on industrial machines

Complete report

Share6Tweet4Share1Pin26
Srikanth

Srikanth

Passionate Tech Blogger on Emerging Technologies, which brings revolutionary changes to the People life.., Interested to explore latest Gadgets, Saas Programs

Related Posts

Second Edition of SAP-CIIE Startup Accelerator Program Announced
Tech news

5 Ways To Grow Your Startup’s Visibility Online

January 18, 2021
Impact of COVID-19 on Startups Funding
Tech news

Post-Pandemic Investment Management: Why turn to AI

January 17, 2021
Get Maximum Benefit from your LinkedIn App using Piwaa
Tech news

Get Maximum Benefit from your LinkedIn App using Piwaa

January 16, 2021
chatbot customer service
Tech news

25 Virtual Assistant Services You Can Offer Your Clients

January 14, 2021
Learn how to set up automated security testing
Tech news

Majority of DDoS Attacks in 2020 – StormWall Report

January 14, 2021
Broadband – Types & Their Benefits to Cloud Computing
Tech news

Broadband Connection – Types & Their Benefits Explained

January 14, 2021

Leave a Reply Cancel reply

Your email address will not be published. Required fields are marked *

I agree to the Terms & Conditions and Privacy Policy.

Latest Stories

What Should eCommerce Owners Invest in to Improve Their Site
Blogging

What Should eCommerce Owners Invest in to Improve Their Site

by Sony T
January 18, 2021
Second Edition of SAP-CIIE Startup Accelerator Program Announced
Tech news

5 Ways To Grow Your Startup’s Visibility Online

by Sony T
January 18, 2021
Impact of COVID-19 on Startups Funding
Tech news

Post-Pandemic Investment Management: Why turn to AI

by Daglar Cizmeci
January 17, 2021
Get Maximum Benefit from your LinkedIn App using Piwaa
Tech news

Get Maximum Benefit from your LinkedIn App using Piwaa

by Sony T
January 16, 2021
chatbot customer service
Tech news

25 Virtual Assistant Services You Can Offer Your Clients

by Sony T
January 14, 2021
Load More
Techiexpert.com

© 2020 All Rights Reserved

  • Terms of use
  • Privacy Policy
  • About Us
  • Contact us
  • Write For Us
  • Cookie Policy

  • Login
  • Sign Up
No Result
View All Result
  • Home
  • Tech news
  • Startups
  • AI
  • IOT
  • Big Data
  • Cloud
  • Data Analytics
  • ML
  • Blogging

© 2020 All Rights Reserved

Welcome Back!

Login to your account below

Forgotten Password? Sign Up

Create New Account!

Fill the forms below to register

*By registering into our website, you agree to the Terms & Conditions and Privacy Policy.
All fields are required. Log In

Retrieve your password

Please enter your username or email address to reset your password.

Log In
This website uses cookies. By continuing to use this website you are giving consent to cookies being used. Visit our Privacy and Cookie Policy.