{"id":1371,"date":"2018-10-25T05:56:24","date_gmt":"2018-10-25T04:56:24","guid":{"rendered":"https:\/\/rosetta.vn\/short\/?p=1371"},"modified":"2018-10-25T15:46:58","modified_gmt":"2018-10-25T14:46:58","slug":"3-cybersecurity-challenges-for-iiot-industrial-internet-of-things-devices-in-2018-robotics-business-review","status":"publish","type":"post","link":"https:\/\/rosetta.vn\/short\/2018\/10\/25\/3-cybersecurity-challenges-for-iiot-industrial-internet-of-things-devices-in-2018-robotics-business-review\/","title":{"rendered":"3 Cybersecurity Challenges for IIoT (Industrial Internet of Things) Devices in 2018 &#8211; Robotics Business Review"},"content":{"rendered":"<p>S\u1ea3n ph\u1ea9m IoT d\u00f9ng trong c\u00f4ng nghi\u1ec7p s\u1ebd c\u00f3 tu\u1ed5i \u0111\u1eddi d\u00e0i h\u01a1n (so v\u1edbi d\u00e2n d\u1ee5ng), n\u00ean kh\u1ea3 n\u0103ng b\u1ecb hack l\u00e0 cao h\u01a1n; d\u1eef li\u1ec7u l\u01b0u trong \u0111\u00f3 c\u00f3 th\u1ec3 b\u1ecb l\u1ed9 ho\u1eb7c b\u1ecb thay \u0111\u1ed5i; khi thi\u1ebft b\u1ecb \u0111\u01b0\u1ee3c k\u1ebft n\u1ed1i v\u1edbi internet th\u00ec c\u00f3 th\u1ec3 b\u1ecb l\u1ee3i d\u1ee5ng, c\u00f3 th\u1ec3 kh\u00f4ng c\u1ea7n \u0111\u1ec3 \u0103n c\u1eafp b\u00ed m\u1eadt m\u00e0 ch\u1ec9 l\u00e0 b\u1ecb k\u00fd sinh \u0111\u1ec3 d\u00f9ng &#8220;ch\u00f9a&#8221; n\u0103ng l\u1ef1c t\u00ednh to\u00e1n c\u1ee7a thi\u1ebft b\u1ecb. T\u00e1c gi\u1ea3 k\u1ebft lu\u1eadn l\u00e0 c\u00e1c c\u00f4ng ty c\u0169ng c\u1ea7n \u0111\u1ed1i x\u1eed v\u1edbi c\u00e1c chip nh\u1ecf x\u00edu trong Industrial IoT nh\u01b0 l\u00e0 v\u1edbi m\u00e1y t\u00ednh b\u00ecnh th\u01b0\u1eddng: c\u1ea7n c\u00f3 bi\u1ec7n ph\u00e1p b\u1ea3o v\u1ec7, ch\u1ed1ng l\u1ed9 th\u00f4ng tin, ch\u1ed1ng ph\u1ea7n m\u1ec1m \u0111\u1ed9c h\u1ea1i.<\/p>\n<blockquote><p>As the clock ticks towards a massive and preventable cyberattack on IIoT devices, manufacturers and companies deploying them must address three challenges.<\/p>\n<h2>IIoT device exploits last longer than exploits against IoT devices<\/h2>\n<p>Mirai, Reaper, and other IoT botnets have flourished due to poor security controls, like hard-coded passwords, and a lack of encryption on consumer-grade IoT devices such as baby monitors, security cameras, and DVRs.<\/p>\n<p>Manufacturers of consumer IoT devices, however, assume a level of obsolescence as consumers upgrade to the latest and greatest while recycling or disposing of the older devices. This means that the cybersecurity of the consumer IoT space will probably slowly improve, assuming vendors continue to incorporate modern security practices in their product lifecycle.<\/p>\n<p>In contrast, the lifespan of an IIoT device is seven to 10 years. This means that\u00a0<a href=\"https:\/\/futurism.com\/hacking-robots-easy\/\" target=\"_blank\" rel=\"noopener\">security exploits<\/a>\u00a0in the IIoT space have a far longer lifespan than in the consumer space.<\/p>\n<p>For example, an IIoT ransomware campaign that disables sensors on offshore oil pumps until a payment is received could repeatedly be used against companies if there is no means of updating the software running on those sensors for a decade.<\/p>\n<div id=\"attachment_41375\" class=\"wp-caption alignright\">\n<p><img decoding=\"async\" loading=\"lazy\" class=\"size-medium wp-image-41375\" src=\"https:\/\/i0.wp.com\/rosetta.vn\/short\/wp-content\/uploads\/sites\/3\/2018\/10\/109780097-300x300.jpg?resize=300%2C300&#038;ssl=1\" alt=\"Cybersecurity includes protecting IIoT devices\" width=\"300\" height=\"300\" data-recalc-dims=\"1\" \/><\/p>\n<p class=\"wp-caption-text\">There are multiple approaches to securing IIoT devices such as robots.\u00a0<em>Source:<\/em>\u00a0ClipArt.com<\/p>\n<\/div>\n<p>The potential environmental and economic damages of an offshore oil pump malfunctioning due to a ransomware campaign would encourage rapid payments to third-party attackers.<\/p>\n<p>There are at least two apparent solutions in this space. First,\u00a0<a href=\"https:\/\/www.robotics.org\/content-detail.cfm\/Industrial-Robotics-Industry-Insights\/Cybersecurity-a-Must-for-Safe-IIoT-Robots\/content_id\/7251\" target=\"_blank\" rel=\"noopener\">manufacturers might<\/a>\u00a0add encryption to IIoT devices. The trade-off in adding even light encryption is that the added processing will shorten battery life.<\/p>\n<p>This can be mitigated by either providing higher-capacity batteries and increasing costs, or by forcing obsolescence, which would be an inelegant and expensive way to force updates into the IIoT ecosystem.<\/p>\n<p>The alternate strategy is for companies purchasing IIoT devices to treat them the same as any other endpoint device\u00a0<a href=\"https:\/\/www.networkworld.com\/article\/3269165\/internet-of-things\/a-corporate-guide-to-addressing-iot-security-concerns.html\" target=\"_blank\" rel=\"noopener\">connecting to the corporate network<\/a>. Reasonable organizations now require that laptops, desktops, smartphones, and virtual desktop infrastructure (VDI) all support software updates with minimal downtime.<\/p>\n<p>Incorporating a requirement that new IIoT devices support remote discreet software updates will help manage the risk of deploying hundreds of thousands of devices with unknown security vulnerabilities.<\/p>\n<h2>Third-party attackers may inject false data or tamper with existing data<\/h2>\n<p>One of the major trends in IIoT is to focus on reducing break-fix maintenance costs with preventative maintenance. Some studies cite up to a 30% reduction in costs associated with this model.<\/p>\n<div class=\"fw-sidebar left-sidebar\">\n<h3>More on IIoT and Cybersecurity:<\/h3>\n<ul>\n<li><a href=\"https:\/\/www.roboticsbusinessreview.com\/events\/big-data-management-pre-robobusiness\/\" target=\"_blank\" rel=\"noopener\">Big Data Management the Focus of Workshop Before RoboBusiness 2018<\/a><\/li>\n<li><a href=\"https:\/\/www.roboticsbusinessreview.com\/manufacturing\/transformative-technologies-shape-manufacturing\/\" target=\"_blank\" rel=\"noopener\">Transformative Technologies Shape the Future of Manufacturing, Says Report<\/a><\/li>\n<li><a href=\"https:\/\/www.roboticsbusinessreview.com\/engineering\/omron-automation-releases-nx1-controller-iiot\/\" target=\"_blank\" rel=\"noopener\">Omron Automation Releases NX1 Controller for IIoT Applications<\/a><\/li>\n<li><a href=\"https:\/\/www.roboticsbusinessreview.com\/ai\/ca-accelerator-horizon-2020-next-gen-ai-iot\/\" target=\"_blank\" rel=\"noopener\">CA Accelerator, Horizon 2020 Projects Build Toward Next-Gen Automation, IoT<\/a><\/li>\n<li><a href=\"https:\/\/www.roboticsbusinessreview.com\/security\/robot-ransomware-vulnerability-researchers\/\" target=\"_blank\" rel=\"noopener\">Researchers: Robots Vulnerable to Ransomware<\/a><\/li>\n<li><a href=\"https:\/\/www.roboticsbusinessreview.com\/manufacturing\/an-introduction-to-the-internet-of-things\/\" target=\"_blank\" rel=\"noopener\">Infographic: An Introduction to the Internet of Things<\/a><\/li>\n<li><a href=\"https:\/\/www.roboticsbusinessreview.com\/ai\/ai-iot-smart-sensors-preserve-lake-george\/\" target=\"_blank\" rel=\"noopener\">How AI and IoT Sensors Are Preserving a Lake Ecosystem<\/a><\/li>\n<li><a href=\"https:\/\/www.roboticsbusinessreview.com\/manufacturing\/data-management-important-building-iot-framework\/\" target=\"_blank\" rel=\"noopener\">Why Data Management Is Important for Building an IoT Framework<\/a><\/li>\n<li><a href=\"https:\/\/www.roboticsbusinessreview.com\/download\/industrial-internet-things-putting-it-all-together\/\" target=\"_blank\" rel=\"noopener\">The Industrial Internet of Things: Putting It All Together<\/a><\/li>\n<li><a href=\"https:\/\/www.roboticsbusinessreview.com\/events\/iot-tech-and-ai-to-grow-beyond-bots-and-bitcoin\/\" target=\"_blank\" rel=\"noopener\">IoT Tech and AI to Grow Beyond Bots and Bitcoin<\/a><\/li>\n<li><a href=\"https:\/\/www.roboticsbusinessreview.com\/legal\/robot_cybersecurity_needs_to_be_on_governments_radar\/\" target=\"_blank\" rel=\"noopener\">Robot Cybersecurity Needs to Be on Governments\u2019 Radar<\/a><\/li>\n<\/ul>\n<\/div>\n<p>For example, a service that diagnoses and predicts aircraft maintenance issues based on sensors deployed from the tip to the tail of the airplane can help reduce \u201cunscheduled maintenance,\u201d that dreaded phrase heard by frequent flyers the world over.<\/p>\n<p>Similarly, a service that predicts hardware failures on farm machinery can help to improve operational efficiencies by scheduling maintenance when the machinery is not in use.<\/p>\n<p>Companies subscribing to these services will receive these benefits, however, only if the data being sent to the remote monitoring service has not been tampered with. This tampering can happen in at least one of two ways.<\/p>\n<p>In the first scenario, attackers with physical access to the monitored hardware \u2014 airplane, tractor, oil pump, etc. \u2014 would need to introduce a device that would transmit falsified data into the monitoring service.<\/p>\n<p>The alternate attack vector is to compromise and modify the central store of monitoring data. Although this is a remote exploit, it is not novel. Companies have been breached and found evidence of tampering in their files and data after the fact.<\/p>\n<p>There are at least three visible solutions to this threat. The first, and most obvious, is to not rely solely on remote monitoring services instead of physical inspections whenever workable.<\/p>\n<p>A second solution is to conduct periodic and rigorous inventories of deployed IIoT devices to ensure that no new and previously unknown devices have been deployed.<\/p>\n<p>The third potential solution is to\u00a0<a href=\"https:\/\/aitrends.com\/security\/whose-team-is-artificial-intelligence-on-the-corporations-or-hackers\/\" target=\"_blank\" rel=\"noopener\">leverage artificial intelligence<\/a>\u00a0<a href=\"https:\/\/betakit.com\/ai-the-ai-times-ai-for-cybersecurity-is-the-hot-new-thing\/\" target=\"_blank\" rel=\"noopener\">to identify<\/a>\u00a0anomalous or aberrant data trends that would be submitted to a human analyst for attention.<\/p>\n<p>For example, if all deployed engines have an average time between maintenance of 6,000 hours that is detected using an IIoT sensor, an engine running at 6,200 hours with sensors reporting \u201call clear\u201d could require manual inspection despite the lack of a \u201ccheck engine\u201d light calling attention to this.<\/p>\n<h2>The proliferation of IIoT devices is no excuse to stop segmenting networks<\/h2>\n<p>It might seem expedient to skip network configuration and limit network connectivity to IIoT devices when deploying potentially thousands of devices under an accelerated time frame.<\/p>\n<div id=\"attachment_41376\" class=\"wp-caption alignright\">\n<p><img decoding=\"async\" loading=\"lazy\" class=\"size-medium wp-image-41376\" src=\"https:\/\/i0.wp.com\/rosetta.vn\/short\/wp-content\/uploads\/sites\/3\/2018\/10\/109748373-300x300.jpg?resize=300%2C300&#038;ssl=1\" alt=\"Now's the time to add cybersecurity to IIoT devices. \" width=\"300\" height=\"300\" data-recalc-dims=\"1\" \/><\/p>\n<p class=\"wp-caption-text\">Now\u2019s the time to add cybersecurity to IIoT devices.\u00a0<em>Source:<\/em>\u00a0ClipArt.com<\/p>\n<\/div>\n<p>Allowing connectivity to speed up deployment, however, carries the risk of allowing unwanted network connections from third-party attackers. The Shodan search engine makes it particularly easy for both legitimate security researchers and third-party attackers to identify IIoT devices that acknowledge their\u00a0<a href=\"https:\/\/indianexpress.com\/article\/technology\/science\/study-suggests-robots-when-left-unsecured-on-internet-allow-hackers-to-control-them-5284382\/\" target=\"_blank\" rel=\"noopener\">connectivity to the public Internet<\/a>.<\/p>\n<p>As noted earlier, from a cybersecurity and policy perspective, organizations should not treat IIoT devices differently than any other computing device. An unprotected IIoT device can serve as an initial bridgehead for part of a larger cyberattack by a dedicated third-party attacker.<\/p>\n<p>Alternatively, third parties might avoid the trouble of exfiltrating company manufacturing data and instead focus on mining cryptocurrency, an attack that would be visible only as a performance degradation on the IIoT devices.<\/p>\n<p>The aforementioned risks pertaining to IIoT are preventable given sufficient thought and secure hardware. The modern reality of cybersecurity is that third-party attackers are running illegitimate businesses and face the same budget, staffing, and time constraints as legitimate enterprises.<\/p>\n<p>Most third-party attackers will pursue those companies that do not focus on securing their IIoT and other computing devices. This is the same rationale that burglars use when evaluating mansions with security systems and guard dogs in comparison with residential homes with unlocked front doors. Companies need to deploy these simple solutions to stop the next watershed moment in IIoT security.<\/p>\n<p><img decoding=\"async\" loading=\"lazy\" class=\"alignleft size-medium wp-image-41373\" src=\"https:\/\/i0.wp.com\/rosetta.vn\/short\/wp-content\/uploads\/sites\/3\/2018\/10\/Kayne-McGladrey-300x300.jpg?resize=300%2C300&#038;ssl=1\" alt=\"Kayne McGladrey\" width=\"300\" height=\"300\" data-recalc-dims=\"1\" \/><\/p>\n<h3>About the Author:<\/h3>\n<p>Kayne McGladrey is an\u00a0<a href=\"https:\/\/www.ieee.org\/\" target=\"_blank\" rel=\"noopener\"><span class=\"il\">IEEE<\/span><\/a>\u00a0member and the information security services director at Integral Partners with 20+ years of experience in cybersecurity and identity and access management across financial, healthcare, retail, government, and manufacturing organizations. He has been interviewed by\u00a0<em>HITInfrastructure, CSHub, ESecurityPlanet, DZone, CSO Online, USA Today, Fast Company, Quartz<\/em>, the Insider Threat Podcast, and Cheddar. McGladrey\u2019s writing has been featured in\u00a0<em>(IN)Secure Magazine, ISSA Journal<\/em>, and\u00a0<em>PSVillage<\/em>. He has presented on cybersecurity to\u00a0<span class=\"il\">IEEE<\/span>-USA and the Clear Law Institute. He created the first industry-recognized online class about the fundamentals for professional services management.<\/p><\/blockquote>\n<p>Source: <em><a href=\"https:\/\/www.roboticsbusinessreview.com\/security\/iiot-devices-3-cybersecurity-challenges\/\">3 Cybersecurity Challenges for IIoT Devices in 2018 &#8211; Robotics Business Review<\/a><\/em><\/p>\n","protected":false},"excerpt":{"rendered":"<p>S\u1ea3n ph\u1ea9m IoT d\u00f9ng trong c\u00f4ng nghi\u1ec7p s\u1ebd c\u00f3 tu\u1ed5i \u0111\u1eddi d\u00e0i h\u01a1n (so v\u1edbi d\u00e2n d\u1ee5ng), n\u00ean kh\u1ea3 n\u0103ng b\u1ecb hack l\u00e0 cao h\u01a1n; d\u1eef li\u1ec7u l\u01b0u trong \u0111\u00f3 c\u00f3 th\u1ec3 b\u1ecb l\u1ed9 ho\u1eb7c b\u1ecb thay \u0111\u1ed5i; khi thi\u1ebft<\/p>\n","protected":false},"author":2,"featured_media":0,"comment_status":"closed","ping_status":"open","sticky":false,"template":"","format":"standard","meta":{"_mi_skip_tracking":false},"categories":[30],"tags":[955,957,956,954],"jetpack_featured_media_url":"","jetpack_shortlink":"https:\/\/wp.me\/p8jhJx-m7","_links":{"self":[{"href":"https:\/\/rosetta.vn\/short\/wp-json\/wp\/v2\/posts\/1371"}],"collection":[{"href":"https:\/\/rosetta.vn\/short\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/rosetta.vn\/short\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/rosetta.vn\/short\/wp-json\/wp\/v2\/users\/2"}],"replies":[{"embeddable":true,"href":"https:\/\/rosetta.vn\/short\/wp-json\/wp\/v2\/comments?post=1371"}],"version-history":[{"count":2,"href":"https:\/\/rosetta.vn\/short\/wp-json\/wp\/v2\/posts\/1371\/revisions"}],"predecessor-version":[{"id":1398,"href":"https:\/\/rosetta.vn\/short\/wp-json\/wp\/v2\/posts\/1371\/revisions\/1398"}],"wp:attachment":[{"href":"https:\/\/rosetta.vn\/short\/wp-json\/wp\/v2\/media?parent=1371"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/rosetta.vn\/short\/wp-json\/wp\/v2\/categories?post=1371"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/rosetta.vn\/short\/wp-json\/wp\/v2\/tags?post=1371"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}