Security: What Are the Latest Issues and Threats?

2023-01-16
关注

Unlike typical cyberattacks, an Internet of Things (IoT) security breach can affect virtual and physical systems. Imagine a hacker manipulating factory equipment, health care devices or a household’s smart locks — the damage could be enormous.

As the number of IoT devices and cybercrime costs escalate, so does the necessity of robust IoT security.

Connect manage and secure your IoT deployment. Request a consultation.

The Latest IoT Security Issues and Threats 

Emerging IoT security challenges jeopardize the sensitive data of brands and their customers. Therefore, companies must understand the new threat landscape.

Cloud and Edge Computing

The advent of cloud and edge computing has contributed to the rise of beneficial changes, like working from home. Nevertheless, most organizations don’t have the technology or practices to maintain IoT network security during and after this transition.

Edge computing could introduce several security vulnerabilities that create a larger attack surface for attackers to exploit. Data processing at the edge could accelerate data analysis and reduce latency. These results can allow edge implementation of artificial intelligence (AI) and machine learning (ML) models and provide advantages for some vertical applications.

This paradigm introduces a different risk model that must be considered to mitigate risks to data integrity, confidentiality and authenticity. The security challenges could include:

  • Physical protection of the edge device
  • Authenticity of local data taken from sensors
  • Confidentiality of data collected and stored locally at the edge

Moreover, adopting a decentralized and distributed data system should emphasize secure attestation of edge computing devices with cloud computing applications. Ensuring these devices are secure would address the risk of potential counterfeits or frauds.

Increasing Complexity

People are an irreplaceable asset to any business. However, they also represent the greatest strengths and weaknesses of security and privacy in IoT.

IoT environments are becoming more interconnected and multifaceted. This complexity often means human error is the leading cause of cybersecurity breaches. A company’s IoT network security can be at risk from operators and other human actors unaware of the threat landscape.

5G Challenges for IoT Security

Although 5G will be more efficient than 4G LTE, it will bring new IoT security challenges. 5G will further widen the cybersecurity attack surface. For IoT devices specifically, these challenges relate to:

  • High densities of IoT connections
  • Higher connection bandwidth, which could facilitate distributed denial of service (DDoS) attacks
  • Higher volumes of sensitive data shared between connected devices and applications to be adequately protected
  • Almost real-time latencies, which decrease the time to detect and respond to cyberattacks

There is also a considerable lack of industry foresight and standardization. Save for exceptions like the financial transaction industry, businesses must implement IoT security standards, especially for IoT solutions that leverage 5G.   

How Can Businesses Protect Their IoT Environment?

IoT security is of paramount importance for IoT environments and should be designed into the project or strategy from the beginning.

Securing IoT devices involves diligence. Businesses can protect themselves by implementing IoT security best practices to address the following areas:

  • Secure device management
  • Secure update mechanisms
  • Data privacy protection
  • Physical security hardening measures
  • Insecure IoT ecosystem interfaces

End-to-End Encryption and Network Segmentation 

IoT is becoming more commonplace in homes and workplaces. To protect data at rest and in transit, companies must employ:

  • Encryption sensitive data at rest
  • Implement strong password policies
  • Use secure protocols with strong encryption algorithms and avoid unsecure plaintext ones
  • Adopt private APN for mobile connectivity
  • Two-factor authentication for specific IoT use cases
  • Mature device management processes with trusted device identities

Businesses should also utilize network segmentation or separate networks for IoT devices and guest connections to reduce IoT-related attacks. In this context, following the principles of least privilege and defense in depth could mitigate multiple classes of cyber risks, especially in IoT ecosystems.

IoT Security by Design

A primary reason many IoT devices are vulnerable is that they aren’t secure by design. Security shouldn’t be an afterthought. A successful IoT strategy designs IoT security and industrial IoT security measures from the start.

Moreover, the security chain must start at the device (i.e., endpoint) level and should include an end-to-end security approach. This approach should also include the connectivity, communication layers and platforms. We must remember that security is as strong as the weakest link.

Vetting IoT Module Vendors  

Companies must evaluate and vet IoT module vendors to protect the sensitive data that will flow to and from IoT devices before implementing them. IoT modules are the cornerstone of IoT system security.

It is paramount for businesses to know their vendor manufactures modules with the necessary protection and measures for:

  • Firmware provisioning: Allowing only trusted and authenticated code inside the modules
  • Module identity provisioning: For device identification and authentication
  • Secure manufacturing: End-to-end security between the OEM and the manufacturing sites to manage the supply chain risk management
  • Secure manufacturer ICT processes: The adoption of cybersecurity frameworks (e.g., ISO 27001) allows the manufacturer to effectively manage the cyber risk

Connect, Manage and Secure Your IoT Deployment 

Developing an IoT solution can be complicated and intimidating. With our expertise, it doesn’t have to be.

Our IoT modules, connectivity plans and platforms are designed to optimize your total life cycle costs. We can help you simplify, scale and secure your IoT solutions today and beyond. Request a consultation to secure your IoT deployment today.

Request a Consultation

参考译文
安全:最新的问题和威胁是什么?
与典型的网络攻击不同,物联网(IoT)安全漏洞会影响虚拟和物理系统。想象一下,黑客操纵工厂设备、医疗保健设备或家庭智能锁,其损害可能是巨大的。随着物联网设备的数量和网络犯罪成本的增加,强大的物联网安全的必要性也在增加。新兴的物联网安全挑战危及品牌及其客户的敏感数据。因此,企业必须了解新的威胁形势。云和边缘计算的出现促成了有益变化的兴起,比如在家办公。然而,大多数组织都没有技术或实践来维护物联网网络安全,在此过渡期间和之后。边缘计算可能会引入几个安全漏洞,为攻击者提供更大的攻击面。边缘数据处理可以加速数据分析并减少延迟。这些结果可以实现人工智能(AI)和机器学习(ML)模型的边缘实现,并为一些垂直应用提供优势。该范例引入了一个不同的风险模型,必须考虑降低数据完整性、机密性和真实性的风险。此外,采用去中心化和分布式数据系统应强调具有云计算应用程序的边缘计算设备的安全认证。确保这些设备的安全将解决潜在的假冒或欺诈风险。对于任何企业来说,人都是不可替代的资产。然而,它们也代表了物联网安全和隐私的最大优势和弱点。物联网环境正变得更加互联和多面化。这种复杂性通常意味着人为错误是网络安全漏洞的主要原因。一家公司的物联网网络安全可能会受到运营商和其他不了解威胁情况的人员的威胁。虽然5G将比4G LTE更高效,但它将带来新的物联网安全挑战。5G将进一步拓宽网络安全攻击面。特别是对于物联网设备,这些挑战涉及:行业远见和标准化也相当缺乏。除了金融交易行业等例外情况外,企业必须实施物联网安全标准,特别是利用5G的物联网解决方案。保护物联网设备需要勤奋。企业可以通过实施物联网安全最佳实践来保护自己,以解决以下领域的问题:物联网在家庭和工作场所越来越普遍。为了保护静止和传输中的数据,公司必须:企业还应该利用网络分割或用于物联网设备和客户连接的单独网络,以减少与物联网相关的攻击。在这种情况下,遵循最小特权和深度防御的原则可以减轻多种类型的网络风险,特别是在物联网生态系统中。许多物联网设备容易受到攻击的一个主要原因是它们在设计上不安全。安全不应该是事后才考虑的。一个成功的物联网战略从一开始就设计物联网安全和工业物联网安全措施。此外,安全链必须从设备(即端点)级开始,并且应该包括端到端安全方法。这种方法还应该包括连接性、通信层和平台。我们必须记住,安全是最薄弱的环节。在实施物联网设备之前,公司必须评估和审查物联网模块供应商,以保护进出物联网设备的敏感数据。物联网模块是物联网系统安全的基石。对于企业来说,了解他们的供应商生产的模块具有必要的保护和措施是至关重要的:开发物联网解决方案可能是复杂而令人生畏的。有了我们的专业知识,就不必如此了。 我们的物联网模块、连接计划和平台旨在优化您的总生命周期成本。我们可以帮助您简化、扩展和保护您的物联网解决方案。今天请求咨询以确保您的物联网部署安全。
  • en
您觉得本篇内容如何
评分

相关产品

EN 650 & EN 650.3 观察窗

EN 650.3 version is for use with fluids containing alcohol.

Acromag 966EN 温度信号调节器

这些模块为多达6个输入通道提供了一个独立的以太网接口。多量程输入接收来自各种传感器和设备的信号。高分辨率,低噪音,A/D转换器提供高精度和可靠性。三路隔离进一步提高了系统性能。,两种以太网协议可用。选择Ethernet Modbus TCP\/IP或Ethernet\/IP。,i2o功能仅在6通道以太网Modbus TCP\/IP模块上可用。,功能

雷克兰 EN15F 其他

品牌;雷克兰 型号; EN15F 功能;防化学 名称;防化手套

Honeywell USA CSLA2EN 电流传感器

CSLA系列感应模拟电流传感器集成了SS490系列线性霍尔效应传感器集成电路。该传感元件组装在印刷电路板安装外壳中。这种住房有四种配置。正常安装是用0.375英寸4-40螺钉和方螺母(没有提供)插入外壳或6-20自攻螺钉。所述传感器、磁通收集器和壳体的组合包括所述支架组件。这些传感器是比例测量的。

SEWHACNM SI580EN 压力控制器

产品类型:控制仪表 品牌:韩国SEWHACNM(世和) 型号:SI580EN 1、特点 称重模式 : 限位模式, 封隔器模式,累积式模式 电源选择 : 订购规格DC & AC 支持MODBUS(RTU)

TMP Pro Distribution C012EN RF 音频麦克风

C012E射频从上到下由实心黄铜制成,非常适合于要求音质的极端环境,具有非常坚固的外壳。内置的幻像电源模块具有完全的射频保护,以防止在800 Mhz-1.2 Ghz频段工作的GSM设备的干扰。极性模式:心形频率响应:50赫兹-18千赫灵敏度:-47dB+\/-3dB@1千赫

ValueTronics DLRO200-EN 毫欧表

"The DLRO200-EN ducter ohmmeter is a dlro from Megger."

评论

您需要登录才可以回复|注册

提交评论

Telit 泰利特

这家伙很懒,什么描述也没留下

关注

点击进入下一篇

数字鸿沟:物联网弥合鸿沟的两种方式

提取码
复制提取码
点击跳转至百度网盘