Secure your IoT: Why Insider Threat Detection is Vital

2023-07-26
关注



Cyberattacks on the Internet of Things (IoT) devices can have dire consequences. Unlike most cyber incidents, attacks on IoT can have potentially catastrophic impacts on the physical world. When we think about threats to IoT devices, we typically consider external threats: distributed denial of service (DDoS) attacks, brute force attacks, botnets, and so on. But the greatest threats to IoT devices often come from inside the targeted organization.


“Unlike most cyber incidents, attacks on IoT can have potentially catastrophic impacts on the physical world.”


This article will explore why insider threats pose such a threat to IoT devices and what organizations can do to detect and prevent them.

What is an Insider Threat?

An insider threat is a current or former employee, business partner, contractor, or any other legitimate personnel that intentionally or unintentionally exposes their organization’s sensitive data or facilitates a cyberattack.

What is the Internet of Things?

IoT is an umbrella term that refers to all internet-connected physical devices, vehicles, appliances, and other “things” that developers embed with sensors, software, and network connectivity which allow them to collect and exchange data.

IoT allows devices to gather data through their sensors and share it with other devices and systems, creating an information network that improves their capabilities and functionality. IoT aims to improve automation, efficiency, and convenience across all sectors, from smart homes to the remote monitoring of manufacturing processes.

In a smart home, for example, IoT devices such as thermostats, lighting systems, and security cameras are often interconnected and controlled through a central hub, allowing homeowners to manage their home’s temperature, lighting, and security from anywhere, at any time.

Insider Threats to the Internet of Things

Insider threats to IoT are a bigger problem than ever. Remote working has resulted in a dramatically expanded attack surface and staff accessing sensitive systems and information from home. It’s no longer enough to protect an organization’s perimeter because the perimeter no longer exists.

Remote working is a significant contributor to the rise of insider threats. Early this year, 74 percent of organizations reported an increase in insider attacks. This increase is perhaps unsurprising; detached from their colleagues and company HQ, it’s not only easier for employees to access and exfiltrate sensitive information than ever before but also to justify their actions, viewing their organization as a faceless behemoth rather than a community.

Similarly, employees are more dissatisfied than ever. Inflation means salaries don’t go as far as they used to, wealth inequality results in more staff resenting their employers, and the constant threat of redundancy has left a bad taste in many employees’ mouths. Considering personal gain and revenge are two critical motivators for insider threats, it’s no wonder that they are on the rise.

Detecting and Preventing Insider Threats to the Internet of Things

Detecting and preventing insider threats requires organizations to implement a comprehensive security policy that includes security awareness training, user and entity behavior analytics (UEBA), and data loss prevention (DLP) solutions. Let’s dive deeper into those three essentials to understand better how they prevent insider threats.

First, security awareness training empowers staff to identify and prevent insider threats. Regular, role-specific training reduces the risk of falling for a social engineering scam and becoming an accidental insider threat. It also increases the likelihood of them identifying possible intentional insider threats.

UEBA solutions leverage advanced algorithms and machine learning (ML) technologies to detect user and entity behavior abnormalities. By collecting baseline data establishing normal behavior, UEBA solutions automatically detect and flag deviations that could indicate a potential insider threat. For example, suppose a user attempts to access sensitive files outside their jurisdiction, work hours, and usual location. In that case, UEBA solutions alert the security team, who will then investigate further.

Security teams can also utilize UEBA solutions to assign users risk scores, which indicate how likely an employee is to become an insider threat. These risk scores are developed over time, leveraging the collected data to determine what normal behavior looks like for a user and how often they deviate from that norm. The more often a user exhibits suspicious behavior, the higher their risk score, thus allowing security teams to prioritize investigations should an incident occur.

Finally, DLP solutions prevent data loss by integrating with core system infrastructure at the endpoint layer; for example, a device’s operating system or browser. By integrating in this way, DLP solutions monitor data ingress and egress on the device without having to decrypt traffic, thus leaving the machine to perform content inspection. Moreover, DLP solutions monitor file operations at the endpoint and cloud layers, using collected metadata to provide security teams with context about what data is business-critical or at the most risk of exposure, allowing them to prioritize security efforts.

However, organizations must keep in mind that not every solution will suit their needs. It’s important to evaluate solutions according to your specific requirements.

Insider threats are one of the most significant dangers to IoT. Their insight and access to an organization’s most sensitive information put them in a unique position to compromise them, and an increasingly turbulent global economy is motivating more people to become insider threats. Organizations should implement security awareness training, UEBA tools, and DLP solutions to protect their IoT from insider threats.



  • en
您觉得本篇内容如何
评分

相关产品

EN 650 & EN 650.3 观察窗

EN 650.3 version is for use with fluids containing alcohol.

Acromag 966EN 温度信号调节器

这些模块为多达6个输入通道提供了一个独立的以太网接口。多量程输入接收来自各种传感器和设备的信号。高分辨率,低噪音,A/D转换器提供高精度和可靠性。三路隔离进一步提高了系统性能。,两种以太网协议可用。选择Ethernet Modbus TCP\/IP或Ethernet\/IP。,i2o功能仅在6通道以太网Modbus TCP\/IP模块上可用。,功能

雷克兰 EN15F 其他

品牌;雷克兰 型号; EN15F 功能;防化学 名称;防化手套

Honeywell USA CSLA2EN 电流传感器

CSLA系列感应模拟电流传感器集成了SS490系列线性霍尔效应传感器集成电路。该传感元件组装在印刷电路板安装外壳中。这种住房有四种配置。正常安装是用0.375英寸4-40螺钉和方螺母(没有提供)插入外壳或6-20自攻螺钉。所述传感器、磁通收集器和壳体的组合包括所述支架组件。这些传感器是比例测量的。

TMP Pro Distribution C012EN RF 音频麦克风

C012E射频从上到下由实心黄铜制成,非常适合于要求音质的极端环境,具有非常坚固的外壳。内置的幻像电源模块具有完全的射频保护,以防止在800 Mhz-1.2 Ghz频段工作的GSM设备的干扰。极性模式:心形频率响应:50赫兹-18千赫灵敏度:-47dB+\/-3dB@1千赫

ValueTronics DLRO200-EN 毫欧表

"The DLRO200-EN ducter ohmmeter is a dlro from Megger."

评论

您需要登录才可以回复|注册

提交评论

广告

iotforall

这家伙很懒,什么描述也没留下

关注

点击进入下一篇

Google Cloud launches AI-powered anti-money laundering tool

提取码
复制提取码
点击跳转至百度网盘