https://www.iotworldtoday.com/wp-content/themes/ioti_child/assets/images/logo/footer-logo.png
  • Home
  • News
    • Back
    • IoT World 2020 News
  • Strategy
  • Special Reports
  • Galleries
  • Business Resources
    • Back
    • Webinars
    • White Papers
    • Industry Perspectives
    • Featured Vendors
  • Other Content
    • Back
    • IoT World 2020 News
    • Q&As
    • Case Studies
    • Features
    • How-to
    • Opinion
    • Video / Podcasts
  • More
    • Back
    • About Us
    • Contact
    • Advertise
    • Strategic Partners
  • IOT World Events
    • Back
    • Internet of Things World: San Jose
    • IoT World 2020 News
Iot World Today
  • NEWSLETTER
  • Home
  • News
    • Back
    • IoT World 2020 News
  • Strategy
  • Special Reports
  • Galleries
  • Business Resources
    • Back
    • Webinars
    • White Papers
    • Industry Perspectives
    • Featured Vendors
  • Other Content
    • Back
    • IoT World 2020 News
    • Q&As
    • Case Studies
    • Features
    • How-to
    • Opinion
    • Video / Podcasts
  • More
    • Back
    • About Us
    • Contact
    • Advertise
    • Strategic Partners
  • IOT World Events
    • Back
    • Internet of Things World: San Jose
    • IoT World 2020 News
  • newsletter
  • IIoT
  • Cities
  • Energy
  • Homes/Buildings
  • Transportation/Logistics
  • Connected Health Care
  • Retail
  • AI
  • Architecture
  • Engineering/Development
  • Security
ioti.com

Security


Image of a grid showing social media icons

The Challenges of an Enterprise/Industrial IoT Security Strategy

What actions should enterprises take following the Internet outage caused by the huge DDoS attack by the Mirai botnet a few weeks ago?
  • Written by Steve Bell
  • 8th June 2017

Having attended the IoT Security Summit 2016 in Boston last week, it seemed ironic to hear the news on my return about the huge Internet outage caused by the global domain name server (DNS) infrastructure being taken down as a result of a huge DDoS attack by the Mirai botnet.

This botnet compromised IoT devices to launch attacks on targeted web properties. According to Arbor Networks, the security division of NetScout Systems Inc. (Nasdaq: NTCT), this isn't the first time that the Mirai botnet has been used; it was put to work in a sustained and sophisticated large-scale 540Gbit/s attack on Olympic websites during the 2016 Rio Olympic Games. The botnet exploits one of the lesser known IP protocols, Generic Routing Encapsulation (GRE), used for unencrypted ad-hoc VPN-type tunnels. It is protocol number 47 of the 256 Internet protocols. According to an Arbor Networks blog, use of these lesser-known protocols has been slowly increasing since the year 2000, and, more recently, these techniques have been rediscovered and weaponized, and included in botnets for hire.

Given the sophistication and scale of these attacks, and the fact that they are being offered as a service, it means that connected enterprises have to take a holistic view of security as they incorporate enterprise IoT and industrial IoT into their business operations and IT infrastructures. One of the aspects that has to be recognized is the reality that the potential threat surfaces increase significantly because of the dimensions of “things” that are being connected, and because of the diverse types of devices, platforms and players that are being included.

As shown in the table below, enterprise IoT can relate to a significant number of operations associated with buildings and campuses, while industrial IoT can relate to production processes. Additionally, IoT initiatives potentially have to address connected and autonomous vehicles (for instance in warehouses or mining operations), as well as the health and safety aspects of people where connected wearables are intrinsic parts of production or service capabilities.

Since it's important that security doesn't impede business, it's becoming increasingly vital that security is built into products and processes by design. This requires an analysis of assets, and an understanding of potential threat models to help determine the security lifecycle of products and their associated business models. Adopting proven frameworks, such as NIST or ISO27001/2, and holding ecosystem partners to the same standards is a security fundamental. Suppliers of equipment must ensure that they incorporate hardware-based security, including chipsets that protect the relevant identifiers, and that meet secure boot requirements for authentication and validation. Additionally, secure storage and secure communications, both within and from the device, have to be assured across the network to the cloud.

The device and network architectures need to take account of the drivers for these two types of operation, which will often differ in terms of response times, need for continuous operation, the lifespan of the assets and whether or not they are operating in a harsh environment. As a result, the traditional homogeneous infrastructure, that enterprises have been familiar with, will fragment into a variety of unique devices, often with specific-purpose hardware, and this can result in the possibility of unique malware and cyber attacks. The traditional approach of being reactive — detecting and blocking these attacks — has to transition to a more intelligent and proactive approach. This uses the context of the IoT solution, combined with machine learning and behavioral analysis, to develop automated mechanisms for discovery and real-time monitoring.

Given the requirement for such sophisticated security capability, it has to be recognized that partnering with network and cloud providers to provide layers of defense should be an intrinsic part of an enterprise IoT security strategy. This is the essence of AT&T Inc. (NYSE: T)'s enterprise security strategy and NetBond, its dynamic secure virtual private networking offering. It articulates a security framework comprising four layers: an endpoint solution, connectivity — which is the VPN Netbond, the data application layer and threat management to detect breaches.

The security offering is an integrated network-based solution, with machine learning built into the network that provides threat intelligence and security data analytics. AT&T has sold this solution to 450 global customers, and has partnered with 16 cloud providers, including the number one cloud provider, AWS, to offer it as a bundled service. Enterprise customers are realizing that, in a digitized world where every physical IoT component has a corresponding cloud component, they need end-to-end guaranteed security and analytics.

Tags: Article IIoT/Manufacturing Architecture Security Smart Homes and Smart Buildings Technologies Vertical Industries

Related


  • Steam monitoring
    IoT Remote Monitoring Helps Enterprises Traverse COVID-19 and Beyond
    IoT remote monitoring has helped enterprises turn to remote operations and remote monitoring capabilities I the wake of social distancing requirements.
  • Data-Driven Digital Transformation Propels Airbus to New Heights
    Airbus wanted to get more customer focused through data-driven strategies. But instead of gathering new data, it brought discipline to its existing data.
  • IT/OT convergence
    The IoT Security Risks and Benefits of IT Convergence
    Standardizing and integrating IT systems –IT convergence—has been gathering steam. It brings risks and opportunities, though.
  • Training and Development on the Mechanism of Metal Gears. in the design of information related to business
    Developing IoT Applications with Rust: Using a Rust Development Environment
    Developing for IoT with Rust has matured to the point that its ecosystem now includes an array of key support tools. One tool is Cargo.

Leave a comment Cancel reply

-or-

Log in with your IoT World Today account

Alternatively, post a comment by completing the form below:

Your email address will not be published. Required fields are marked *

This site uses Akismet to reduce spam. Learn how your comment data is processed.

Related Content

  • Securing the Industrial Internet of Things
  • Smart Building Projects Target Energy Efficiency As Launchpad to Health and Safety
  • AI Ups the Ante for IoT Cybersecurity
  • IoT Security Trends, 2021: COVID-19 Casts Long Shadow

News

View all

Private LTE Market Projected to Grow to $13 Billion

12th January 2021

IoT World Announces 2021 IoT World Advisory Board

9th December 2020

White Papers

View all

The eSIM Cookbook – Towards the Next Generation of Connected Devices

22nd February 2021

eSIM Delivers Greater Freedom for OEMs – by Beecham Research and Truphone

22nd February 2021

Special Reports

View all

Cybersecurity Protection Increasingly Depends on Machine Learning

28th October 2020

Webinars

View all

Weber’s Journey: How a Top Grill Maker Serves Up Connected Cooking

25th February 2021

From Insights to Action: Best Practices for Implementing Connected Device Security

15th December 2020

Galleries

View all

Top IoT Trends to Watch in 2020

26th January 2020

Five of the Most Promising Digital Health Technologies

14th January 2020

Industry Perspectives

View all

IoT Spending Holds Firm — Tempered by Dose of ‘IoT Pragmatism’

1st December 2020

The Great IoT Connectivity Lockdown

11th May 2020

Events

View all

IoT at the Edge

17th March 2021

Embedded IoT World 2021

28th April 2021 - 29th April 2021

IoT World 2021

2nd November 2021 - 4th November 2021

Twitter

IoTWorldToday, IoTWorldSeries

📢 Announcing #EIOTWORLD sponsor, @aicas_IoT — a flexible, more efficient approach to embedded realtime application… twitter.com/i/web/status/1…

4th March 2021
IoTWorldToday, IoTWorldSeries

Microsoft Ignite 2021: Innovation in COVID-19 Era Signals Future Trends dlvr.it/RtwYcg

4th March 2021
IoTWorldToday, IoTWorldSeries

At Microsoft Ignite: How IoT and Robotics Are Driving Industry 4.0 dlvr.it/Rttgwj

3rd March 2021
IoTWorldToday, IoTWorldSeries

🎙️ Introducing #EIOTWORLD speaker, Obinna Ilochonwu, Industrial IoT Architect at Schlumberger. 📅 Join his session… twitter.com/i/web/status/1…

2nd March 2021
IoTWorldToday, IoTWorldSeries

#Smartbuilding technology lays the foundation for #energyefficiency efforts but also new COVID-19 goals, such as… twitter.com/i/web/status/1…

2nd March 2021
IoTWorldToday, IoTWorldSeries

IoT Remote Monitoring Helps Enterprises Traverse COVID-19 and Beyond dlvr.it/RtZ3K5 https://t.co/owJXYf1gkO

26th February 2021
IoTWorldToday, IoTWorldSeries

Securing the Industrial Internet of Things dlvr.it/RtYfYk https://t.co/khUn79dvQD

26th February 2021
IoTWorldToday, IoTWorldSeries

📢 Announcing #EIOTWORLD sponsor, @BluetoothSIG — the global standard for simple, secure wireless connections. ➕ Le… twitter.com/i/web/status/1…

26th February 2021

Newsletter

Sign up for IoT World Today newsletters: vertical industry coverage on Tuesdays and horizontal tech coverage on Thursdays.

Special Reports

Our Special Reports take an in-depth look at key topics within the IoT space. Download our latest reports.

Business Resources

Find the latest white papers and other resources from selected vendors.

Media Kit and Advertising

Want to reach our audience? Access our media kit.

DISCOVER MORE FROM INFORMA TECH

  • IoT World Series
  • Channel Futures
  • RISC-V
  • Dark Reading
  • ITPro Today
  • Web Hosting Talk

WORKING WITH US

  • Contact
  • About Us
  • Advertise
  • Login/Register

FOLLOW IoT World Today ON SOCIAL

  • Privacy
  • CCPA: “Do Not Sell My Data”
  • Cookies Policy
  • Terms
Copyright © 2021 Informa PLC. Informa PLC is registered in England and Wales with company number 8860726 whose registered and Head office is 5 Howick Place, London, SW1P 1WG.
This website uses cookies, including third party ones, to allow for analysis of how people use our website in order to improve your experience and our services. By continuing to use our website, you agree to the use of such cookies. Click here for more information on our Cookie Policy and Privacy Policy.
X