Why Managing IoT Security Risk in Utility Infrastructure is Essential to Defeat Emerging Threats

2022-11-15 21:09:02
关注

Why Managing IoT Security Risk in Utility Infrastructure is Essential to Defeat Emerging Threats
Illustration: © IoT For All

With multiple large-scale ransomware attacks occurring over the last few years, including those in the utility industry, people are wondering more than ever what the future of security for the Internet of Things (IoT) infrastructure space should look like. According to PwC’s 25th Annual Global CEO Survey, 44 percent of energy, utilities, and resources CEOs ranked cyber threats as a “top three” concern, only slightly edged out by health risks (45 percent) and climate change (49 percent). With today’s advancing technology has come a drastic increase in cyber-attacks across all industries. These CEOs are feeling the threat that cyber-attacks pose now and in the future, and they must consider what actions need to be taken to prevent themselves from becoming victims. 

'The LoRaWAN specification has been designed from the outset with security as an essential aspect, providing state-of-the-art security properties that meet the needs of highly-scalable low-power IoT networks.' -Ken LynchClick To Tweet

“Attacks on organizations in critical infrastructure sectors have increased dramatically, from less than 10 in 2013 to almost 400 in 2020 – a 3,900 percent change,” according to a Gartner report. As their operations become more connected, companies across industries have been working to implement best practice security measures to try and mitigate these attacks. With strong IoT security inherent in network protocols like LoRaWAN, we know our critical infrastructure is more secure than ever before. However, with cybercriminals becoming more sophisticated, some organizations may choose to consider an additional layer of security to protect vital information.

IoT Security Risks in Utility Infrastructure 

Current: Alarmingly, in some situations, security isn’t implemented correctly on IoT devices or for communication coming from devices. And, if low-strength security and/or static keys are being used, it can make it easier for bad actors to hack your systems. Security vulnerabilities that exist today include man-in-the-middle attacks, replays, delays, reliance on antiquated operating systems, no true end-to-end data security, and low amounts of processing power. 

Future: The future of utilities is moving towards remote management and access to devices (like meters), which will expand connectivity infrastructures. While this promises a more streamlined way to operate, it can introduce new vulnerabilities. Because of this, utility infrastructure providers need to consider the cyber risks that come with making systems more visible to cyber criminals and prepare their security for attacks. 

Outcomes and Future Planning 

When a cyberattack has been successfully carried out on utility infrastructure the damage done can leave a lasting impact on human safety and can affect equipment, systems, and the services they provide. When hackers can capture sensitive data about these systems and manipulate them, they can cause catastrophic outcomes, including total system shutdowns. 

The visibility that comes as a result of increased connectivity means that those in the utility infrastructure space need to implement security that can cover any openings that hackers may try to exploit, providing true end-to-end payload protection through every hop of an IoT network. One consideration is to secure IoT devices by embedding a security technology within the end devices that secures data to the highest strength, at the earliest opportunity. This security library is controlled by the application running on the device and should be resistant to attacks of the future. Government-regulated certifications like FIPS 140-3 are also an important feature in protecting critical infrastructure.  

Securing an IoT deployment is not only a matter of choosing the right communication protocol, but it requires following implementation best practices and adhering to industry security standards. The LoRaWAN specification has been designed from the outset with security as an essential aspect, providing state-of-the-art security properties that meet the needs of highly scalable low-power IoT networks.

Additional layers of security such as MTE (MicroToken Exchange) and MKE (Managed Key Encryption) are also supported by forward-thinking network operators and utility infrastructure providers to support critical infrastructure and essential business applications.

Tweet

Share

Share

Email

  • Remote Management
  • Utility Management
  • Connectivity
  • Cybersecurity
  • Internet of Things

  • Remote Management
  • Utility Management
  • Connectivity
  • Cybersecurity
  • Internet of Things

参考译文
为什么管理公用事业基础设施中的物联网安全风险对战胜新兴威胁至关重要
插图:© IoT For All 随着近年来多次大规模勒索软件攻击的发生,包括在公用事业行业中的攻击,人们比以往任何时候都更加关注未来物联网(IoT)基础设施领域的安全应是什么样子。根据毕马威25年度全球首席执行官调查报告,44%的能源、公用事业和资源行业的首席执行官将网络威胁列为“前三名”的担忧,略低于健康风险(45%)和气候变化(49%)。随着技术的不断发展,所有行业的网络攻击也急剧增加。这些CEO正感受到当前及未来网络攻击所带来的威胁,他们必须考虑采取哪些措施以避免成为受害者。 “LoRaWAN规范从一开始就将安全性作为关键要素进行设计,提供最先进的安全特性,以满足高度可扩展的低功耗物联网网络的需求。”——Ken Lynch 点击推文 根据Gartner的一份报告,“对关键基础设施行业组织的攻击数量激增,从2013年的不到10起增加到2020年的近400起,变化幅度高达3900%。”随着运营越来越互联,各行各业的公司正在努力实施最佳的安全措施,以缓解这些攻击。通过像LoRaWAN这样的网络协议中内置的强大物联网安全功能,我们清楚地知道我们的关键基础设施比以往任何时候都更加安全。然而,随着网络犯罪分子变得越来越狡猾,一些组织可能会选择考虑增加额外的安全层,以保护关键信息。 **公用事业基础设施中的物联网安全风险** **当前情况:** 令人担忧的是,在某些情况下,物联网设备或来自设备的通信没有正确实施安全措施。如果使用了低强度的安全性或静态密钥,就更容易被恶意行为者攻击系统。目前存在的安全漏洞包括中间人攻击、重放攻击、延迟、依赖过时的操作系统、没有真正的端到端数据安全,以及处理能力较低。 **未来趋势:** 公用事业的未来正朝着远程管理与设备(如电表)的访问方向发展,这将扩展连接基础设施。虽然这带来了更高效的运营方式,但也可能引入新的安全漏洞。正因如此,公用事业基础设施提供商需要考虑在使系统对网络犯罪分子更可见的同时所带来的网络风险,并做好准备来防范攻击。 **结果与未来规划** 当攻击成功地对基础设施实施时,所造成的损害可能会对人类安全产生长期影响,并影响设备、系统以及它们所提供的服务。当黑客能够捕获这些系统中的敏感数据并加以操控时,就可能导致灾难性后果,包括整个系统停摆。 随着连接性的增强所带来的可见度,意味着那些在公用事业基础设施领域的机构需要实施能够覆盖黑客可能试图利用的任何漏洞的安全措施,通过物联网网络的每一个“跳转”(hop)提供真正的端到端有效载荷保护。一个考虑方向是通过在终端设备中嵌入安全技术以保护数据,使其在最早阶段就以最高强度进行保护。该安全库由设备上运行的应用程序控制,并应能抵御未来的攻击。政府监管的认证,如FIPS 140-3,也是保护关键基础设施的重要功能之一。 保障物联网部署的安全不仅仅是选择合适的通信协议,还需要遵循实施的最佳实践并遵守行业安全标准。LoRaWAN规范从设计之初就将安全性作为关键要素,提供最先进的安全功能,以满足高度可扩展的低功耗物联网网络的需求。此外,诸如MTE(微令牌交换)和MKE(受控密钥加密)等额外的安全层,也受到具有前瞻性的网络运营商和公用事业基础设施提供商的支持,以保障关键基础设施和重要业务应用的安全。 推文 分享 邮件 远程管理 公用事业管理 连接性 网络安全 物联网 → 远程管理 公用事业管理 连接性 网络安全 物联网
您觉得本篇内容如何
评分

评论

您需要登录才可以回复|注册

提交评论

广告

iotforall

这家伙很懒,什么描述也没留下

关注

点击进入下一篇

如何防止的IoT射频安全无线设备射频攻击的风险

提取码
复制提取码
点击跳转至百度网盘