en:iot-reloaded:cybersecurity_concepts
Differences
This shows you the differences between two versions of the page.
| Both sides previous revisionPrevious revisionNext revision | Previous revision | ||
| en:iot-reloaded:cybersecurity_concepts [2024/12/03 20:30] – ktokarz | en:iot-reloaded:cybersecurity_concepts [2025/05/13 18:01] (current) – [What is cybersecurity] pczekalski | ||
|---|---|---|---|
| Line 7: | Line 7: | ||
| After understanding cybersecurity, | After understanding cybersecurity, | ||
| - | The question is why should we be worried about cybersecurity attacks, especially in the context of IoT. The widespread adoption of IoT to improve business processes and personal well-being has exponentially increased the options available to cybercriminals to conduct cybersecurity attacks, increasing cybersecurity-related risks for businesses and individuals. This underscores the need for IoT engineers, IT engineers, and other non-IT employees to understand cybersecurity concepts. | + | The question is: Why should we be worried about cybersecurity attacks, especially in the context of IoT? The widespread adoption of IoT to improve business processes and personal well-being has exponentially increased the options available to cybercriminals to conduct cybersecurity attacks, increasing cybersecurity-related risks for businesses and individuals. This underscores the need for IoT engineers, IT engineers, and other non-IT employees to understand cybersecurity concepts. |
| ===== The confidentiality, | ===== The confidentiality, | ||
| Line 13: | Line 13: | ||
| <figure IoTcybersec1> | <figure IoTcybersec1> | ||
| - | {{ : | + | {{ : |
| - | < | + | < |
| </ | </ | ||
| Line 40: | Line 40: | ||
| * The accuracy of the data is preserved by ensuring that the data is not altered or aggregated either by human error or malicious attacks in such a way that affects the results of further processing and analysis of the data. | * The accuracy of the data is preserved by ensuring that the data is not altered or aggregated either by human error or malicious attacks in such a way that affects the results of further processing and analysis of the data. | ||
| * The consistency of the data should be maintained by ensuring that the data is unchanged regardless of how often it's accessed and no matter how long it's stored. | * The consistency of the data should be maintained by ensuring that the data is unchanged regardless of how often it's accessed and no matter how long it's stored. | ||
| - | * Data safety should be ensured by guaranteeing | + | * Data safety should be ensured by guaranteeing it is securely maintained and accessed only by authorised applications and individuals. Data security methods such as authentication, |
| The IoT system designers, manufacturers, | The IoT system designers, manufacturers, | ||
| * Physical integrity: It includes the various ways the integrity of the data can be compromised during transportation, | * Physical integrity: It includes the various ways the integrity of the data can be compromised during transportation, | ||
| * Hardware failures and faults. | * Hardware failures and faults. | ||
| - | * Design failures and negligence | + | * Design failures and negligence. |
| - | * Natural failures | + | * Natural failures may result from the deterioration of the hardware device (e.g., corrosion). |
| - | * Power failures outages | + | * Power failures |
| - | * Natural disasters | + | * Natural disasters. |
| * Environmentally induced failures resulting from extreme environmental failures like high temperatures. | * Environmentally induced failures resulting from extreme environmental failures like high temperatures. | ||
| - | * Cyberattacks | + | * Cyberattacks designed to cause hardware or power failures (e.g., energy depletion attacks). |
| The physical integrity of data could be enforced by: | The physical integrity of data could be enforced by: | ||
| * Implementing redundancy in data storage systems to ensure that failure of a storage memory will not result in data losses. | * Implementing redundancy in data storage systems to ensure that failure of a storage memory will not result in data losses. | ||
| * Implementing battery-protected write cache. | * Implementing battery-protected write cache. | ||
| - | * Deploying storage systems with advanced error-correcting memory devices, | + | * Deploying storage systems with advanced error-correcting memory devices. |
| * Implementing clustered and distributed file systems. | * Implementing clustered and distributed file systems. | ||
| * Implementing error-detection algorithms to detect any changes in the data during transportation. | * Implementing error-detection algorithms to detect any changes in the data during transportation. | ||
| Line 75: | Line 75: | ||
| **Availability** | **Availability** | ||
| - | The computing, communication, | + | The computing, communication, |
| * Hardware failures that may result from natural failures resulting from deterioration. | * Hardware failures that may result from natural failures resulting from deterioration. | ||
| - | * Software failures that may result from software design flaws or bugs | + | * Software failures that may result from software design flaws or bugs. |
| * Cyberattacks, | * Cyberattacks, | ||
| * Power failure may result from power outages or depletion of energy stored in the battery in the case of IoT nodes. | * Power failure may result from power outages or depletion of energy stored in the battery in the case of IoT nodes. | ||
| * Data damage, corruption, or losses during transportation or storage and retrieval that prevent authorised users and applications from accessing the data when needed. | * Data damage, corruption, or losses during transportation or storage and retrieval that prevent authorised users and applications from accessing the data when needed. | ||
| * Bandwidth bottlenecks and link failures in the communication network that interfere with data transfer to users and applications that need them. | * Bandwidth bottlenecks and link failures in the communication network that interfere with data transfer to users and applications that need them. | ||
| - | * The downtimes could result from failure, misbehaviour, | + | * The downtimes could result from failure, misbehaviour, |
| * Data to the computing, communication and storage infrastructure resulting from natural disasters, theft, vandalisation, | * Data to the computing, communication and storage infrastructure resulting from natural disasters, theft, vandalisation, | ||
| Some of the ways to ensure the availability of information systems and data include the following: | Some of the ways to ensure the availability of information systems and data include the following: | ||
| Line 88: | Line 88: | ||
| * Ensuring effective operation and maintenance processes. | * Ensuring effective operation and maintenance processes. | ||
| * Ensuring effective and efficient energy sources and energy storage systems. | * Ensuring effective and efficient energy sources and energy storage systems. | ||
| - | * To increase the lifetime of IoT nodes, energy consumption should be minimised. | + | * Energy consumption should be minimised to increase the lifetime of IoT nodes. |
| * Software design flaws and bugs should be resolved immediately and quickly to minimise downtimes. | * Software design flaws and bugs should be resolved immediately and quickly to minimise downtimes. | ||
| * The physical storage locations of hardware infrastructure should be carefully secured. | * The physical storage locations of hardware infrastructure should be carefully secured. | ||
| - | * Effective authentication and authorisation mechanisms should ensure that authorised users have access | + | * Effective authentication and authorisation mechanisms should ensure that authorised users can access the systems when needed. |
| * Cybersecurity systems should be carefully implemented and configured to minimise performance degradation and downtimes resulting from malfunctioning. | * Cybersecurity systems should be carefully implemented and configured to minimise performance degradation and downtimes resulting from malfunctioning. | ||
| * Ensuring the networking systems are correctly configured with appropriate security mechanisms and networking failures are quickly resolved. | * Ensuring the networking systems are correctly configured with appropriate security mechanisms and networking failures are quickly resolved. | ||
| Line 102: | Line 102: | ||
| **Cybersecurity risk**: It is the probability of being exposed to a cybersecurity attack or that any of the cybersecurity requirements of confidentiality, | **Cybersecurity risk**: It is the probability of being exposed to a cybersecurity attack or that any of the cybersecurity requirements of confidentiality, | ||
| - | **Threats**: | + | **Threats**: |
| ** Cybersecurity vulnerability**: | ** Cybersecurity vulnerability**: | ||
| Line 108: | Line 108: | ||
| **Cybersecurity exploit**: A cybersecurity exploit is the various ways that cybercriminals take advantage of cybersecurity vulnerabilities to conduct cyberattacks to compromise the confidentiality, | **Cybersecurity exploit**: A cybersecurity exploit is the various ways that cybercriminals take advantage of cybersecurity vulnerabilities to conduct cyberattacks to compromise the confidentiality, | ||
| - | **Attack vector**: It is the various ways that attackers may compromise the security of an information system, such as computing, communication, | + | **Attack vector**: It is the various ways that attackers may compromise the security of an information system, such as computing, communication, |
| - | * Phishing attacks | + | * Phishing attacks. |
| - | * Email attachments, | + | * Email attachments. |
| - | * Credential theft using various social engineering techniques, | + | * Credential theft using various social engineering techniques. |
| - | * Account takeover to steal or damage data and other resources and to conduct further attacks | + | * Account takeover to steal or damage data and other resources and to conduct further attacks. |
| - | * Cryptanalysis | + | * Cryptoanalysis |
| - | * Man-in-the-middle attacks, | + | * Man-in-the-middle attacks. |
| - | * Cross-site scripting, | + | * Cross-site scripting. |
| - | * SQL injection, | + | * SQL injection. |
| - | * Insider threats, | + | * Insider threats. |
| - | * Vulnerability exploits (e.g., vulnerabilities in unpatched software, servers, and operating systems), | + | * Vulnerability exploits (e.g., vulnerabilities in unpatched software, servers, and operating systems). |
| - | * Browser-based attacks, application compromise, | + | * Browser-based attacks, application compromise. |
| - | * Brute-force attacks to compromise passwords, | + | * Brute-force attacks to compromise passwords. |
| - | * Using malware to take over devices, gain unauthorised access, and may cause damage to data or the information systems, | + | * Using malware to take over devices, gain unauthorised access, and may cause damage to data or information systems. |
| * Exploiting the presence of open ports. | * Exploiting the presence of open ports. | ||
| - | The various approaches to eliminate attack vectors to reduce the chances of a successful attack include the following ((Cloudflare, | + | The various approaches to eliminate attack vectors to reduce the chances of a successful attack include the following ((Cloudflare, |
| * Encryption of data during transportation, | * Encryption of data during transportation, | ||
| * Designing effective security policies and training and compelling employees and stakeholders to apply them. | * Designing effective security policies and training and compelling employees and stakeholders to apply them. | ||
| Line 131: | Line 131: | ||
| * Deploying threats (intrusion) detection and prevention systems. | * Deploying threats (intrusion) detection and prevention systems. | ||
| - | **Attack surface**: An attack surface is a location or possible attack vectors that cybercriminals can target or use to compromise data and information systems' | + | **Attack surface**: An attack surface is a location or possible attack vectors that cybercriminals can target or use to compromise data and information systems' |
| - | * **Digital attack surface**: This kind of attack surface consists of all the software and hardware systems found within an organisation' | + | * **Digital attack surface**: This kind of attack surface consists of all the software and hardware systems found within an organisation' |
| * **Physical attack surface**: This kind of attack surface consists of all endpoint devices that an attacker can gain physical access to, such as desktop computers, hard drives, laptops, mobile phones, Universal Serial Bus (USB) drives, and IoT devices (in the case of IoT systems). Some physical attack surfaces include carelessly discarded hardware containing user data and login credentials, | * **Physical attack surface**: This kind of attack surface consists of all endpoint devices that an attacker can gain physical access to, such as desktop computers, hard drives, laptops, mobile phones, Universal Serial Bus (USB) drives, and IoT devices (in the case of IoT systems). Some physical attack surfaces include carelessly discarded hardware containing user data and login credentials, | ||
| A practical attack surface management provides the following advantages to organisations and individuals: | A practical attack surface management provides the following advantages to organisations and individuals: | ||
| Line 138: | Line 138: | ||
| * To mitigate the risk posed by cybersecurity threats. | * To mitigate the risk posed by cybersecurity threats. | ||
| * Identify new attack surfaces created as they expand their infrastructure and adopt new services. | * Identify new attack surfaces created as they expand their infrastructure and adopt new services. | ||
| - | * Effective management of access to critical | + | * Effective management of access to critical |
| * Minimise the possibility of successful cybersecurity attacks. | * Minimise the possibility of successful cybersecurity attacks. | ||
| As IT infrastructures increase and are connected to external IT systems over the internet, they become more complex, hard to secure, and frequently targeted by cybercriminals. Some of the ways to minimise attack surfaces to reduce the risk of cyberattacks include: | As IT infrastructures increase and are connected to external IT systems over the internet, they become more complex, hard to secure, and frequently targeted by cybercriminals. Some of the ways to minimise attack surfaces to reduce the risk of cyberattacks include: | ||
| - | * The implementation of zero-trust policies ensures that only authorised users and applications can access information resources (computing devices, sensor devices, networks, servers, databases, etc.). This eliminates or reduces the chances of unauthorised access | + | * Implementing |
| * Reducing unnecessary complexities by turning off or removing unused hardware devices and software from the IT infrastructure to reduce the attack surfaces that cybercriminals can exploit. | * Reducing unnecessary complexities by turning off or removing unused hardware devices and software from the IT infrastructure to reduce the attack surfaces that cybercriminals can exploit. | ||
| * Perform regular security audits and scan the entire network and IT systems to identify vulnerabilities (both hardware and software) that cybercriminals could exploit and resolve to reduce the attack surface that cybercriminals can exploit. | * Perform regular security audits and scan the entire network and IT systems to identify vulnerabilities (both hardware and software) that cybercriminals could exploit and resolve to reduce the attack surface that cybercriminals can exploit. | ||
| Line 162: | Line 162: | ||
| * There is a growing anxiety that when quantum computing technologies mature, they will be able to break advanced encryption schemes that we now depend on to protect our data. | * There is a growing anxiety that when quantum computing technologies mature, they will be able to break advanced encryption schemes that we now depend on to protect our data. | ||
| - | **Authentication**: | + | **Authentication**: |
| - | **Authorisation**: | + | **Authorisation**: |
| - | **Access control**: It consists of the various mechanisms designed and implemented to grant authorised users access to information system resources and to control the actions that they are allowed to perform (e.g., view, modify, update, install, delete). It can also be the control | + | **Access control**: It consists of the various mechanisms designed and implemented to grant authorised users access to information system resources and to control the actions that they are allowed to perform (e.g., view, modify, update, install, delete). It can also control an organisation' |
| **Non-repudiation**: | **Non-repudiation**: | ||
| - | **Accountability**: | + | **Accountability**: |
en/iot-reloaded/cybersecurity_concepts.1733250639.txt.gz · Last modified: by ktokarz
