Efficient and Secure Provisioning for the IIoT
在2016秋季黑客招募了成千上万的嵌入式设备,以形成恶意僵尸网络。他们的未来恶意软件感染的宽带路由器,让僵尸网络的运营商使用他们的分布式拒绝服务(DDoS)攻击。这是一个唤醒的新兴物联网(物联网)产业-显示如何黑客可以使用网络智能设备为自己的目的。
虽然未来的攻击集中在消费设备,对物联网产业的影响是严重的。没有对策,工业工厂面临类似大规模攻击的牺牲品。风险范围从失去生产到严重损坏连接机械。安全专家的分析表明,黑客的受害者的设备制造商作出相对简单的错误。在未来的攻击的情况下,很少有保护路由器免受黑客登录和上传他们的新固件。

Groups such as the IoT Security Foundation (IoTSF) have issued recommendations designed to protect against similar attacks. The IoTSF identified measures that would protect against Mirai. They include the need to ensure access codes or passwords are unique to each unit and are not shared among a group of devices. Even if the hacker is able to discover the password for one, they are not able to log into others with the same access credentials. A further recommendation is that devices should protect against having firmware loaded into them that has not been digitally signed by a trusted provider.
Although the answer is to have credentials that are unique to each unit, this can be difficult to manage from a logistical point of view. IIoT systems become very expensive to deploy if each device needs to be provisioned individually by an expert installer. It is also a strategy that increases risk because numerous devices may need to be configured by a small group of people – making them prime targets for industrial espionage and social engineering attacks.
声明:本文内容及配图由入驻作者撰写或者入驻合作网站授权转载。文章观点仅代表作者本人,不代表电子发烧友网立场。文章及其配图仅供工程师学习之用,如有内容侵权或者其他违规问题,请联系本站处理。 举报投诉
全部0条评论
快来发表一下你的评论吧 !