首页> 外文会议>European Conference on Cyber Warfare and Security >Operational Risk Assessment on Internet of Things: Mitigating Inherent Vulnerabilities
【24h】

Operational Risk Assessment on Internet of Things: Mitigating Inherent Vulnerabilities

机译:关于物联网的操作风险评估:减轻固有的漏洞

获取原文

摘要

Internet of Things (IoT) is a relatively new term attributed to the wave of technologies that connect to the Internet to provide connectivity and remote access to users. However, this seemingly convenient new capability brought with it an influx of security vulnerabilities that provide new points of entries for potential adversaries. One of the most infamous attacks on loT was the Mirai botnet, which caused one of the largest and most disruptive Distributed Denial of Service (DDoS) attacks. Unfortunately, even in the aftermaths of the attack, the 351-billion-dollar industry (as of Jan 2018) continues to manufacture IoT with a myriad of security flaws without strictly enforced guidelines. Consequently, there has been numerous attempts to highlight the different security vulnerabilities associated with IoT. In a 2017 report, the U.S. Department of Defense identified multiple IoT-related risks including potential exploitations from supply chain, limited encryption as well as poor built-in security of the systems. However, there is still limited research in terms of their operational impact in the network. With countless systems currently deployed in critical environments such as the U.S. government, medical facilities, and critical infrastructure, deeper investigation of these vulnerabilities in their operational context are warranted. Here we present a preliminary analysis of IoT systems' operational risk factors based on the current methodologies of assessing security risks, and propose policies on their acquisition and proper use for organizations that employ the systems to help mitigate the risks discussed. We assert that an assessment of the operational risk in conjunction with the security vulnerabilities is necessary in order to fully capture the potential effects of the integration of IoT in an organization. Finally, we conclude with a discussion of future directions in research that will help visualize the risks and implications in IoT-saturated networks.
机译:事物互联网(IOT)是一个相对较新的术语,归因于连接到互联网提供连接和远程访问用户的技术浪潮。然而,这种看似方便的新能力带来了一个安全漏洞的涌入,为潜在的对手提供了新的条目点。大量臭名攻击之一是Mirai Botnet,它导致了最大,最具破坏性分布式拒绝(DDOS)攻击之一。不幸的是,即使在攻击的后果中,351亿美元的行业(截至2018年1月)继续在没有严格执行的指导方针制造无数的安全缺陷的物联网。因此,许多尝试突出显示与IOT相关的不同安全漏洞。在2017年报告中,美国国防部确定了多种与电信相关的风险,包括供应链,限量加密以及系统内置安全性的潜在利用。但是,在网络在网络中的运行影响方面仍存在有限的研究。目前有无数系统,目前部署在根据美国政府,医疗设施和关键基础设施等关键环境中,有必要在其运作背景下对这些漏洞进行更深入的调查。在这里,我们基于评估安全风险的目前的方法,提出了对IOT系统的运营风险因素的初步分析,并提出了对雇用该系统讨论的风险的组织的收购和适当用途的政策。我们断言,必须与安全漏洞进行操作风险,是必要的,以便充分捕捉IOT在组织中整合的潜在影响。最后,我们讨论了未来研究中的未来方向,这将有助于可视化IOT饱和网络中的风险和影响。

著录项

相似文献

  • 外文文献
  • 中文文献
  • 专利
获取原文

客服邮箱:kefu@zhangqiaokeyan.com

京公网安备:11010802029741号 ICP备案号:京ICP备15016152号-6 六维联合信息科技 (北京) 有限公司©版权所有
  • 客服微信

  • 服务号