首页> 外文期刊>International journal of intelligence and counter intelligence >Dancing on the Razor's Edge: A Foundational Review of IoT Exploitation and Defense through the Lens of TECHINT Collection
【24h】

Dancing on the Razor's Edge: A Foundational Review of IoT Exploitation and Defense through the Lens of TECHINT Collection

机译:在剃刀的边缘跳舞:通过TechInt收集镜头的IoT开发和防御的基本综述

获取原文
获取原文并翻译 | 示例
           

摘要

As the number of IoT devices continue to grow worldwide, the U.S. IC must remain wary of the duplicitous edge it walks on when choosing to exploit vulnerable IoT devices. While manipulating smart-products can enhance the ability to gather information on an adversary's advanced technical products, exposure of IoT system exploits can and will be used by nefarious actors to steal sensitive U.S. IP, gather intelligence on U.S. targets, and conduct offensive cyber operations on critical infrastructure. Given that countless IoT system vulnerabilities will be identified and abused by both state and nonstate actors in the coming years, it is imperative that the U.S. IC take active steps in securing its own technical intelligence before exploiting others. While active steps must be made by IoT developers to better secure their products, public/private sector organizations and institutions of higher education must operate under the assumption that it is not a matter of if, but when, their Internet-connected devices will become compromised. Consequently, all aforementioned parties must take an aggressive and proactive approach to securing access to devices that house sensitive information. These actions must in turn be complemented by the passage of federal regulations, which ensure that all IoT devices maintain compliance with a nationwide cybersecurity standard. Absent of any federal security standards, vulnerable IoT devices will continue to proliferate throughout the United States, further enabling both state and nonstate actors with the resources necessary to attack public and private institutions that house our nation's most sensitive technologies. Only by taking these balanced steps can the United States move forward while balancing on this razor's edge of both exploiting IoT devices for our own uses abroad, while protecting our own IP and technologies at home.
机译:As the number of IoT devices continue to grow worldwide, the U.S. IC must remain wary of the duplicitous edge it walks on when choosing to exploit vulnerable IoT devices.在操纵智能产品可以增强收集信息的能力,可以通过IoT系统的曝光曝光,并将被邪恶的演员窃取敏感的美国知识产权,收集美国目标的智能,并开展令人反感的网络运营关键基础设施。鉴于未来几年的国家和非国有行动者将被确定和滥用无数的物联网系统漏洞,因此美国IC必须在利用其他人之前采取积极的步骤来保护自己的技术智能。虽然IOT开发人员必须进行积极步骤,以更好地保护其产品,但公共/私营部门组织和高等教育机构必须在假设中运作,这不是一个问题,但何时,他们的互联网连接的设备将受到损害。因此,所有上述各方都必须采取侵略性和积极主动的方法来保护对房屋敏感信息的设备的访问。这些行动必须又通过联邦法规通过,这确保所有IOT设备保持符合全国范围的网络安全标准。缺席任何联邦安全标准,脆弱的物联网设备将继续在整个美国扩散,进一步使国家和非国有行动者能够攻击公共和私人机构所需的资源,这些资源攻击我们国家最敏感的技术。只有通过采取这些平衡的步骤,美国才能向美国推进,同时平衡这种剃刀的边缘,以利用国内使用的IOT设备,同时在家里保护自己的知识产权和技术。

著录项

相似文献

  • 外文文献
  • 中文文献
获取原文

客服邮箱:kefu@zhangqiaokeyan.com

京公网安备:11010802029741号 ICP备案号:京ICP备15016152号-6 六维联合信息科技 (北京) 有限公司©版权所有
  • 客服微信

  • 服务号