02.05.2019 Views

Cyber Defense eMagazine May 2019

Cyber Defense eMagazine May Edition for 2019 #CDM #CYBERDEFENSEMAG @CyberDefenseMag by @Miliefsky a world-renowned cybersecurity expert and the Publisher of Cyber Defense Magazine as part of the Cyber Defense Media Group

Cyber Defense eMagazine May Edition for 2019 #CDM #CYBERDEFENSEMAG @CyberDefenseMag by @Miliefsky a world-renowned cybersecurity expert and the Publisher of Cyber Defense Magazine as part of the Cyber Defense Media Group

SHOW MORE
SHOW LESS

Create successful ePaper yourself

Turn your PDF publications into a flip-book with our unique Google optimized e-Paper software.

would show that it’s so hard to access someone’s privileged account if you do not count on someone<br />

being inside that organization and providing you the critical data. On the other hand, any critical<br />

infrastructure device could get vulnerable to cyber incidents and in that fashion; we could discuss a bit<br />

more the endpoint security challenges. In other words, it’s crucially important to carefully manage the<br />

sensitive information for a reason if you leave your login details and security procedures as well as<br />

policies within some computing unit – the bad guys could get in possession of those information and use<br />

them to access the privileged accounts. Also, it’s significant to mention that the privileged account is not<br />

necessarily the access to some could-based environment, but rather the approach to some computer,<br />

server or even datacenter. In other words, the privileged accounts could serve to protect some machine<br />

from being exposed to the malicious activities.<br />

The Internet of Things as a Critical Infrastructure<br />

So many people on the planet would apply the IoT devices through their everyday’s lives and business<br />

activities and they would certainly get dependable on those solutions. For instance, there are so many<br />

IoT smart homes, buildings and even cities in the world and the functionality of those systems could get<br />

deeply correlated with the ability of those solutions to communicate using the web signal. The internet<br />

communications could get distinguished into three main spots and those are source, transition and<br />

destination ones. It’s well-known that the critical assets would use the security operating centers in order<br />

to get safe or at least under the well-managed risk and the similar practice could get applied to the internet<br />

providers which would literarily feed the IoT solutions with their communications signal. For example, let’s<br />

discuss the IoT smart heating system for a while! The IoT smart heating system would mainly deal with<br />

the computing device getting some software with so and that application would use the internet<br />

connectivity in order to exchange the information with the gateway asset. Any heating system would get<br />

the thermostat as the gadget that would control the functioning of the boiler that would pump the water<br />

to the radiators. In addition, the IoT smart device with its application on would send the web signal to the<br />

router and the router would talk to thermostat in order to make it obtains the desired temperature and the<br />

additional conditions in that place. If there is no internet connectivity – there would not be any operability<br />

to that system, so far. This could get so serious during the winter months because the hackers and even<br />

terrorists could disable your internet connection attacking your web provider and leaving you without the<br />

heating at, say, your Christmas Eve. This could get the challenge to so many IoT manufactures which<br />

would not take into account the security of their products and which would offer the quite unreliable<br />

solutions on the marketplace. In other words, we do not want to criticize anyone because the IoT is so<br />

fast growing landscape and so many small economies worldwide would see their chance to progress<br />

making and selling the IoT solutions. That’s the quite convenient way to make a profit on, but do not be<br />

that selfish to put on the risk so many people over the globe.<br />

How to Secure Your Critical Asset?<br />

The best practice would suggest that one of the ways to protect your critical asset is to use the privileged<br />

accounts. Even if you cope with those accounts – you should always care about their safety and security.<br />

It’s quite clear that if we include the IoT into the critical infrastructure – you would need to think hard about<br />

some alternative options how to make those solutions being so functional even without the internet<br />

connectivity. It would appear that in such a case we need to go a step back for a reason our web network<br />

is not that safe at all. Also, we would recommend to protect your internet providers and, in some manner,<br />

guarantee the security of your signal delivery. We live in the historically quite turbulent period for the<br />

entire human kind, so that’s why it matters to think about your and everyone’s security.<br />

79

Hooray! Your file is uploaded and ready to be published.

Saved successfully!

Ooh no, something went wrong!