Cyber Defense eMagazine May 2019
Cyber Defense eMagazine May Edition for 2019 #CDM #CYBERDEFENSEMAG @CyberDefenseMag by @Miliefsky a world-renowned cybersecurity expert and the Publisher of Cyber Defense Magazine as part of the Cyber Defense Media Group
Cyber Defense eMagazine May Edition for 2019 #CDM #CYBERDEFENSEMAG @CyberDefenseMag by @Miliefsky a world-renowned cybersecurity expert and the Publisher of Cyber Defense Magazine as part of the Cyber Defense Media Group
Create successful ePaper yourself
Turn your PDF publications into a flip-book with our unique Google optimized e-Paper software.
would show that it’s so hard to access someone’s privileged account if you do not count on someone<br />
being inside that organization and providing you the critical data. On the other hand, any critical<br />
infrastructure device could get vulnerable to cyber incidents and in that fashion; we could discuss a bit<br />
more the endpoint security challenges. In other words, it’s crucially important to carefully manage the<br />
sensitive information for a reason if you leave your login details and security procedures as well as<br />
policies within some computing unit – the bad guys could get in possession of those information and use<br />
them to access the privileged accounts. Also, it’s significant to mention that the privileged account is not<br />
necessarily the access to some could-based environment, but rather the approach to some computer,<br />
server or even datacenter. In other words, the privileged accounts could serve to protect some machine<br />
from being exposed to the malicious activities.<br />
The Internet of Things as a Critical Infrastructure<br />
So many people on the planet would apply the IoT devices through their everyday’s lives and business<br />
activities and they would certainly get dependable on those solutions. For instance, there are so many<br />
IoT smart homes, buildings and even cities in the world and the functionality of those systems could get<br />
deeply correlated with the ability of those solutions to communicate using the web signal. The internet<br />
communications could get distinguished into three main spots and those are source, transition and<br />
destination ones. It’s well-known that the critical assets would use the security operating centers in order<br />
to get safe or at least under the well-managed risk and the similar practice could get applied to the internet<br />
providers which would literarily feed the IoT solutions with their communications signal. For example, let’s<br />
discuss the IoT smart heating system for a while! The IoT smart heating system would mainly deal with<br />
the computing device getting some software with so and that application would use the internet<br />
connectivity in order to exchange the information with the gateway asset. Any heating system would get<br />
the thermostat as the gadget that would control the functioning of the boiler that would pump the water<br />
to the radiators. In addition, the IoT smart device with its application on would send the web signal to the<br />
router and the router would talk to thermostat in order to make it obtains the desired temperature and the<br />
additional conditions in that place. If there is no internet connectivity – there would not be any operability<br />
to that system, so far. This could get so serious during the winter months because the hackers and even<br />
terrorists could disable your internet connection attacking your web provider and leaving you without the<br />
heating at, say, your Christmas Eve. This could get the challenge to so many IoT manufactures which<br />
would not take into account the security of their products and which would offer the quite unreliable<br />
solutions on the marketplace. In other words, we do not want to criticize anyone because the IoT is so<br />
fast growing landscape and so many small economies worldwide would see their chance to progress<br />
making and selling the IoT solutions. That’s the quite convenient way to make a profit on, but do not be<br />
that selfish to put on the risk so many people over the globe.<br />
How to Secure Your Critical Asset?<br />
The best practice would suggest that one of the ways to protect your critical asset is to use the privileged<br />
accounts. Even if you cope with those accounts – you should always care about their safety and security.<br />
It’s quite clear that if we include the IoT into the critical infrastructure – you would need to think hard about<br />
some alternative options how to make those solutions being so functional even without the internet<br />
connectivity. It would appear that in such a case we need to go a step back for a reason our web network<br />
is not that safe at all. Also, we would recommend to protect your internet providers and, in some manner,<br />
guarantee the security of your signal delivery. We live in the historically quite turbulent period for the<br />
entire human kind, so that’s why it matters to think about your and everyone’s security.<br />
79