SlideShare a Scribd company logo
1 of 1
Download to read offline
The IIoT is poised to bring a new world of benefits to businesses
operating industrial systems - optimized operations and supply
chains, greater business agility, new revenue streams and services
and more.
To fully capture these benefits, the systems are exploding in scope
to greater internet connectivity and shifting further away from the
historically closed systems that relied more heavily on physical
security to ensure integrity.
Unfortunately, with this broader connectivity comes new attack
vectors, vulnerabilities, and more opportunities for hackers.
Serial Port
Servers
Rapid 7 found
vulnerabilities in the
configuration of serial
ports or terminal
servers, whichcould
expose a range of
critical assets such as
POS terminals, ATM's
and industrial control
systems.
April 2013
Researchers were able
to imitate BMW
servers and send
remote unlocking
instructions to
vehicles.
Jan 2015
Wired reporter is
shown how a Jeep
can be controlled
remotely by two
security researchers.
1.5 million cars have
been recalled since.
Jul 2015
Sniper Rifle
Security researchers
at the Black Hat
Hacker conference
showed how you can
hack into a
TrackingPoint
self-aiming rifle
through vulnerabilities
in its software.
Jul 2015
Power Quality
Analyzers
Applied Risk released
a report showing
vulnerabilities in
power quality
analyzers used to
monitor power quality
and analyze electrical
disturbances that can
interfere with
industrial equipment.
Oct 2015
The Stuxnet
Worm
Allegedly created by
American-Israeli
Governments in order
to attack Iran's
Nuclear Facilities. The
systems compromised
weren't connected to
the internet at the
time.
Centrifuges and
valves were
sabotaged and five
companies related to
the nuclear
programme were also
breached.
Nov 2007
SCADA System
Hackers destroyed a
pump used by a US
Water Utility
Company after
gaining remote access
to their SCADA
system by stealing
usernames and
passwords belonging
to the manufacturer’s
customers.
Levels of chemicals in
the treatment
company were
changed and 2.5
million customer's had
their personal data
exposed online.
Nov 2011
Smart Meters
Smart Meters were
hacked in Puerto Rico
to reduce power bills.
The FBI was asked to
investigate and found
that these hacks did
need a physical
presence.
They also found that
the Puerto Rico Utility
Industry was losing an
average of
$400million a year
from Smart Meter
hacking.
April 2012
German Steel
Mill
Hackers gained access
to the steel mill through
phishing emails and
prevented their
blast-furnace from
shutting down.
This results in
catastrophic damage to
the plant, its systems
and its equipment.
Jan 2015
The company was
breached when
hackers used malware
to penetrate a HVAC
company working for
them.
Personal data for over
70 million customers
was stolen.
Dec 2013
Ukraine Power
Grid
Hackers used stolen
credentials to gain
remote access to the
Ukrainian power grid
and cut power to 30
substations and
225,000 customers.
The attack included
installation of custom
firmware, deletion of
files including master
boot records, and
shutting down of
telephone
communications.
Mar 2016
WHAT IS THE IIOT?
The Industrial Internet of
Things (IIoT), aka the Industrial
Internet, is the integration of
complex machinery with
networked sensors and
software. The machines are
connected and talking to each
other, and communicating back
to centralized control systems.
Example industries include:
Manufacturing
/ factories
Power plants
Energy grids
Semiconductors
Automotive
Aerospace
Commercial
Building
Automation
Implement Security into
Your IIoT Ecosystems Now
According to the Industrial Internet Consortium
(IIC), only 25% of organizations have a clear IIoT
security strategy. Leaders are struggling most
with data security (51%) and privacy (39%).
Overcoming these barriers is essential to the
success of the IIoT. The following are tips for
implementing security in your IIoT ecosystem.
With decades of
experience as an identity
services provider and
proven Public Key
Infrastructure (PKI) and
Identity and Access
Management (IAM)
solutions, GlobalSign is
uniquely positioned to
help you build identity
management and security
into your IoT ecosystem
with minimal CAPEX and
time to market.
http://bit.ly/manage-iot
BRINGING INDUSTRIAL SYSTEMS ONLINE:
A HISTORY OF IIOT CYBER-ATTACKS
& THE FUTURE OF SECURITY
Cyber-Attacks
These were actual
attacks by hackers!
Exploits
An exploit is where a
vulnerability was found
and exposed by
researchers in the media.
2. Information Security
Principles
Leverage established
standards covering these
key information security
principles: authentication,
authorization, encryption
and data integrity.
1. Security by Design
Build security into
your IIoT systems as
early as possible.
3. Use Proven
Technologies and
Standards
Combining secure
hardware (such as
Trusted Platform
Modules - TPMs) with
Digital Certificates (such
as public key
infrastructure – PKI)
enables robust identity
assumptions.
4. Leverage the Cloud
The SaaS model allows
for high scale
certificate deployments
without changing
infrastructure hardware
and has built in
mechanisms for
audit-ability, access
control and reporting.
5. Don't Go it Alone
Whether you are an
organization building
your own IIoT products
/solutions or a
technology vendor,
finding the right
security partner to
address the risk and
needs of your
ecosystem is the key to
success. 
Sources: http://www.iiconsortium.org/, http://www.gartner.com/, https://www.wired.com, http://www.independent.co.uk/, https://www.theguardian.com, http://bgr.com/,
http://www.haaretz.com/, http://www.darkreading.com/, http://krebsonsecurity.com/, http://www.csoonline.com/, http://www.theregister.co.uk/, https://securityledger.com

More Related Content

What's hot

The Business Case for Iot and IIoT for the Manufacturer
The Business Case for Iot and IIoT for the ManufacturerThe Business Case for Iot and IIoT for the Manufacturer
The Business Case for Iot and IIoT for the ManufacturerUSA Firmware, LLC
 
IIoT - A data-driven future for manufacturing
IIoT - A data-driven future for manufacturingIIoT - A data-driven future for manufacturing
IIoT - A data-driven future for manufacturingLisa Waddell
 
IoT vs IIoT vs Industry 4.0
IoT vs IIoT vs Industry 4.0IoT vs IIoT vs Industry 4.0
IoT vs IIoT vs Industry 4.0SMACAR Solutions
 
Strong Security Elements for IoT Manufacturing
Strong Security Elements for IoT Manufacturing Strong Security Elements for IoT Manufacturing
Strong Security Elements for IoT Manufacturing GlobalSign
 
IIoT : Old Wine in a New Bottle?
IIoT : Old Wine in a New Bottle?IIoT : Old Wine in a New Bottle?
IIoT : Old Wine in a New Bottle?Venu Vasudevan
 
7 trends of IoT in 2017
7 trends of IoT in 20177 trends of IoT in 2017
7 trends of IoT in 2017Ahmed Banafa
 
Data Value Creation in the Industrial IoT
Data Value Creation in the Industrial IoTData Value Creation in the Industrial IoT
Data Value Creation in the Industrial IoTSemyon Teplisky
 
Internet of Things Service Level Agreements: Market Outlook and Forecast for ...
Internet of Things Service Level Agreements: Market Outlook and Forecast for ...Internet of Things Service Level Agreements: Market Outlook and Forecast for ...
Internet of Things Service Level Agreements: Market Outlook and Forecast for ...Market Research Reports, Inc.
 
Industry 4.0 Smart Factory IoT Solutions- building the digital enterprise to ...
Industry 4.0 Smart Factory IoT Solutions- building the digital enterprise to ...Industry 4.0 Smart Factory IoT Solutions- building the digital enterprise to ...
Industry 4.0 Smart Factory IoT Solutions- building the digital enterprise to ...Solution Analysts
 
Edge-controlled, cloud-connected: Design patterns for the IIoT
Edge-controlled, cloud-connected: Design patterns for the IIoTEdge-controlled, cloud-connected: Design patterns for the IIoT
Edge-controlled, cloud-connected: Design patterns for the IIoTJohn Breitenbach
 
The Internet of Things (IoT for Beginners Guide)
The Internet of Things (IoT for Beginners Guide)The Internet of Things (IoT for Beginners Guide)
The Internet of Things (IoT for Beginners Guide)Ashish Kumar
 
The Internet of Things is Here: Implementing IoT in Your Facility
The Internet of Things is Here: Implementing IoT in Your FacilityThe Internet of Things is Here: Implementing IoT in Your Facility
The Internet of Things is Here: Implementing IoT in Your FacilitySenseware
 
AI is the Catalyst of IoT
AI is the Catalyst of IoTAI is the Catalyst of IoT
AI is the Catalyst of IoTAhmed Banafa
 
Iot viewpoints. Ovum explores the IoT opportunity in 2018 and beyond
Iot viewpoints. Ovum explores the IoT opportunity in 2018 and beyondIot viewpoints. Ovum explores the IoT opportunity in 2018 and beyond
Iot viewpoints. Ovum explores the IoT opportunity in 2018 and beyondDigital Policy and Law Consulting
 
Internet of Things Corporate Presentation
Internet of Things Corporate PresentationInternet of Things Corporate Presentation
Internet of Things Corporate PresentationMomentumPR
 
IoT implementation and Challenges
IoT implementation and ChallengesIoT implementation and Challenges
IoT implementation and ChallengesAhmed Banafa
 
Top 10 trends of internet of things in 2020
Top 10 trends of internet of things in 2020Top 10 trends of internet of things in 2020
Top 10 trends of internet of things in 2020Claritus Consulting
 

What's hot (20)

The Business Case for Iot and IIoT for the Manufacturer
The Business Case for Iot and IIoT for the ManufacturerThe Business Case for Iot and IIoT for the Manufacturer
The Business Case for Iot and IIoT for the Manufacturer
 
IIoT - A data-driven future for manufacturing
IIoT - A data-driven future for manufacturingIIoT - A data-driven future for manufacturing
IIoT - A data-driven future for manufacturing
 
IoT vs IIoT vs Industry 4.0
IoT vs IIoT vs Industry 4.0IoT vs IIoT vs Industry 4.0
IoT vs IIoT vs Industry 4.0
 
Strong Security Elements for IoT Manufacturing
Strong Security Elements for IoT Manufacturing Strong Security Elements for IoT Manufacturing
Strong Security Elements for IoT Manufacturing
 
IIoT : Old Wine in a New Bottle?
IIoT : Old Wine in a New Bottle?IIoT : Old Wine in a New Bottle?
IIoT : Old Wine in a New Bottle?
 
7 trends of IoT in 2017
7 trends of IoT in 20177 trends of IoT in 2017
7 trends of IoT in 2017
 
IoT PPT
IoT PPTIoT PPT
IoT PPT
 
Data Value Creation in the Industrial IoT
Data Value Creation in the Industrial IoTData Value Creation in the Industrial IoT
Data Value Creation in the Industrial IoT
 
Internet of Things Service Level Agreements: Market Outlook and Forecast for ...
Internet of Things Service Level Agreements: Market Outlook and Forecast for ...Internet of Things Service Level Agreements: Market Outlook and Forecast for ...
Internet of Things Service Level Agreements: Market Outlook and Forecast for ...
 
Industry 4.0 Smart Factory IoT Solutions- building the digital enterprise to ...
Industry 4.0 Smart Factory IoT Solutions- building the digital enterprise to ...Industry 4.0 Smart Factory IoT Solutions- building the digital enterprise to ...
Industry 4.0 Smart Factory IoT Solutions- building the digital enterprise to ...
 
Edge-controlled, cloud-connected: Design patterns for the IIoT
Edge-controlled, cloud-connected: Design patterns for the IIoTEdge-controlled, cloud-connected: Design patterns for the IIoT
Edge-controlled, cloud-connected: Design patterns for the IIoT
 
The Internet of Things (IoT for Beginners Guide)
The Internet of Things (IoT for Beginners Guide)The Internet of Things (IoT for Beginners Guide)
The Internet of Things (IoT for Beginners Guide)
 
The Internet of Things is Here: Implementing IoT in Your Facility
The Internet of Things is Here: Implementing IoT in Your FacilityThe Internet of Things is Here: Implementing IoT in Your Facility
The Internet of Things is Here: Implementing IoT in Your Facility
 
Future of IoT at IoTCOK
Future of IoT at IoTCOKFuture of IoT at IoTCOK
Future of IoT at IoTCOK
 
AI is the Catalyst of IoT
AI is the Catalyst of IoTAI is the Catalyst of IoT
AI is the Catalyst of IoT
 
Intro to IoT-23Sep2015
Intro to IoT-23Sep2015Intro to IoT-23Sep2015
Intro to IoT-23Sep2015
 
Iot viewpoints. Ovum explores the IoT opportunity in 2018 and beyond
Iot viewpoints. Ovum explores the IoT opportunity in 2018 and beyondIot viewpoints. Ovum explores the IoT opportunity in 2018 and beyond
Iot viewpoints. Ovum explores the IoT opportunity in 2018 and beyond
 
Internet of Things Corporate Presentation
Internet of Things Corporate PresentationInternet of Things Corporate Presentation
Internet of Things Corporate Presentation
 
IoT implementation and Challenges
IoT implementation and ChallengesIoT implementation and Challenges
IoT implementation and Challenges
 
Top 10 trends of internet of things in 2020
Top 10 trends of internet of things in 2020Top 10 trends of internet of things in 2020
Top 10 trends of internet of things in 2020
 

Viewers also liked

The New Ignition v7.9 - See, Maintain, and Manage Your Enterprise With Ease
The New Ignition v7.9 - See, Maintain, and Manage Your Enterprise With Ease The New Ignition v7.9 - See, Maintain, and Manage Your Enterprise With Ease
The New Ignition v7.9 - See, Maintain, and Manage Your Enterprise With Ease Inductive Automation
 
Get More Data Into Your SCADA 2016
Get More Data Into Your SCADA 2016Get More Data Into Your SCADA 2016
Get More Data Into Your SCADA 2016Inductive Automation
 
Exploring the Digital Oilfield 2016
Exploring the Digital Oilfield 2016Exploring the Digital Oilfield 2016
Exploring the Digital Oilfield 2016Inductive Automation
 
Design Like a Pro - Best Practices For IIoT 2016
Design Like a Pro - Best Practices For IIoT 2016Design Like a Pro - Best Practices For IIoT 2016
Design Like a Pro - Best Practices For IIoT 2016Inductive Automation
 
2016 imawmf tieghi_security_ ics_r
2016 imawmf tieghi_security_ ics_r2016 imawmf tieghi_security_ ics_r
2016 imawmf tieghi_security_ ics_rEnzo M. Tieghi
 
Securing Mobile & Online Identity in the Cyber World
Securing Mobile & Online Identity in the Cyber WorldSecuring Mobile & Online Identity in the Cyber World
Securing Mobile & Online Identity in the Cyber WorldEmil Tan
 
Cyber Security Presentation "It Will Never Happen To Me"
Cyber Security Presentation "It Will Never Happen To Me" Cyber Security Presentation "It Will Never Happen To Me"
Cyber Security Presentation "It Will Never Happen To Me" Simon Salter
 
The Evolution of Cybercrime
The Evolution of CybercrimeThe Evolution of Cybercrime
The Evolution of CybercrimeStephen Cobb
 
Industrial IOT: Ti tech day jithu atoll solutions
Industrial IOT: Ti tech day jithu atoll solutionsIndustrial IOT: Ti tech day jithu atoll solutions
Industrial IOT: Ti tech day jithu atoll solutionsJithu Niruthambath
 
History and future cybercrime
History and future cybercrimeHistory and future cybercrime
History and future cybercrimeOnline
 
What is next for IoT and IIoT
What is next for IoT and IIoTWhat is next for IoT and IIoT
What is next for IoT and IIoTAhmed Banafa
 
Tracxn Research — Industrial IoT Landscape, October 2016
Tracxn Research —  Industrial IoT Landscape, October 2016Tracxn Research —  Industrial IoT Landscape, October 2016
Tracxn Research — Industrial IoT Landscape, October 2016Tracxn
 
Introduction to Cyber Security
Introduction to Cyber SecurityIntroduction to Cyber Security
Introduction to Cyber SecurityStephen Lahanas
 
Top Cyber Security Trends for 2016
Top Cyber Security Trends for 2016Top Cyber Security Trends for 2016
Top Cyber Security Trends for 2016Imperva
 
Facebook Presentation
Facebook PresentationFacebook Presentation
Facebook Presentationkda211
 

Viewers also liked (20)

The New Ignition v7.9 - See, Maintain, and Manage Your Enterprise With Ease
The New Ignition v7.9 - See, Maintain, and Manage Your Enterprise With Ease The New Ignition v7.9 - See, Maintain, and Manage Your Enterprise With Ease
The New Ignition v7.9 - See, Maintain, and Manage Your Enterprise With Ease
 
Get More Data Into Your SCADA 2016
Get More Data Into Your SCADA 2016Get More Data Into Your SCADA 2016
Get More Data Into Your SCADA 2016
 
Exploring the Digital Oilfield 2016
Exploring the Digital Oilfield 2016Exploring the Digital Oilfield 2016
Exploring the Digital Oilfield 2016
 
Design Like a Pro - Best Practices For IIoT 2016
Design Like a Pro - Best Practices For IIoT 2016Design Like a Pro - Best Practices For IIoT 2016
Design Like a Pro - Best Practices For IIoT 2016
 
Wonderware tutorial
Wonderware tutorialWonderware tutorial
Wonderware tutorial
 
PLC SCADA
PLC SCADAPLC SCADA
PLC SCADA
 
2016 imawmf tieghi_security_ ics_r
2016 imawmf tieghi_security_ ics_r2016 imawmf tieghi_security_ ics_r
2016 imawmf tieghi_security_ ics_r
 
Securing Mobile & Online Identity in the Cyber World
Securing Mobile & Online Identity in the Cyber WorldSecuring Mobile & Online Identity in the Cyber World
Securing Mobile & Online Identity in the Cyber World
 
Cyber Security Presentation "It Will Never Happen To Me"
Cyber Security Presentation "It Will Never Happen To Me" Cyber Security Presentation "It Will Never Happen To Me"
Cyber Security Presentation "It Will Never Happen To Me"
 
Cyber crime ppt
Cyber crime  pptCyber crime  ppt
Cyber crime ppt
 
The Evolution of Cybercrime
The Evolution of CybercrimeThe Evolution of Cybercrime
The Evolution of Cybercrime
 
Industrial IOT: Ti tech day jithu atoll solutions
Industrial IOT: Ti tech day jithu atoll solutionsIndustrial IOT: Ti tech day jithu atoll solutions
Industrial IOT: Ti tech day jithu atoll solutions
 
History and future cybercrime
History and future cybercrimeHistory and future cybercrime
History and future cybercrime
 
What is next for IoT and IIoT
What is next for IoT and IIoTWhat is next for IoT and IIoT
What is next for IoT and IIoT
 
Tracxn Research — Industrial IoT Landscape, October 2016
Tracxn Research —  Industrial IoT Landscape, October 2016Tracxn Research —  Industrial IoT Landscape, October 2016
Tracxn Research — Industrial IoT Landscape, October 2016
 
Hacking
HackingHacking
Hacking
 
Introduction to Cyber Security
Introduction to Cyber SecurityIntroduction to Cyber Security
Introduction to Cyber Security
 
Top Cyber Security Trends for 2016
Top Cyber Security Trends for 2016Top Cyber Security Trends for 2016
Top Cyber Security Trends for 2016
 
Hacking ppt
Hacking pptHacking ppt
Hacking ppt
 
Facebook Presentation
Facebook PresentationFacebook Presentation
Facebook Presentation
 

Similar to A History of IIoT Cyber-Attacks & Checklist for Implementing Security [Infographic]

Chris Swan's presentation from the London Tech Entrepreneurs' Meetup
Chris Swan's presentation from the London Tech Entrepreneurs' MeetupChris Swan's presentation from the London Tech Entrepreneurs' Meetup
Chris Swan's presentation from the London Tech Entrepreneurs' MeetupCohesive Networks
 
Gartner technologies for Infosec 2014-2015
Gartner technologies for Infosec 2014-2015Gartner technologies for Infosec 2014-2015
Gartner technologies for Infosec 2014-2015Samuel Kamuli
 
Security In an IoT World
Security In an IoT WorldSecurity In an IoT World
Security In an IoT Worldsyrinxtech
 
Internet of Things - A Different Kind of Scary v2
Internet of Things - A Different Kind of Scary v2Internet of Things - A Different Kind of Scary v2
Internet of Things - A Different Kind of Scary v2FitCEO, Inc. (FCI)
 
VET4SBO Level 2 module 6 - unit 4 - v0.9 en
VET4SBO Level 2   module 6 - unit 4  - v0.9 enVET4SBO Level 2   module 6 - unit 4  - v0.9 en
VET4SBO Level 2 module 6 - unit 4 - v0.9 enKarel Van Isacker
 
Cybersecurity in the Era of IoT
Cybersecurity in the Era of IoTCybersecurity in the Era of IoT
Cybersecurity in the Era of IoTAmy Daly
 
Internet & iot security
Internet & iot securityInternet & iot security
Internet & iot securityUsman Anjum
 
Product security by Blockchain, AI and Security Certs
Product security by Blockchain, AI and Security CertsProduct security by Blockchain, AI and Security Certs
Product security by Blockchain, AI and Security CertsLabSharegroup
 
Secure your Future with IoT Security Testing | Application Security
Secure your Future with IoT Security Testing | Application SecuritySecure your Future with IoT Security Testing | Application Security
Secure your Future with IoT Security Testing | Application SecurityCigniti Technologies Ltd
 
Emerging application and data protection for multi cloud
Emerging application and data protection for multi cloudEmerging application and data protection for multi cloud
Emerging application and data protection for multi cloudUlf Mattsson
 
Securing your IoT Implementations
Securing your IoT ImplementationsSecuring your IoT Implementations
Securing your IoT ImplementationsTechWell
 
Trylogic- Cyber security by Vikalp Sharma- FDP Presentation July 9 2020
Trylogic- Cyber security by Vikalp Sharma- FDP Presentation July 9 2020Trylogic- Cyber security by Vikalp Sharma- FDP Presentation July 9 2020
Trylogic- Cyber security by Vikalp Sharma- FDP Presentation July 9 2020Vikalp Sharma
 
Hacking Internet of Things (IoT)
Hacking Internet of Things (IoT)Hacking Internet of Things (IoT)
Hacking Internet of Things (IoT)SecPod Technologies
 
Cybersecurity | Risk. Impact. Innovations.
Cybersecurity | Risk. Impact. Innovations.Cybersecurity | Risk. Impact. Innovations.
Cybersecurity | Risk. Impact. Innovations.Vertex Holdings
 
IRJET- Minimize Phishing Attacks: Securing Spear Attacks
IRJET- Minimize Phishing Attacks: Securing Spear AttacksIRJET- Minimize Phishing Attacks: Securing Spear Attacks
IRJET- Minimize Phishing Attacks: Securing Spear AttacksIRJET Journal
 
Final Research Project - Securing IoT Devices What are the Challe.docx
Final Research Project - Securing IoT Devices What are the Challe.docxFinal Research Project - Securing IoT Devices What are the Challe.docx
Final Research Project - Securing IoT Devices What are the Challe.docxvoversbyobersby
 
Security & Compliance in the Cloud - Proactively Managing Governance, Risk & ...
Security & Compliance in the Cloud - Proactively Managing Governance, Risk & ...Security & Compliance in the Cloud - Proactively Managing Governance, Risk & ...
Security & Compliance in the Cloud - Proactively Managing Governance, Risk & ...Chad Lawler
 
AI Meets 21stC Security: Trends & Scenarios!
AI Meets 21stC Security: Trends & Scenarios!AI Meets 21stC Security: Trends & Scenarios!
AI Meets 21stC Security: Trends & Scenarios!Dr David Probert
 
IoT Referenceshttpswww.techrepublic.comarticlehow-to-secur.docx
IoT Referenceshttpswww.techrepublic.comarticlehow-to-secur.docxIoT Referenceshttpswww.techrepublic.comarticlehow-to-secur.docx
IoT Referenceshttpswww.techrepublic.comarticlehow-to-secur.docxmariuse18nolet
 

Similar to A History of IIoT Cyber-Attacks & Checklist for Implementing Security [Infographic] (20)

Chris Swan's presentation from the London Tech Entrepreneurs' Meetup
Chris Swan's presentation from the London Tech Entrepreneurs' MeetupChris Swan's presentation from the London Tech Entrepreneurs' Meetup
Chris Swan's presentation from the London Tech Entrepreneurs' Meetup
 
Gartner technologies for Infosec 2014-2015
Gartner technologies for Infosec 2014-2015Gartner technologies for Infosec 2014-2015
Gartner technologies for Infosec 2014-2015
 
Security In an IoT World
Security In an IoT WorldSecurity In an IoT World
Security In an IoT World
 
Internet of Things - A Different Kind of Scary v2
Internet of Things - A Different Kind of Scary v2Internet of Things - A Different Kind of Scary v2
Internet of Things - A Different Kind of Scary v2
 
VET4SBO Level 2 module 6 - unit 4 - v0.9 en
VET4SBO Level 2   module 6 - unit 4  - v0.9 enVET4SBO Level 2   module 6 - unit 4  - v0.9 en
VET4SBO Level 2 module 6 - unit 4 - v0.9 en
 
Cybersecurity in the Era of IoT
Cybersecurity in the Era of IoTCybersecurity in the Era of IoT
Cybersecurity in the Era of IoT
 
Internet & iot security
Internet & iot securityInternet & iot security
Internet & iot security
 
Product security by Blockchain, AI and Security Certs
Product security by Blockchain, AI and Security CertsProduct security by Blockchain, AI and Security Certs
Product security by Blockchain, AI and Security Certs
 
Secure your Future with IoT Security Testing | Application Security
Secure your Future with IoT Security Testing | Application SecuritySecure your Future with IoT Security Testing | Application Security
Secure your Future with IoT Security Testing | Application Security
 
Emerging application and data protection for multi cloud
Emerging application and data protection for multi cloudEmerging application and data protection for multi cloud
Emerging application and data protection for multi cloud
 
Securing your IoT Implementations
Securing your IoT ImplementationsSecuring your IoT Implementations
Securing your IoT Implementations
 
Trylogic- Cyber security by Vikalp Sharma- FDP Presentation July 9 2020
Trylogic- Cyber security by Vikalp Sharma- FDP Presentation July 9 2020Trylogic- Cyber security by Vikalp Sharma- FDP Presentation July 9 2020
Trylogic- Cyber security by Vikalp Sharma- FDP Presentation July 9 2020
 
Hacking Internet of Things (IoT)
Hacking Internet of Things (IoT)Hacking Internet of Things (IoT)
Hacking Internet of Things (IoT)
 
Cybersecurity | Risk. Impact. Innovations.
Cybersecurity | Risk. Impact. Innovations.Cybersecurity | Risk. Impact. Innovations.
Cybersecurity | Risk. Impact. Innovations.
 
IRJET- Minimize Phishing Attacks: Securing Spear Attacks
IRJET- Minimize Phishing Attacks: Securing Spear AttacksIRJET- Minimize Phishing Attacks: Securing Spear Attacks
IRJET- Minimize Phishing Attacks: Securing Spear Attacks
 
Final Research Project - Securing IoT Devices What are the Challe.docx
Final Research Project - Securing IoT Devices What are the Challe.docxFinal Research Project - Securing IoT Devices What are the Challe.docx
Final Research Project - Securing IoT Devices What are the Challe.docx
 
Iot cyber security
Iot cyber securityIot cyber security
Iot cyber security
 
Security & Compliance in the Cloud - Proactively Managing Governance, Risk & ...
Security & Compliance in the Cloud - Proactively Managing Governance, Risk & ...Security & Compliance in the Cloud - Proactively Managing Governance, Risk & ...
Security & Compliance in the Cloud - Proactively Managing Governance, Risk & ...
 
AI Meets 21stC Security: Trends & Scenarios!
AI Meets 21stC Security: Trends & Scenarios!AI Meets 21stC Security: Trends & Scenarios!
AI Meets 21stC Security: Trends & Scenarios!
 
IoT Referenceshttpswww.techrepublic.comarticlehow-to-secur.docx
IoT Referenceshttpswww.techrepublic.comarticlehow-to-secur.docxIoT Referenceshttpswww.techrepublic.comarticlehow-to-secur.docx
IoT Referenceshttpswww.techrepublic.comarticlehow-to-secur.docx
 

Recently uploaded

Call Girls Dubai Prolapsed O525547819 Call Girls In Dubai Princes$
Call Girls Dubai Prolapsed O525547819 Call Girls In Dubai Princes$Call Girls Dubai Prolapsed O525547819 Call Girls In Dubai Princes$
Call Girls Dubai Prolapsed O525547819 Call Girls In Dubai Princes$kojalkojal131
 
(+971568250507 ))# Young Call Girls in Ajman By Pakistani Call Girls in ...
(+971568250507  ))#  Young Call Girls  in Ajman  By Pakistani Call Girls  in ...(+971568250507  ))#  Young Call Girls  in Ajman  By Pakistani Call Girls  in ...
(+971568250507 ))# Young Call Girls in Ajman By Pakistani Call Girls in ...Escorts Call Girls
 
Moving Beyond Twitter/X and Facebook - Social Media for local news providers
Moving Beyond Twitter/X and Facebook - Social Media for local news providersMoving Beyond Twitter/X and Facebook - Social Media for local news providers
Moving Beyond Twitter/X and Facebook - Social Media for local news providersDamian Radcliffe
 
Call Now ☎ 8264348440 !! Call Girls in Sarai Rohilla Escort Service Delhi N.C.R.
Call Now ☎ 8264348440 !! Call Girls in Sarai Rohilla Escort Service Delhi N.C.R.Call Now ☎ 8264348440 !! Call Girls in Sarai Rohilla Escort Service Delhi N.C.R.
Call Now ☎ 8264348440 !! Call Girls in Sarai Rohilla Escort Service Delhi N.C.R.soniya singh
 
Nanded City ( Call Girls ) Pune 6297143586 Hot Model With Sexy Bhabi Ready ...
Nanded City ( Call Girls ) Pune  6297143586  Hot Model With Sexy Bhabi Ready ...Nanded City ( Call Girls ) Pune  6297143586  Hot Model With Sexy Bhabi Ready ...
Nanded City ( Call Girls ) Pune 6297143586 Hot Model With Sexy Bhabi Ready ...tanu pandey
 
Hot Call Girls |Delhi |Hauz Khas ☎ 9711199171 Book Your One night Stand
Hot Call Girls |Delhi |Hauz Khas ☎ 9711199171 Book Your One night StandHot Call Girls |Delhi |Hauz Khas ☎ 9711199171 Book Your One night Stand
Hot Call Girls |Delhi |Hauz Khas ☎ 9711199171 Book Your One night Standkumarajju5765
 
Networking in the Penumbra presented by Geoff Huston at NZNOG
Networking in the Penumbra presented by Geoff Huston at NZNOGNetworking in the Penumbra presented by Geoff Huston at NZNOG
Networking in the Penumbra presented by Geoff Huston at NZNOGAPNIC
 
Russian Call girl in Ajman +971563133746 Ajman Call girl Service
Russian Call girl in Ajman +971563133746 Ajman Call girl ServiceRussian Call girl in Ajman +971563133746 Ajman Call girl Service
Russian Call girl in Ajman +971563133746 Ajman Call girl Servicegwenoracqe6
 
𓀤Call On 7877925207 𓀤 Ahmedguda Call Girls Hot Model With Sexy Bhabi Ready Fo...
𓀤Call On 7877925207 𓀤 Ahmedguda Call Girls Hot Model With Sexy Bhabi Ready Fo...𓀤Call On 7877925207 𓀤 Ahmedguda Call Girls Hot Model With Sexy Bhabi Ready Fo...
𓀤Call On 7877925207 𓀤 Ahmedguda Call Girls Hot Model With Sexy Bhabi Ready Fo...Neha Pandey
 
Call Girls In Model Towh Delhi 💯Call Us 🔝8264348440🔝
Call Girls In Model Towh Delhi 💯Call Us 🔝8264348440🔝Call Girls In Model Towh Delhi 💯Call Us 🔝8264348440🔝
Call Girls In Model Towh Delhi 💯Call Us 🔝8264348440🔝soniya singh
 
Pune Airport ( Call Girls ) Pune 6297143586 Hot Model With Sexy Bhabi Ready...
Pune Airport ( Call Girls ) Pune  6297143586  Hot Model With Sexy Bhabi Ready...Pune Airport ( Call Girls ) Pune  6297143586  Hot Model With Sexy Bhabi Ready...
Pune Airport ( Call Girls ) Pune 6297143586 Hot Model With Sexy Bhabi Ready...tanu pandey
 
On Starlink, presented by Geoff Huston at NZNOG 2024
On Starlink, presented by Geoff Huston at NZNOG 2024On Starlink, presented by Geoff Huston at NZNOG 2024
On Starlink, presented by Geoff Huston at NZNOG 2024APNIC
 
₹5.5k {Cash Payment}New Friends Colony Call Girls In [Delhi NIHARIKA] 🔝|97111...
₹5.5k {Cash Payment}New Friends Colony Call Girls In [Delhi NIHARIKA] 🔝|97111...₹5.5k {Cash Payment}New Friends Colony Call Girls In [Delhi NIHARIKA] 🔝|97111...
₹5.5k {Cash Payment}New Friends Colony Call Girls In [Delhi NIHARIKA] 🔝|97111...Diya Sharma
 
Best VIP Call Girls Noida Sector 75 Call Me: 8448380779
Best VIP Call Girls Noida Sector 75 Call Me: 8448380779Best VIP Call Girls Noida Sector 75 Call Me: 8448380779
Best VIP Call Girls Noida Sector 75 Call Me: 8448380779Delhi Call girls
 
Call Girls In Sukhdev Vihar Delhi 💯Call Us 🔝8264348440🔝
Call Girls In Sukhdev Vihar Delhi 💯Call Us 🔝8264348440🔝Call Girls In Sukhdev Vihar Delhi 💯Call Us 🔝8264348440🔝
Call Girls In Sukhdev Vihar Delhi 💯Call Us 🔝8264348440🔝soniya singh
 
Hire↠Young Call Girls in Tilak nagar (Delhi) ☎️ 9205541914 ☎️ Independent Esc...
Hire↠Young Call Girls in Tilak nagar (Delhi) ☎️ 9205541914 ☎️ Independent Esc...Hire↠Young Call Girls in Tilak nagar (Delhi) ☎️ 9205541914 ☎️ Independent Esc...
Hire↠Young Call Girls in Tilak nagar (Delhi) ☎️ 9205541914 ☎️ Independent Esc...Delhi Call girls
 

Recently uploaded (20)

Call Girls Dubai Prolapsed O525547819 Call Girls In Dubai Princes$
Call Girls Dubai Prolapsed O525547819 Call Girls In Dubai Princes$Call Girls Dubai Prolapsed O525547819 Call Girls In Dubai Princes$
Call Girls Dubai Prolapsed O525547819 Call Girls In Dubai Princes$
 
Russian Call Girls in %(+971524965298 )# Call Girls in Dubai
Russian Call Girls in %(+971524965298  )#  Call Girls in DubaiRussian Call Girls in %(+971524965298  )#  Call Girls in Dubai
Russian Call Girls in %(+971524965298 )# Call Girls in Dubai
 
Rohini Sector 6 Call Girls Delhi 9999965857 @Sabina Saikh No Advance
Rohini Sector 6 Call Girls Delhi 9999965857 @Sabina Saikh No AdvanceRohini Sector 6 Call Girls Delhi 9999965857 @Sabina Saikh No Advance
Rohini Sector 6 Call Girls Delhi 9999965857 @Sabina Saikh No Advance
 
(+971568250507 ))# Young Call Girls in Ajman By Pakistani Call Girls in ...
(+971568250507  ))#  Young Call Girls  in Ajman  By Pakistani Call Girls  in ...(+971568250507  ))#  Young Call Girls  in Ajman  By Pakistani Call Girls  in ...
(+971568250507 ))# Young Call Girls in Ajman By Pakistani Call Girls in ...
 
Moving Beyond Twitter/X and Facebook - Social Media for local news providers
Moving Beyond Twitter/X and Facebook - Social Media for local news providersMoving Beyond Twitter/X and Facebook - Social Media for local news providers
Moving Beyond Twitter/X and Facebook - Social Media for local news providers
 
(INDIRA) Call Girl Pune Call Now 8250077686 Pune Escorts 24x7
(INDIRA) Call Girl Pune Call Now 8250077686 Pune Escorts 24x7(INDIRA) Call Girl Pune Call Now 8250077686 Pune Escorts 24x7
(INDIRA) Call Girl Pune Call Now 8250077686 Pune Escorts 24x7
 
Call Now ☎ 8264348440 !! Call Girls in Sarai Rohilla Escort Service Delhi N.C.R.
Call Now ☎ 8264348440 !! Call Girls in Sarai Rohilla Escort Service Delhi N.C.R.Call Now ☎ 8264348440 !! Call Girls in Sarai Rohilla Escort Service Delhi N.C.R.
Call Now ☎ 8264348440 !! Call Girls in Sarai Rohilla Escort Service Delhi N.C.R.
 
Nanded City ( Call Girls ) Pune 6297143586 Hot Model With Sexy Bhabi Ready ...
Nanded City ( Call Girls ) Pune  6297143586  Hot Model With Sexy Bhabi Ready ...Nanded City ( Call Girls ) Pune  6297143586  Hot Model With Sexy Bhabi Ready ...
Nanded City ( Call Girls ) Pune 6297143586 Hot Model With Sexy Bhabi Ready ...
 
Hot Call Girls |Delhi |Hauz Khas ☎ 9711199171 Book Your One night Stand
Hot Call Girls |Delhi |Hauz Khas ☎ 9711199171 Book Your One night StandHot Call Girls |Delhi |Hauz Khas ☎ 9711199171 Book Your One night Stand
Hot Call Girls |Delhi |Hauz Khas ☎ 9711199171 Book Your One night Stand
 
Networking in the Penumbra presented by Geoff Huston at NZNOG
Networking in the Penumbra presented by Geoff Huston at NZNOGNetworking in the Penumbra presented by Geoff Huston at NZNOG
Networking in the Penumbra presented by Geoff Huston at NZNOG
 
Russian Call girl in Ajman +971563133746 Ajman Call girl Service
Russian Call girl in Ajman +971563133746 Ajman Call girl ServiceRussian Call girl in Ajman +971563133746 Ajman Call girl Service
Russian Call girl in Ajman +971563133746 Ajman Call girl Service
 
𓀤Call On 7877925207 𓀤 Ahmedguda Call Girls Hot Model With Sexy Bhabi Ready Fo...
𓀤Call On 7877925207 𓀤 Ahmedguda Call Girls Hot Model With Sexy Bhabi Ready Fo...𓀤Call On 7877925207 𓀤 Ahmedguda Call Girls Hot Model With Sexy Bhabi Ready Fo...
𓀤Call On 7877925207 𓀤 Ahmedguda Call Girls Hot Model With Sexy Bhabi Ready Fo...
 
Call Girls In Model Towh Delhi 💯Call Us 🔝8264348440🔝
Call Girls In Model Towh Delhi 💯Call Us 🔝8264348440🔝Call Girls In Model Towh Delhi 💯Call Us 🔝8264348440🔝
Call Girls In Model Towh Delhi 💯Call Us 🔝8264348440🔝
 
Pune Airport ( Call Girls ) Pune 6297143586 Hot Model With Sexy Bhabi Ready...
Pune Airport ( Call Girls ) Pune  6297143586  Hot Model With Sexy Bhabi Ready...Pune Airport ( Call Girls ) Pune  6297143586  Hot Model With Sexy Bhabi Ready...
Pune Airport ( Call Girls ) Pune 6297143586 Hot Model With Sexy Bhabi Ready...
 
On Starlink, presented by Geoff Huston at NZNOG 2024
On Starlink, presented by Geoff Huston at NZNOG 2024On Starlink, presented by Geoff Huston at NZNOG 2024
On Starlink, presented by Geoff Huston at NZNOG 2024
 
₹5.5k {Cash Payment}New Friends Colony Call Girls In [Delhi NIHARIKA] 🔝|97111...
₹5.5k {Cash Payment}New Friends Colony Call Girls In [Delhi NIHARIKA] 🔝|97111...₹5.5k {Cash Payment}New Friends Colony Call Girls In [Delhi NIHARIKA] 🔝|97111...
₹5.5k {Cash Payment}New Friends Colony Call Girls In [Delhi NIHARIKA] 🔝|97111...
 
Best VIP Call Girls Noida Sector 75 Call Me: 8448380779
Best VIP Call Girls Noida Sector 75 Call Me: 8448380779Best VIP Call Girls Noida Sector 75 Call Me: 8448380779
Best VIP Call Girls Noida Sector 75 Call Me: 8448380779
 
VVVIP Call Girls In Connaught Place ➡️ Delhi ➡️ 9999965857 🚀 No Advance 24HRS...
VVVIP Call Girls In Connaught Place ➡️ Delhi ➡️ 9999965857 🚀 No Advance 24HRS...VVVIP Call Girls In Connaught Place ➡️ Delhi ➡️ 9999965857 🚀 No Advance 24HRS...
VVVIP Call Girls In Connaught Place ➡️ Delhi ➡️ 9999965857 🚀 No Advance 24HRS...
 
Call Girls In Sukhdev Vihar Delhi 💯Call Us 🔝8264348440🔝
Call Girls In Sukhdev Vihar Delhi 💯Call Us 🔝8264348440🔝Call Girls In Sukhdev Vihar Delhi 💯Call Us 🔝8264348440🔝
Call Girls In Sukhdev Vihar Delhi 💯Call Us 🔝8264348440🔝
 
Hire↠Young Call Girls in Tilak nagar (Delhi) ☎️ 9205541914 ☎️ Independent Esc...
Hire↠Young Call Girls in Tilak nagar (Delhi) ☎️ 9205541914 ☎️ Independent Esc...Hire↠Young Call Girls in Tilak nagar (Delhi) ☎️ 9205541914 ☎️ Independent Esc...
Hire↠Young Call Girls in Tilak nagar (Delhi) ☎️ 9205541914 ☎️ Independent Esc...
 

A History of IIoT Cyber-Attacks & Checklist for Implementing Security [Infographic]

  • 1. The IIoT is poised to bring a new world of benefits to businesses operating industrial systems - optimized operations and supply chains, greater business agility, new revenue streams and services and more. To fully capture these benefits, the systems are exploding in scope to greater internet connectivity and shifting further away from the historically closed systems that relied more heavily on physical security to ensure integrity. Unfortunately, with this broader connectivity comes new attack vectors, vulnerabilities, and more opportunities for hackers. Serial Port Servers Rapid 7 found vulnerabilities in the configuration of serial ports or terminal servers, whichcould expose a range of critical assets such as POS terminals, ATM's and industrial control systems. April 2013 Researchers were able to imitate BMW servers and send remote unlocking instructions to vehicles. Jan 2015 Wired reporter is shown how a Jeep can be controlled remotely by two security researchers. 1.5 million cars have been recalled since. Jul 2015 Sniper Rifle Security researchers at the Black Hat Hacker conference showed how you can hack into a TrackingPoint self-aiming rifle through vulnerabilities in its software. Jul 2015 Power Quality Analyzers Applied Risk released a report showing vulnerabilities in power quality analyzers used to monitor power quality and analyze electrical disturbances that can interfere with industrial equipment. Oct 2015 The Stuxnet Worm Allegedly created by American-Israeli Governments in order to attack Iran's Nuclear Facilities. The systems compromised weren't connected to the internet at the time. Centrifuges and valves were sabotaged and five companies related to the nuclear programme were also breached. Nov 2007 SCADA System Hackers destroyed a pump used by a US Water Utility Company after gaining remote access to their SCADA system by stealing usernames and passwords belonging to the manufacturer’s customers. Levels of chemicals in the treatment company were changed and 2.5 million customer's had their personal data exposed online. Nov 2011 Smart Meters Smart Meters were hacked in Puerto Rico to reduce power bills. The FBI was asked to investigate and found that these hacks did need a physical presence. They also found that the Puerto Rico Utility Industry was losing an average of $400million a year from Smart Meter hacking. April 2012 German Steel Mill Hackers gained access to the steel mill through phishing emails and prevented their blast-furnace from shutting down. This results in catastrophic damage to the plant, its systems and its equipment. Jan 2015 The company was breached when hackers used malware to penetrate a HVAC company working for them. Personal data for over 70 million customers was stolen. Dec 2013 Ukraine Power Grid Hackers used stolen credentials to gain remote access to the Ukrainian power grid and cut power to 30 substations and 225,000 customers. The attack included installation of custom firmware, deletion of files including master boot records, and shutting down of telephone communications. Mar 2016 WHAT IS THE IIOT? The Industrial Internet of Things (IIoT), aka the Industrial Internet, is the integration of complex machinery with networked sensors and software. The machines are connected and talking to each other, and communicating back to centralized control systems. Example industries include: Manufacturing / factories Power plants Energy grids Semiconductors Automotive Aerospace Commercial Building Automation Implement Security into Your IIoT Ecosystems Now According to the Industrial Internet Consortium (IIC), only 25% of organizations have a clear IIoT security strategy. Leaders are struggling most with data security (51%) and privacy (39%). Overcoming these barriers is essential to the success of the IIoT. The following are tips for implementing security in your IIoT ecosystem. With decades of experience as an identity services provider and proven Public Key Infrastructure (PKI) and Identity and Access Management (IAM) solutions, GlobalSign is uniquely positioned to help you build identity management and security into your IoT ecosystem with minimal CAPEX and time to market. http://bit.ly/manage-iot BRINGING INDUSTRIAL SYSTEMS ONLINE: A HISTORY OF IIOT CYBER-ATTACKS & THE FUTURE OF SECURITY Cyber-Attacks These were actual attacks by hackers! Exploits An exploit is where a vulnerability was found and exposed by researchers in the media. 2. Information Security Principles Leverage established standards covering these key information security principles: authentication, authorization, encryption and data integrity. 1. Security by Design Build security into your IIoT systems as early as possible. 3. Use Proven Technologies and Standards Combining secure hardware (such as Trusted Platform Modules - TPMs) with Digital Certificates (such as public key infrastructure – PKI) enables robust identity assumptions. 4. Leverage the Cloud The SaaS model allows for high scale certificate deployments without changing infrastructure hardware and has built in mechanisms for audit-ability, access control and reporting. 5. Don't Go it Alone Whether you are an organization building your own IIoT products /solutions or a technology vendor, finding the right security partner to address the risk and needs of your ecosystem is the key to success.  Sources: http://www.iiconsortium.org/, http://www.gartner.com/, https://www.wired.com, http://www.independent.co.uk/, https://www.theguardian.com, http://bgr.com/, http://www.haaretz.com/, http://www.darkreading.com/, http://krebsonsecurity.com/, http://www.csoonline.com/, http://www.theregister.co.uk/, https://securityledger.com