Podcast
Questions and Answers
What is the primary role of a controller in an IoT system?
What is the primary role of a controller in an IoT system?
Which of the following best describes a fundamental challenge in IoT security?
Which of the following best describes a fundamental challenge in IoT security?
What action does an actuator perform in an IoT system?
What action does an actuator perform in an IoT system?
What consequence arises from IoT devices lacking segmented networks?
What consequence arises from IoT devices lacking segmented networks?
Signup and view all the answers
Why are IoT devices increasingly targeted by threat actors?
Why are IoT devices increasingly targeted by threat actors?
Signup and view all the answers
What is the first step in the anatomy of an IoT attack?
What is the first step in the anatomy of an IoT attack?
Signup and view all the answers
Which device type is primarily targeted by the Mirai botnet?
Which device type is primarily targeted by the Mirai botnet?
Signup and view all the answers
What is a major issue with IoT devices that makes them susceptible to attacks like those from the Mirai botnet?
What is a major issue with IoT devices that makes them susceptible to attacks like those from the Mirai botnet?
Signup and view all the answers
How are the Information Technology (IT) and Operational Technology (OT) domains characterized in organizations?
How are the Information Technology (IT) and Operational Technology (OT) domains characterized in organizations?
Signup and view all the answers
What does the action 'sudo kill -9 20160' typically indicate in the context of IoT security?
What does the action 'sudo kill -9 20160' typically indicate in the context of IoT security?
Signup and view all the answers
What major growth in IoT devices is projected for 2030?
What major growth in IoT devices is projected for 2030?
Signup and view all the answers
What is one benefit for businesses using IoT devices?
What is one benefit for businesses using IoT devices?
Signup and view all the answers
Identify one type of IoT device found in smart homes.
Identify one type of IoT device found in smart homes.
Signup and view all the answers
What role do sensors and actuators play in IoT systems?
What role do sensors and actuators play in IoT systems?
Signup and view all the answers
Why is IoT security a significant challenge?
Why is IoT security a significant challenge?
Signup and view all the answers
Study Notes
IoT Security Challenges
- IoT devices are increasingly being compromised due to lack of device security practices, including strong passwords, up-to-date operating systems, and segmented networks.
- IoT devices are targets for a wide range of attacks.
Anatomy of an IoT Attack
- The steps of an IoT attack include:
- Scanning for vulnerabilities
- Gathering information
- Gaining access
- Delivering the attack
- Maintaining access
- Deleting evidence
Research IoT Attack
- 2014: Germany
- 2008: Poland
- 2018: Global
- 2015: Ukraine
- 2017: Global
- 2000: Australia
- 2016: U.S.
- 2010: Iran
DDoS attack with Botnet – Mirai Botnet
- Mirai targets IoT devices using default login information.
- CCTV cameras are a primary target for Mirai.
- Mirai employs a brute force dictionary attack with a list of common usernames and passwords including:
- root/default
- root/1111
- root/54321
IT and OT in the Manufacturing Sector
- There are two distinct networking domains in organizations:
- Information Technology (IT)
- Includes devices in the data center, cloud, BYOD, and thousands of sensors and actuators in the field.
- Operational Technology (OT)
- Primarily focuses on industrial automation and control systems.
- Information Technology (IT)
The Growth of IoT Devices
- The connection of millions of smart devices and sensors to the internet is known as the Internet of Things (IoT).
- These devices collect and share data for use and evaluation by businesses, cities, governments, hospitals, and individuals.
- The growth of IoT is driven by cheap processors and wireless networks.
- IoT devices are becoming more prevalent, with an estimated 38.6 billion devices connected to the internet by 2025 and 50 billion by 2030.
- 1/3 of these devices will be computers, smartphones, tablets, and smart TVs.
- 2/3 will be sensors, actuators, and newly invented intelligent devices.
Benefits of Connecting Devices
- The IoT offers numerous benefits to various organizations:
-
Businesses:
- Access to more information for streamlined production, targeted marketing and advertising, and reduced losses.
-
Retailers:
- Enhanced target marketing and product management.
-
Governments:
- Monitoring environmental issues, targeted funding for social issues, and informed control of power output.
-
Cities:
- Control traffic patterns, monitor and control garbage and recycling, and promote sustainability efforts.
-
Businesses:
How IoT Devices are Connected to the Network
-
Sensors:
- Connected to networks via wired Ethernet connections or wireless connections (Bluetooth LE, Zigbee, or LoRa) to a controller.
-
Controllers:
- Collect data from sensors and provide network or internet connectivity.
-
Actuators:
- Take electrical input and transform it into physical action (e.g., turning on an air conditioner).
Sample IoT Topology
-
Scenario:
- A sensor detects excess heat in a room.
- The sensor sends the temperature reading to the controller.
- The controller sends the data to an actuator.
- The actuator turns on the air conditioner to cool the room.
The Promise of IoT
- The widespread adoption of IoT devices is expanding the opportunities for threat actors to compromise networks.
- The lack of security practices in IoT devices, such as strong passwords, up-to-date operating systems, and segmented networks, makes them vulnerable to attacks.
What is the Internet of Things (IoT)?
- Billions of smart devices and sensors are connected to the internet.
- Devices collect and share data for businesses, governments, hospitals, and individuals, to use and evaluate.
- By 2025, 38.6 billion IoT devices will be connected to the internet.
- By 2030, 50 billion IoT devices will be connected to the internet.
- 190 million new connected devices are added to the internet every month.
- 1/3 of the new devices are computers, smartphones, tablets, and smart TVs.
- 2/3 of the new devices are sensors, actuators, and intelligent devices like smart doorbells, traffic lights, and pacemakers.
Benefits of Connecting Devices to the Internet
- Businesses: More information to streamline production, target marketing, and advertising.
- Retailers: More targeted marketing, reduced losses, and manage in-store product types.
- Manufacturing: Improves efficiency and productivity of manufacturing processes and operations.
- Governments: Monitor environmental issues, target funding for social issues, and control power output.
- Cities: Control traffic patterns, monitor garbage and recycling.
- Individuals: Improved fitness and health benefits, better home and family security, and lower costs.
IoT Security Challenges
- Unsecured Connected Things: IoT Devices are vulnerable to attacks, such as malware, due to lack of strong passwords, up-to-date operating systems, and segmented networks.
- Anatomy of an IoT Attack: The six steps in an IoT attack are: Scan for vulnerability, gather information, gain access, deliver attack, maintain access, and delete evidence.
- Mirai Botnet: Mirai is a malware that targets IoT devices with default login information. CCTV cameras are often targets. Mirai uses brute force dictionary attack to run through a list of default username/passwords such as "root/default", "root/1111", and "root/54321", to compromise devices.
IoT Security Model
- IT (Information Technology) includes devices in the data center, in the cloud, bring your own device (BYOD), and sensors and actuators in the field.
- OT (Operational Technology) includes industrial control systems, supervisory control and data acquisition systems, and devices that connect to these systems.
- CT (Consumer Technology) includes connected devices in the home, wearable technology, smart cars, and more.
Smart Home Use Case
- Connected devices in the home like lights, thermostats, security systems, and appliances.
- These devices can be remotely monitored and controlled using Bluetooth connections to a phone and cellular data/Wi-Fi connections to the internet and cloud.
Healthcare Use Case
- As many as 20 medical devices can be found in a single hospital room.
- IoT provides functionalities to connected medical devices for monitoring, therapeutic device control, and data analysis.
- Security vulnerabilities exist in devices such as drug infusion pumps, insulin pumps, Bluetooth-enabled defibrillators, refrigeration units, and pacemakers.
- In 2017, the FDA approved a software update to patch a security flaw in radio frequency-enabled implantable cardiac pacemakers, affecting an estimated 465,000 devices.
- Risks include manipulation, interruption, or disabling of medical devices, potentially resulting in patient injury or death.
Studying That Suits You
Use AI to generate personalized quizzes and flashcards to suit your learning preferences.
Related Documents
Description
Explore the challenges and methodologies involved in IoT security, including the anatomy of an IoT attack and notable cases like the Mirai botnet. This quiz covers the spectrum of threats facing IoT devices and how they are exploited through various attack vectors. Test your knowledge of IoT security practices and historical attacks on devices!