Why does the Internet of Things integration analysis project make equipment safety a top priority?

Today, the security risks associated with organizations and IoT devices cannot be ignored. If your organization's big data plan includes IoT devices, follow these four steps to reduce security vulnerabilities.

IoT integration analysis project Why is equipment safety a top priority?

On October 21, 2016, Dyn suffered a series of distributed denial of service (DDoS) attacks caused by the malware botnet Mirai. Hundreds of major websites of some well-known domain name system providers have been attacked, including Netflix, Twitter and PayPal. Malware is infected and spread through the system with the help of hacked network-connected cameras and digital recorders. And security experts say they are very concerned about new threats to home electronics and the Internet of Things (IoT).

Big data leaders should pay special attention to recent attacks, which is why the integration of the Internet of Things into analytics projects requires security to be a top priority.

Research firm Gartner expects to deploy 26 billion IoT devices by 2020. These IoT devices and sensors will be connected to freight containers, facility alarms, data centers, HVAC environmental monitoring equipment, hospital operating rooms, etc., and will expect businesses to collect information from these devices.

It has been deployed in on-site IoT applications, including smart meters used in electrical and gas utilities. It is estimated that by 2020, more than 900 million smart meters will be installed worldwide. Asia is transforming into a smart grid, followed by Europe and North America. The cost of installing these smart meters exceeds $100 billion, but the estimated financial benefits will reach $160 billion. So the return on investment (ROI) exists, but what else do companies need to worry about?

With smart meters, these millions of devices with physical exposure risks can be implanted with software attacks from multiple entry points, and the damage will be greater, and the exposure risk of the Internet of Things is also applicable to manufacturing. Logistics and other companies operate IoT devices on the edge of the enterprise, even to companies with high levels of business, where malware can be disrupted through HVAC or environmental monitoring devices monitored by the Internet of Things.

In December 2015, 30 of the 135 substations in Ukraine were attacked by cybersecurity and the power was interrupted for nearly six hours. Initially, hackers used malware to instruct the industrial control computer of the power facility to disconnect the substation; then, they implanted a wiper virus that made the computer inoperable.

In September 2016, a large number of IoT devices and about 150,000 CCTV cameras became part of the botnet, attacking the infrastructure of French web hosting companies and affecting IoT devices. During this time, 1.1T data per second attacked the company's network system.

Cohen Monroe, president of PenTestPartners, said: "We have previously suspected that someone might use IoT devices maliciously, but this case seems to be the first large-scale DDoS attack directly caused by a large number of IoT devices."

In September 2016, "Internet Marketing" magazine quoted Monroe as saying: "We find vulnerable IoT devices every week, and a large number of devices are attacked every week. Recently, we privately disclosed to suppliers. A remote code execution vulnerability in an IoT device that exists in more than 300,000 devices. This remote control can be used to trigger a large number of requests, resulting in a DoS attack. This is just a device type... So, we Attacks on DDoS derived from the Internet of Things are not considered to be under control."

What kind of IoT security measures can be taken?

One of the problems faced by companies that use or use IoT technology in their big data initiatives is that there is currently no consensus on how to implement security in the IoT on their devices. This lack of consensus is a problem that the Standards Committee solves, not a corporate IT department. So what if the company is using or planning to use the Internet of Things? The following steps should be followed.

First, identify all hackers and violations disclosed by the Internet of Things, and write and plan to monitor them on a regular basis. This monitoring should be done at two levels: periodic physical inspection of the equipment and continuous software-based monitoring and recording of these equipment for network-based systems. And if an abnormal activity from the device is detected at any time, there should be a way to shut down the device immediately.

Second, if the enterprise plan shuts down the device as soon as it detects anomalous activity, it should also have a disaster recovery and failover process to allow its own plant and environmental monitoring system or any other IoT application to continue to operate.

Third, companies should meet with their liability insurance providers. When implementing IoT technology, it should be expected to increase the liability insurance premium in the company's budget. Corporate liability insurance companies do not want to see costs rise due to data breaches, compromises and damage. Its insurance company may have a list of best practices for customers that can be recommended to help companies achieve IoT planning and provide coping strategies.

Last but not least, discuss security issues with potential IoT vendors in the enterprise. What security technologies and best practices are used in their products? What kind of security guarantees and protection are they willing to offer? What level of device upgrades and support do they offer in the event of a security breach?

In most companies' big data initiatives, the Internet of Things is still an emerging technology. After companies evaluate the Internet of Things as best suited to their operations and strategies, they should also have comprehensive measures for security, failover, and mitigation. Because everyone knows that hackers will be everywhere.

HDMI Switch

HDMI, English full name is High Definition Multimedia Interface, Chinese name is the abbreviation of High Definition Multimedia Interface. In April 2002, Hitachi, Panasonic, Philips, SONY, Thomson, Toshiba and Silicon Image joined forces to form the HDMI organization. In China, Zhaolong and Akihabara are HDMI standard advocates and technology leaders. HDMI can transmit uncompressed HD video and multi-channel audio data in high quality, with the highest data transmission speed of 5Gbps. At the same time, there is no need to carry out digital/analog or analog/digital conversion before signal transmission, which can ensure the highest quality of audio and video signal transmission.

Hdmi Splitter And Switch,Hdmi Cable Splitter,Hdmi Splitter Switch,Hdmi Splitter Audio

CHANGZHOU LESEN ELECTRONICS TECHNOLOGY CO.,LTD , https://www.china-lesencable.com