Index

Access controls, 73

Access network, 7

Activity logs, 98

Aircraft, 33

Application Programming Interfaces (APIs), 46

Appropriate cybersecurity program, 7273

Ashton, Kevin, 39

Attacks targeting IoT systems, 87101. See also bots; threat intelligence

attack vectors, 92

malicious control of IoT systems, 96

privacy breaches, 96

sabotage, 97

Authentication mechanism, 43

Bacnet, 11

Blackenergy, 21

Bots, devices use as, 9496

Brickerbot, 2425

Bring your own device (BYOD), 63

Brute force attack, 18, 43

Bugs, 44

Building management system (BMS), 12, 56

Business continuity planning, 78

Business intelligence (BI) tools, 8

CAN-based protocols, 11

Cheney, Dick, 27

Code injections, vulnerability to, 45

Common vulnerabilities and exposures (CVE), 109

Common vulnerability scoring system (CVSS), 109

Communication networks, 78

access network, 7

computer systems, 8

proximity network, 7

service network, 78

Communication protocol, 2

Compromised closed circuit television (CCTV) systems, 20

Computer systems, 8

Confidentiality, integrity, and availability (CIA) triad, 50

Connected devices, 40

Controller Area Network (CAN), 7, 30

Corporate network, 6162

Credentials, 42

Customer relationship management (CRM), 8

Cyberattacks, 89, 107, See also attacks targeting IoT systems

Cybersecurity, 5, 14

Cybersecurity measures in IoT, challenges, 4754

awareness, lack of, 50

requires different approaches than traditional security, 53

security left in no-man’s-land, 5253

security, 49

standards and regulations, lack of, 51

technical constraints, 47

Cyberwarfare, 90

Demilitarized zone (DMZ), 73

Denial-of-service (DoS) attack, 9495

Design flaws, 44

Dictionary attack, 18

Digital Direct Controllers (DDC), 11

Digital Economy Act (UK), 52

Distributed control systems (DCS), 65

Distributed denial-of-service (DDoS) attack, 18, 87

Domain Name System (DNS), 18

Drone jacking, 36

Electronic Control Units (ECU), 12, 29

Embedded system, 12

Encryption, 100

Enterprise risk management (ERM), 8

European Agency for Network and Information Security (ENISA), 2, 52

Federal Trade Commission Act (USA), 52

Finland, heating services in, 22

Firmware, 41, 66

Fish tank in the casino, 20

GE SCADA Systems, 3334

General Data Protection Regulation (GDPR), 52, 82, 88

Governance, risk, and compliance (GRC) tools, 109

Hacking experiments, 2738

Health care intelligent devices, 3233

Honeypot, 29

Human–Machine Interfaces (HMI), 2, 813

Industrial automation and control systems security (ISA 2015), 110

Industrial control systems (ICS), 6579

Industrial environment, IoT in, 6579

appropriate cybersecurity program, 7273

business continuity planning, 78

legacy systems, assess risks introduced by, 76

maintenance, 77

network architecture, 7374

personnel security training, 7778

physical access, 76

process-aware approach, 72

resilience, 78

safety regulations, alignment with, 74

secure configuration, 77

security improvement, areas to look into, 7278

supply chain management, 7576

threat intelligence, 7475

updates, 77

vulnerability, 7475

Industrial Internet of Things (IIoT), 14, 17, 66

Information technologies (IT), 66

Insecure data management, 4243

Insecure interfaces, 46

Insecure network services, 46

Intelligence agencies, 90

Internet of Things (IoT), 116

building blocks of, 513

actuation, 6

communication networks, 78

computation, 6

sensing, 6

things, 67

components of, interaction between, 10

description, 116

as fourth industrial revolution, 3

organization risks, reducing, 1315

real world, interactions with, 4

Internet protocol (IP) phones, 56

Intrusion detection systems (IDS), 62, 73

Intrusion prevention systems (IPS), 62

Jamming, 58

Legacy systems, assess risks introduced by, 76

Local area network (LAN), 21

Lonworks, 11

LoRA, 11, 100

Malicious control of IoT systems, 96

Malware defense, 98

“Man-in-the-middle” attack, 58

Manufacturer commitment, 61

Miller, Charlie, 29

Mirai Botnet, 1819

MITRE Corporation, 109

Modbus, 11

Munro, Ken, 35

National Institute of Standards and Technology of the USA (NIST), 52, 73

Nation-states, 90

Network architecture, 7374

Network monitoring, 99

No-man’s-land, 5253

Office environment, IoT in, 5564

areas to look into, 5964

bring your own device (BYOD), 6364

corporate network, 6162

disposal of IoT devices, 63

maintenance, 63

operation of IoT systems, 6263

physical access, 62

security updates, 63

setup and configuration, 62

purchase decisions, 6061

brand, 60

manufacturer committment, 61

model vulnerabilities, 60

vulnerability management process, 61

remote work policies, 6364

supply chain management, 6061

Oil and Gas subsector (ONG-C2M2), 110

Open ports, 45

Open Web Application Security Project (OWASP), 42

Operational technologies (OT), 66

PDCA (Plan, Do, Check, Act) cycle, 104

Penetration testing, 36

Permanent Denial of Service (PDoS), 24

Personnel security training, 7778

Physical security, 45

Printers, 5564

Privacy breaches using IoT, 96

Privacy concerns, 46

Process-aware approach, 72

Profibus, 11

Programmable Logic Controllers (PLC), 11, 23

Proximity network, 7

Ransomware, thermostats vulnerable to, 3536

Real attack cases, 1726

real-life cyberattacks, 1725

Real-life cyberattacks, 1725

Brickerbot, 2425

brute force attack, 18

CCTV Botnet, 20

Dallas Emergency Sirens, 2223

dictionary attack, 18

drawing Pads Architecture Company, 2021

Finland, heating services in, 22

fish tank in the casino, 20

Iran’s Nuclear Plant, 2324

Lodz, Poland City’s Tram System, 22

Maroochy Water Services, Australia, 21

Mirai Botnet, 1819

New York, Dam, 23

Sabotage of Siberian Pipeline, 1982, 23

Ukraine’s power grid, 21

university attack, 1920

Real world, 4, 6

Remote work policies, 6364

Repository of Industrial Security Incidents (RISI), 26

Resilience, 78

Return of security investment (ROSI), 106

Risk management process, 104111

PDCA (Plan, Do, Check, Act) cycle, 104

Routers, 5564

Sabotage, 97

Safety regulations, alignment with, 74

Sandworm team, 33

Security configuration, 46

Security controls, 97101

activity logs, 98

encryption, 100

limitations, 97101

malware defense, 98

network monitoring, 99

secure authentication, 97

software and firmware updates and patches, 100

Service network, 78

Smart meters, 82

Smart things, disadvantages, 1726

Smart TVs, 5564

Software as a Service (SaaS), 13

STRIDE model, 109

Stuxnet, 2324

Supervisory Control and Data Acquisition (SCADA) system, 21, 6570

Supply chain management (SCM), 60–61, 7576

System of systems, 12

Threat intelligence, 74–75, 8893

attack vectors, 92

cyberwarfare, 90

intelligence agencies, 90

nation-states, 90

typical attacks, 9397

3-D printing, 67

Tierney, Andrew, 35

Uninvited guests, 5564

University attack, 1920

US Cybersecurity Capability Maturity Model for the Electricity subsector (ES-C2M2), 110

Utilities and service monitoring, IoT in, 8186

business continuity planning and resilience, 85

insurance, 85

ownership of systems and of data, 85

security improvement, areas to link into, 8485

Valasek, Chris, 29

Vault 7, 31

Virtual Private Network (VPN), 64

Vulnerability assessments, 2738

hacking experiments, 2738

potential attacks, 2837

Aircraft, 33

baby monitors, 3132

commercial drones, 3637

connected kettles in London, 3435

GE SCADA Systems, 3334

health care intelligent devices, 3233

IP cameras, 35

Jeep Cherokee, 2930

Samsung Smart TV, 3031

Sandworm team, 33

Siemens healthineers products, 34

Smart meters, 35

Smart Toys, 34

Tesla Model S, 30

thermostats vulnerable to ransomware, 3536

Toaster Experiment and IoT Honeypots, 2829

Vulnerability of IoT, 39–54, 7475. See also cybersecurity measures

application over privilege, 47

brand, 60

challenges, 3954

connected devices, 40

critical components not/badly implemented, isolation, 45

design flaws and bugs, 44

insecure data management, 4243

insecure interfaces, 46

insecure network services, 46

management, 61

model vulnerabilities, 60

open ports, 45

poor physical security, 45

poor security configuration, 46

privacy concerns, 46

requirements, 3954

to code injections, 45

typical, 48

users’ awareness, 4344

weak authentication mechanism, 43

weak credentials, 42

weak security policies, 44

Wannacry Ransomware attack, 34

Wi-Fi Protected Access (WPA), 33

Zigbee, 11, 100

Zozosuit, 82

Z-Wave, 11

..................Content has been hidden....................

You can't read the all page of ebook, please click here login for view all page.
Reset
3.134.118.95