Experts predict that in the next few years, dozens or even billions of devices will be connected to the Internet in a similar way, and the wave of Internet of Things is on the rise. The arrival of the Internet of Things is whether it is a lifestyle change or the end of cyber security. The benevolent sees benevolence, and the wise sees wisdom.
Below we will specifically explore the six ways in which the Internet of Things threatens enterprise security.
Internet of Things will bring billions of unsafe terminals
Research institutions have great differences on the number of IoT devices connected to the Internet by 2020. Gartner predicts that there will be 26 billion IoT devices, and IDC predicts that there will be 222 billion IoT devices. No matter which number is closer, it is certain that with the increase of a large number of devices, a variety of ways to invade the enterprise network will be formed. Such as intelligent heating and lighting systems, smart meters, equipment maintenance and monitoring sensors, industrial robots, asset tracking systems, smart retail shelves, factory control systems, and smart phones, glasses, etc., are likely to become invasive devices.
"In essence, the Internet of Things is equivalent to the addition of billions of non-secure terminals," said Eric Chiu, president of cloud security vendor Hytrust. "These devices with IP connectivity will trigger new types of attacks that will break the device. And gain access to the corporate network."
Although there is a view that the enterprise itself can ensure the security of the enterprise network by strictly controlling the access of consumer-grade equipment, this is not realistic. “Enterprises must recognize the reality, and the weak links have existed objectively. We should assume that the attackers have successfully entered the internal network of the enterprise and use this as a premise to deploy a defense strategy.†Chiu added.
Internet of Things will interface with corporate networks
“Just as there is no truly independent industrial control network, there is no corporate network in the IoT world that can be completely isolated,†said Amit Yoran, general manager of security company RSA.
The implication is that no matter what kind of network segmentation and isolation technology is adopted, the Internet of Things will eventually dock with the enterprise network through the Internet. These interfaces will become the main targets of malicious attacks.
Now enterprise users have been able to directly access cloud resources through BYOD without having to use the corporate network as a transit path. But Yoran believes that the emergence of the Internet of Things will exacerbate this situation, because IT departments will face extreme chaos when controlling various devices to access business data stored in the internal or cloud.
Therefore, once all kinds of IoT terminals are broken, the enterprise network will also face huge risks.
Internet of Things will build the world of embedded devices
In the Internet of Things field, most "things" will appear in the form of appliances or devices embedded with applications. John Pescatore, director of research at SANS, a cloud security company, said, "Therefore, the software model for tiering in the Internet of Things and traditional IT architectures will be completely different, and IT security organizations are not familiar with this model."
In the future, the Internet of Things will use multiple different types of communication protocols simultaneously. In addition to TCP/IP, 802.11, and HTML 5, there are many new protocols including Zigbee, WebHooks, and IoT6. And unlike the conventional IT life cycle of the past two to three years, the popularity of the Internet of Things will extend the IT lifecycle to a wide range of short to several months and up to 20 years.
"Embedded systems used by IoT terminals are completely different from traditional layered software models in PCs and servers in terms of management and security protection, which will present significant challenges to existing IT management and security review mechanisms. Said Pescatore.
Internet of Things will endanger physical equipment and life safety
"In addition to threatening online data, the popularity of the Internet of Things will also pose risks to physical devices and even human physiology," said Michael Sutton, vice president of security research at Zscaler.
Hackers have confirmed that IP-enabled insulin pumps, blood glucose monitors, and pacemakers are likely to experience security attacks that directly cause physical damage to device users.
With the rise of the Internet of Things, such attacks may also point to cars, smart heating, ventilation and air conditioning systems, network-enabled copiers, printers, scanners, and even almost all devices that use IP addresses.
In general, hackers don't even need to exploit the software and hardware vulnerabilities in the device, which means that enterprises will face an extremely dangerous situation, because each of these IP address configuration schemes has the risk of error.
Internet of Things will build a new supply chain
Devices that access a large number of corporate networks will soon become the target of IT security, but these departments are not familiar with it.
“Like BYOD, traditional companies need to develop and develop appropriate strategies and management systems to manage a large-scale device community,†said Jason Hart, CEO of IdenTIv, a device verification and identity management technology provider.
“In addition to the physical equipment that comes with employees and the new equipment in the virtual office environment, traditional non-connected devices (from coffee machines to new ergonomic chairs) will turn to intelligence and become the maintenance target of IT departments.†Hart Added.
"To be successful in the IoT space, vendors must be able to help enterprise users manage the complex interdependencies between new IP devices and enterprise networks," said Chris Yapp, a member of the British Computer Society and independent security consultant.
It can be predicted that companies with sophisticated technology integration and management experience in such trends are most likely to succeed in the IoT tide. “And existing security service providers should focus resources, work together, and improve their solutions. Only in this way can they have the opportunity to compete with system integrators,†Yapp said.
Internet of Things will exacerbate cyber attacks
Many companies have adapted to the challenges posed by smartphones, tablets, and other devices with wireless connectivity, but the security threats of the Internet of Things are larger and broader. The Internet of Things covers every device that accesses the Internet. This includes a variety of home automation products, such as intelligent temperature control devices, security cameras, refrigerators, etc. In addition, industrial control machinery and intelligent retail shelves will gradually enter our lives.
So many devices are bound to bring serious challenges. "The core of the challenge is the scale, occultity, and persistence of the attack," said Kevin Epstein, senior vice president of security at Proofpoint, a security-as-a-service provider. "In the current situation, attackers can penetrate the corporate defense system relatively easily. Imagine how steep the situation would be if the number of attacks increased by a factor of 10.
A Main Distribution Frame (MDF) is a signal distribution frame or cable rack used in telephony to interconnect and manage telecommunication wiring between itself and any number of intermediate distribution frames and cabling from the telephony network it supports.
What's more,we can also offer you the MDF Termination Block with good quality and low price.
Distribution Rack, Power Distribution Rack, Distribution Cabinet
NINGBO YULIANG TELECOM MUNICATIONS EQUIPMENT CO.,LTD. , https://www.yltelecom.com