Iot, hacking attacks and possible scenarios. Here’s how to protect yourself
By Laurence Pitt - Tech Economy journalist – 04/05/2017
Laurence Pitt, journalist, addressed the issue in an article published on Tech Economy indicating the risks and countermeasures to be taken by companies to defend themselves. The editors of Autopromotec Blog decided to post it for the benefit of its readers
If we look at the progress made by technology over the last 25 years, it seems that malware or data theft is an unavoidable constant, one that follows each technological milestone. Here are some examples:
Let’s consider for example the car rental market. Often, the main rental companies prefer specific manufacturers, which facilitates customer loyalty. The basic supply chain, from placing an order to delivering a vehicle works more or less like this: order, Just-in-Time (JIT) production, delivery and rental. Imagine now that a malware hits the Just-in-time production process. A malware that remains dormant until it recognizes a pre-assigned identification number of a group of rental vehicles and then activates on a specific date. Let's imagine a scenario:
As far as we know, scenarios such as these are yet to occurred, but this could happen sooner than we think. The good news though is that technology could prevent these situations from taking place and protect the production process through the Internet notifying companies well in advance. The instruments are already available and can be used to detect and prevent threats today, tomorrow and beyond.
If on the one hand we can hardly afford to remain indifferent to security risks, on the other, like Juniper, we think that at this very moment, technology is keeping well ahead of the development of malware. With adequate levels of security, an attack of this nature is unlikely to succeed.
- the spread of desktop PCs and servers was soon followed by a spread of viruses. Cascade Virus, for example, was one of the first to appear.
- Then came Internet, a real breakthrough for those of us who already back in 1994 had an access available. But even more so for hackers who were now in the position to find and ransack online IDs and company data.
- Nowadays we have the Internet of Things, cloud computing and mobility, followed by botnets, DDoS and social engineering.
Let’s consider for example the car rental market. Often, the main rental companies prefer specific manufacturers, which facilitates customer loyalty. The basic supply chain, from placing an order to delivering a vehicle works more or less like this: order, Just-in-Time (JIT) production, delivery and rental. Imagine now that a malware hits the Just-in-time production process. A malware that remains dormant until it recognizes a pre-assigned identification number of a group of rental vehicles and then activates on a specific date. Let's imagine a scenario:
- Date: December 24, Christmas eve;
- Situation: tens of thousands of cars booked by people returning home or visiting parents and relatives during the holidays;
- Midnight, the malware becomes active:
- 40.000 new cars display the writing ‘PWNed by RANSOM’ on the touch-screen,
- The car just won’t start,
- Older “non-smart” vehicle work regularly,
- The operations centre receives a ransom request: “pay to unblock the vehicles”.
- After payment a code is generated and sent via an sms to all the users.
- At this point, the client can digit the code on the touch-screen, the car is unblocked and the driver can set off to his destination.
As far as we know, scenarios such as these are yet to occurred, but this could happen sooner than we think. The good news though is that technology could prevent these situations from taking place and protect the production process through the Internet notifying companies well in advance. The instruments are already available and can be used to detect and prevent threats today, tomorrow and beyond.
- Protecting production processes. The manufacturing process consists of multiple physical and virtual interfacing and operates as a different set of services. Several service providers may use the same cloud but should be isolated and managed centrally. For example, this can be done using some Juniper Networks products combining MX routers with SRX and vSRX firewalls, managed with Juniper Contrail Service Orchestrator to automatize up-to-date and consistent policies across the network with a comprehensive suite of security measures to keep ill-disposed people at bay.
- Threat Prevention: The Software Defined Secure Network (SDSN) platform manages policies and detects possible threats that might undermine the system. Moreover, every element of the net can be used to apply policies and include external security feeds, combining them to the characteristic scalability of the cloud. SDSN is centrally managed and has a policy engine that adapts dynamically to risk conditions allowing the automatic application of policies.
If on the one hand we can hardly afford to remain indifferent to security risks, on the other, like Juniper, we think that at this very moment, technology is keeping well ahead of the development of malware. With adequate levels of security, an attack of this nature is unlikely to succeed.
On the same topic
#Connected cars, anti-hacking systems still insufficient#Connected cars: Europe to lead the world in sales and turnover by 2022#Connected cars and the smart mobility revolution: variables and opportunities