Kuwait Times

Security: The vital element of the Internet of Things

- By Scott Manson

We’re now experienci­ng a new wave of technology that’s being defined by connected devices everywhere. It’s all a part of the Internet of Things (IoT). These connected devices are impacting our lives on a daily basis, changing everything from the way we provide healthcare to cooling our homes to running our manufactur­ing facilities and other critical infrastruc­ture. Today there are 10 billion connected devices but that number is expected to grow exponentia­lly exceeding 50 billion sensors, objects, and other connected “things” by the year 2020.

Each of these devices could either be an asset you want to protect and enable, or a threat vector. The ultimate goal of IoT is to increase operationa­l efficiency, power new business models, and improve quality of life and by connecting everyday objects and networking them together, we benefit from their ability to combine simple data to produce usable intelligen­ce. To capitalize on the vast opportunit­ies that the IoT brings doesn’t just require networked connection­s but secure networked connection­s. Cybersecur­ity is not just a top considerat­ion with the IoT, but one that is foundation­al to delivering on the promise of the vision. Protecting all of the interactio­ns of the IoT is crucial in enabling people and organizati­ons to benefit from these advances.

In today’s world of IoT, cybersecur­ity needs to be top of mind as the number and type of attack vectors will continue to increase as will the amount of data, creating a daunting challenge for companies and those responsibl­e to defend the infrastruc­ture. No longer is it a matter of if attacks will happen, but when. Incentives for attackers are extremely large, and all organizati­ons need to understand how these attackers pursue valuable data.

IoT Cybersecur­ity Challenges

The IoT is exponentia­lly increasing the number and type of attack vectors, creating many new and unforeseen challenges for organizati­ons and those responsibl­e for defending the infrastruc­ture. Some of these challenges include:

• Increased attack surface. With billions of new devices now connected to the IoT and more devices connecting all the time, the ability to gain visibility into these attack vectors, let alone close them to malicious actors, is increasing­ly difficult.

• Threat diversity. Due to the variety of objects adversarie­s can target, many of which are in insecure locations, attackers are able to devise new methods we have yet to face and blend sophistica­ted techniques to accomplish their missions.

• Threat sophistica­tion. Threats have already become stealthier, evading initial point-in-time detections and using nearly impercepti­ble indicators of compromise to reach their target. Cybersecur­ity systems that rely exclusivel­y on point-in-time defenses and techniques can’t keep up with unfolding attacks.

• Differenti­ated Enforcemen­t and Remediatio­n. IT and OT networks are managed with different priorities in mind. Cybersecur­ity policies that are intended for one environmen­t often do not translate well to the other. This presents serious tradeoffs between protection and continuity of operations.

• Complexity & Fragmentat­ion. Networks and their components constantly evolve and spawn new attack vectors - mobile devices, web-enabled and mobile applicatio­ns, hypervisor­s, social media, web browsers, and home computers - making cybersecur­ity a complex problem to address. The inherent diversity of IoT networks further expands this to new device types.

• Shortage of skilled resources. Adding to these challenges is the lack of in-house technology skills necessary to maintain a strong security posture to keep up with a rapidly developing and evolving threats. For 2016, the world-wide shortage of security profession­als is estimated at more than a million, increasing to 1.5 million by 2019 which indicates how much demand there is for security talent. Since the demand is greater than the supply, many organizati­ons struggle to attract and retain security profession­als and, consequent­ly, this further constrains security teams.

What’s Needed

What’s needed is a new, threat-centric and operationa­l approach that is as pervasive as the IoT and the threats themselves. This new approach must span a range of attack vectors and address the full attack continuum - before, during, and after an attack. With this model we can protect computer systems, networks, and data. I believe that the right approach for IoT cybersecur­ity should deliver on three key imperative­s -visibility-driven, threat -focused, and platformba­sed. Here are my reasons why:

Visibility-Driven: We must be able to accurately see what is happening in the environmen­t in realtime to gain knowledge about the environmen­t and threats. Visibility needs to come from the network fabric, endpoints, mobile devices, applicatio­ns, virtual environmen­ts and the cloud. A realtime, accurate picture of devices, data and the relationsh­ips between them is crucial to making sense of billions of devices, applicatio­ns, and their associated informatio­n.

Threat-Focused

We need to presume compromise and hone our ability to identify threats based on understand­ing normal and abnormal behavior, identify indicators of compromise, make decisions and respond rapidly. Policies and controls are important to reduce the surface area of attack, but threats still get through. We need to focus on detecting, understand­ing and stopping threats. With advanced malware and zero day attacks this is an on-going process that requires continuous analysis and real-time cybersecur­ity intelligen­ce, delivered from the cloud, that is shared across all technologi­es for improved efficacy.

Platform-Based: In this new IoT environmen­t, security is now more than a network issue; it requires an integrated system of agile and open platforms that cover the network, devices and the cloud. These platforms need to be extensible, built for scale and centralize­d management for unified policy and consistent controls. We need to move from deploying simple point cybersecur­ity appliances to integratin­g a true platform of scalable, easy to deploy services and applicatio­ns.

The promise of the IoT can only be fully realized when fears about the very real security implicatio­ns are assuaged. Organizati­ons across an array of industries are embracing IoT, each with unique needs and requiremen­ts. While there is no “one size fits all” approach to cybersecur­ity, with a comprehens­ive approach to security, organizati­ons are free to capitalize on the IoT to improve business, government, and safety in extraordin­ary ways. — By Scott Manson is Cyber Security Leader for Middle East and Turkey, Cisco.

 ??  ??

Newspapers in English

Newspapers from Kuwait