IIoT and Embedded Devices Need Special Attention to Security

IIoT and Embedded Devices Need Special Attention to Security

The industrial internet of things (IIoT) and its associated embedded devices have been ravished in recent years by cyber-attacks.

The industrial internet of things refers to?the extension and use of the internet of things (IoT) in industrial sectors and applications.

Clearly, embedded device manufacturers need to rethink how they develop software that is secure, safe and free from defects and vulnerabilities.

One proven practice for improving software security assurance for IIoT devices is threat analysis and assessment.

Since embedded devices are an integral part of IoT infrastructures, taking a proactive approach to manage system-level security is required. This starts with performing a comprehensive threat assessment and prioritizing risk.

Experts in this field contend that beyond network connections, which link devices to internal and external resources, designers should also assess the user interfaces, ports and connectors as possible threat vectors.

When ranking the potential impacts of a system breach, organizations should make sure to consider whether unauthorized access would cause physical damage, cause a system failure, compromise critical data, etc.

Another important practice is security first design. This usually includes implement security standards using application security testing (AST) tools to detect and remediate code vulnerabilities.

Cybersecurity professionals report that this is especially important when third-party and open-source components are used. Understanding the security risk in these dependencies is considered just as critical as any new codes being developed.

Want to learn more? Tonex offers IIoT & Embedded Systems Security , a 2-day course that provides participants with the knowledge and skills to secure connected industrial devices and embedded systems in the context of the IIoT.

Participants will learn about the unique challenges and security considerations specific to IIoT and embedded systems, including communication protocols, hardware vulnerabilities, and system-level risks.?

For more information, questions, comments,?contact us .

?

要查看或添加评论,请登录

Charles Alexi的更多文章

社区洞察

其他会员也浏览了