Sunteți pe pagina 1din 1

INTERNET OF EVERYTHING_BY STACEY HIGGINBOTHAM OPINION

state sponsored and intended to send a


political message.
Two more of Corman’s reasons come
from timing and economics. When a firm
buys a traditional IT system, it can count
on the software company’s support for a
set amount of time. Only in the last few
months have some chipmakers and soft-
ware vendors offered 7- and 10-year sup-
port for IoT products. Some still don’t
provide any specified support contracts,
or they limit the term to 2 or 3 years.
In some cases, that’s because the eco-
nomics don’t yet make sense. A con-
nected product that generates a small
profit may require years of updates,
patches, and security evaluations. In
the future, the cost of goods sold may
need to include annual security updates
and patches.
Corman’s fifth reason has to do with
the scary reality that many connected
devices are built with software, hard-
ware, and firmware that are created
by different companies and pieced
together at the end. It takes only one
weak link to create a vulnerability, so if

6 WAYS IoT IS VULNERABLE


the company that created the telematics
system for a car doesn’t update its soft-
ware, the entire car becomes vulnera-
ble. The IT world has a similar challenge,
CONNECTING PHYSICAL The first is that the consequences of but through years of working together,
infrastructure to the Inter- failure are more dire. We’ve raised the manu­facturers have agreed on systems
net makes systems vulner- stakes by connecting more physical sys- to keep everything patched.
able to new security threats. tems and facilities to wireless networks. Finally, many connected devices live
What keeps executives awake at night When cars or infusion pumps are hacked, in environments unlike any IT system.
varies by industry, but cybersecurity people can die. In a home, there’s no IT manager to push
problems are worsening everywhere. Which brings us to Corman’s second patches to a connected fridge. And in an
Securit y of ficers in manufactur- reason that IoT security is a special chal- industrial setting, patching one machine
ing worry about employees inserting lenge: The adversaries are unlike any might cause it to stop working with other
infected USB drives into machines, while we’ve seen before. No longer are they equipment on the line. Here, the risk of
hospital administrators fear that mal- lone hackers trying to make money or a hack may seem low compared with
ware will wipe out an unpatched MRI cause mischief. Today’s adversaries the risk of stopping a process that pro-
machine, or that a hacker will direct are nation states hacking systems in an duces hundreds of thousands of dollars
an infusion pump to administer a lethal all‑out cyberwar. of revenue a day.
dose of medicine. Stuxnet, the virus that brought down In the IT world, there’s an entire indus-
Josh ­Corman, chief security officer at Iranian centrifuges in 2010, may be the try of life-cycle-management software
PTC, a computer software firm based in earliest example. Then in August 2017, that tracks patches and rolls back buggy
Massachusetts, has codified six reasons a Saudi chemical plant was hit by a software. In the IoT world, we just aren’t
why security for the Internet of Things hack designed to cause an explosion there yet. n
(IoT) is different from—and more difficult and disrupt petrochemical manufac-
↗ POST YOUR COMMENTS at https://spectrum.ieee.org/
to tackle than—traditional IT security. turing. Experts believe the attack was iotsecurity0718

ILLUSTRATION BY Mengxin Li SPECTRUM.IEEE.ORG | JUL 2018 |  21

S-ar putea să vă placă și