Industrial Internet of Things and Cyber Security

 

 

 

 

Industrial Internet of Things and Cyber Security

Name

Institution

 

Industrial Internet of Things and Cyber Security

Carter, J. (2015). Securing the industrial internet of things: The risk list. Retrieved from http://www.directindustry.com/emag/issue-7/special-feature-securing-embedded-0724.html

This article focuses on identifying the numerous areas that pose security threats when implementing the industrial internet of things. New technologies are often beneficial though they always have some risks. The author notes that new interfaces between networks, platforms, users, and devices increase security risks. Risk of exploitation grows when devices become accessible, when they are upgraded, and whenever they are connected to IP networks. It is necessary to secure devices such as sensors, transmitters, machines, wearable devices, safety controllers, and radio-frequency identification tags. It is important to ensure that all hardware is secure, however insignificant it may appear. Moreover, companies need to ensure that they have secured all layers of software.

The author has identified some of the areas and the factors that increase security risks in a system and network. He identifies the specific devices that need to be secured. Since the devices are connected to the internet, it is possible for attackers to compromise the system irrespective of their geographical location. Traditional safety and security methods and techniques apply. This includes techniques such as encryption, auditing to recognize unauthorized access, and authentication. Moreover, it is important to use external security software.

The article highlights the importance of ensuring that manufacturers meet the regulation requirements. This will ensure that every person is aware of minimum specifications. The article is important as it offers the specific areas that one should consider when implementing any security measures. Implementing the industrial internet of things will involve many devices, components, systems, and networks. It will also involve applications and other software. Hence, it is important to have a clear understanding on the areas that one needs to focus on when implementing any security measures.

Gault, M. (2015). Six reasons security will fail on the industrial internet. Retrieved from https://guardtime.com/blog/6-reasons-security-will-fail-on-the-industrial-internet

The industrial internet of things will definitely change the way people work. It will change the systems and businesses. Many people are interested in learning about the technology and they want to implement it because of the benefits they seek to get. However, security is a main concern, which should be managed before full implementation of the technology in the market. Designers are failing on the area of security because they are depending on the same techniques that were used in previous technologies. The author describes some of the reasons, which he thinks will lead to failure of the security solutions.

Failing to understand the state of data in industrial internet of things will lead to ineffective security solutions. Knowing the differences between data in motion and at rest is important. Integrity is at the forefront when considering security, and it surpasses confidentiality. This means that there is a need to prioritize since integrity breaches can be more significant. There is need to understand that the integrity of data is the biggest threat and that machines are different from humans. Moreover, accepting that there will always be vulnerabilities in the networks, systems and other devices is of paramount importance.

The article offers a clear understanding of the specific areas, which can mean failure of security measures. Industrial internet of things is a different concept from the one that many people understand. It is important to identify some of the areas that can lead to security failures. This will be important because it will enable designers to know on the specific areas to consider. Security remains one of the main concerns that people worry about whenever they are thinking of implementing the internet of things.

Gorbach, G., Polsonetti, C., & Chatha, A. (2014). Planning for the industrial internet of things. Retrieved from http://www.arcweb.com/brochures/planning-for-the-industrial-internet-of-things.pdf

The authors observe that some companies have failed to adopt industrial internet of things because of concerns about security threats. Modern day companies using information technology systems have suffered massive breaches in the past, which have affected their businesses negatively. People want to be guaranteed of effective security measures before they decide to use the technology. Such security threats and risks will undermine the benefits of industrial internet of things. Hackers can target to disrupt the process and this can be detrimental to the operation of any industry.

The article highlights some of the factors that cause security concerns. These factors include reliance on different forms of technology on the internet such as cloud computing, universal connectivity that is part of the internet of things, data export restrictions, and concerns about publicized breaches of internet based solutions. The authors highlight some of the measures that many companies take to ensure that they are secure. They also observe some of the limitations associated with some of these measures, as they pertain to industrial internet technologies. They highlight some of the factors to focus on when addressing industrial cyber security. They include network security, computer hardening, physical security, device hardening, and policies.

The article is useful for identifying the methods that many companies use with the intent of addressing cyber security. The authors offer some recommendations of effective adaptation and implementation of industrial internet of things. These recommendations are important in helping companies to prepare for the new technology. They highlight some of the necessary resources for effective implementation. Companies willing to use the industrial internet of things have to be prepared to involve all the stakeholders in the process.

Haaramo, E. (2015). From cars to cranes, Nordic industry is embracing the industrial internet of things. Retrieved from http://www.computerweekly.com/news/4500249567/From-cars-to-cranes-Nordic-industry-is-embracing-the-industrial-internet-of-things

In this article, the author examines how different industries have embraced the industrial internet of things. The industries have concentrated on big data, the internet of things, and machine learning. The article describes how several companies have incorporated the technology in their systems. The companies have realized increased efficiency and performance, greater customer satisfaction, and increased operational performance. The company advocates for the use of the industrial internet of things but they do note that there is a common problem, which involves security risk.

The article suggests that security should be a main component of the system. It should be integrated with the system instead of having it as a separate entity. Measures concerned with security should be a part of the systems’ architecture. There is need for industries to collaborate with other partners to enhance security in the systems. In addition, there is a need to consider the external and internal issues of the industry when considering any security system. It should be possible for companies to detect when any information has been accessed and altered.

This article is important as it involves looking at the issue of security from a different perspective. The article focuses on taking care of security issues during the design and development stages. In other words, people should take proactive instead of reactive measures when managing issues of security. This means that industries should consider designing systems from the beginning and using security features that are specific to that specific product. This will make it harder for hackers to penetrate the system. However, companies should also consider investing in other external security features as well as a way of increasing performance of the information.

Kaspersky (n.d.). Kaspersky lab: Empowering industrial cyber security. Retrieved from http://media.kaspersky.com/en/business-security/critical-infrastructure-protection/Empowering-Industrial-Cyber-Security.pdf

Kaspersky is the leading and the largest private cyber security company. It has worked on cyber security issues over many years. This article highlights the threats and vulnerabilities facing industrial systems today. According to the article, the threats facing industrial cyber security and other businesses are significant. Therefore, any company or industry intending to adopt the industrial internet of things has to be aware of these differences because old technologies will not be effective. Therefore, industries have to be willing to invest additional resources such as new technologies and people, so that it can implement an effective security system.

Cyber security in industrial internet of things will be more concerned with protection of the process, and not just data, as in the case with many IT strategies. Continuity is of fundamental importance. Other factors to consider include availability, integrity, and confidentiality. The continuity of process is very important to the process and traditional security measures such as anti-malware protection are secondary. The article further highlights the fundamental pillars of industrial cyber security solutions. These include a process-based approach to the implementation of security, employee awareness, and education, and solutions created specifically for industrial environments. This highlights the importance of people, process, and technology in the design and implementation of cyber security

The article is informative concerning the need of having a different focus and perspective on matters concerned with industrial internet of things and cyber security. It highlights the importance of viewing the new technology as an individual entity and not as a continuation of the current information systems technologies. It will be important for justifying any additional investments and resources for companies wishing to implement the industrial internet of things.

Lohr, S. (2015, October 14). G.E. navigates, carefully, the industrial internet of things. The New York Times. Retrieved from http://bits.blogs.nytimes.com/2015/10/14/g-e-navigates-carefully-the-industrial-internet-of-things/?_r=0

The author looks at how the industrial internet of things is likely to change the way businesses and industries operate. The technology will increase efficiency and production. However, he notes that such positive changes can be hindered by the lack of secure networks. According to the author, there is an increased risk of combining the online and physical resources and the culture in the industry. Security risks are more likely to lessen any payoffs associated with the new technologies.

The author use General Electric as a case study in his report. This is because the company has been at the forefront in adopting industrial internet of things. Therefore, it is well versed with the likely benefit that will be derived from adopting the technology. Other than that, the company is well aware of the impending security risks associated with the adoption of the technology. The author highlights some of the measures that the company has taken to ensure increased security in its technology.

The article offers valuable information concerning the importance of cyber security in the adoption of industrial internet security of things. The article will be useful for examining some of the strategies that any company intending to invest in this new technology can use. The adoption of the new technology is inevitable for any person or company that is willing to adopt change and progress in its operations. The fact that the article focuses on a company that is already using the technology is an added advantage. Industries can avoid some pitfalls and mistakes if they learn how to counter security threats. The article also highlights some of the reasons why companies will not realize any changes if they continue securing their equipment with the old methods.

MacKenzie, H. (2015). Industrial wireless security part 1: Protection strategies. Retrieved from http://www.belden.com/blog/industrialsecurity/Industrial-Wireless-Security-Part-1-Protection-Strategies.cfm

The article examines the different ways that manufacturers can ensure protection of their wireless network designs. The author proposes the use of three methods, which include defense in depth approach, WLAN protection, and detection strategies. The defense in depth approach is based on three main ideas, which include the multiple layers of defense, differentiated layers of defense, and threat specific layers of defense. The author observes that it is possible to realize the benefits of industrial wireless. Manufacturers can benefit from accurate data, faster data collection, reduced costs, and improved uptime. However, protection of data, devices, and the control network is of utmost importance. She further discusses some of the protection techniques that one can use to secure the network.

The author emphasizes the fact that companies do not need to focus or specialize on one protection strategy. They can use multiple approaches to secure their industries. She further highlights the fact that there is a need to secure the data, devices, and network for greater efficiency. This information is valuable because it indicates that companies that decide to implement the industrial internet of things have to be willing to make significant investments if they want greater efficiency.

The author offers several recommendations to ensure that one achieves a secure network and system. It is important to ensure that the wireless products in use comply with the recommended standards for data confidentiality and integrity. Any network, product, or system that does not do so puts one at risk. The article highlights the importance of authentication, firewalls, and information authorization. By doing this, the author implies that even as people are looking for new protection and security approaches, they should not neglect the traditional security techniques.

MacKenzie, H. (2015). Industrial wireless security part 2: Detection strategies. Retrieved from http://www.belden.com/blog/industrialsecurity/Industrial-Wireless-Security-Part-2-Detection-Strategies.cfm

Many different companies have realized the benefits of using industrial internet technology. The companies are diverse in their areas of interest and mode of operation. When determining the security measures to implement, detection is always preferred. This is because most of the damage happens when one is not able to detect a problem with the system. In this article, the author discusses an important factor to consider when securing industrial wireless applications. She emphasizes the importance of detecting attacks and anomalies. This is possible using WIDS (wireless intrusion detection system), which detects any anomalies in communication and monitoring the wireless environment. The advantages of operations and communications in wireless applications are that they are automatic and invisible. However, this also poses a big security threat since it is hard to detect any attacks. It is also difficult to recognize any suspicious activities that are happening.

The author highlights the importance of using a wireless intrusion detection system since it is able to detect and report any suspicious behaviors. The author also notes that two of the most dangerous situations that face wireless networks are wireless phishing and rogue access points. The said situations are risky because they enable an attacker to get easy access and they increase vulnerability of a network.

This article offers valuable information, which should be considered when one is implementing any security measures aimed at protecting industrial networks. The article highlights the importance of raising awareness and educating employees concerning the different ways they can compromise security of their networks. The article highlights the importance of detection as an effective security measure. Detection is important and more useful since it makes it possible for users of the networks to take care of anomalies before major damage happens.

Meltzer, D. (2015). Securing the industrial internet of things. ISSA Journal. Retrieved from https://c.ymcdn.com/sites/www.issa.org/resource/resmgr/journalpdfs/feature0615.pdf

The article highlights some of the main challenges encountered when trying to resolve security problems once systems have been compromised. The author notes that systems lack detection and monitoring capabilities and this makes it difficult to know when the systems have been compromised. He highlights the importance of solving problems whenever they occur in industrial control systems. Existing problems can disrupt business flow and they can lead to loss of life.

When trying to manage security risks, it is important to examine the issue from a network perspective. Industrial protocols and the network architecture are some of the most important areas to consider. Trying to introduce modern security enhancements in a structure that is already in place can pose great challenges and difficulties because it will interfere with availability and the structures have a long life cycle. By highlighting the difficulties that one can face, it is possible for those who are intending to introduce industrial internet of things to know whether they will need new structures or if they can install the security features to their existing structures.

This article is important as it deals with a dilemma that many industries are struggling with today. Industries wish to modernize and digitalize their systems. They have made huge investments to ensure that their systems are running well and that they are always available. Therefore, most of them cannot decide on the way forward. Implementing the industrial internet of things might mean doing away with the old systems or investing more money to ensure that security is enhanced. The article highlights the challenges that many industries are facing today. He offers solutions on how people can retrofit security into an existing environment while not compromising on availability

Spiegel, B. (2015). Industrial cyber security requires layered approach. Design News. Retrieved from http://www.designnews.com/author.asp?section_id=1386&doc_id=278189&dfpPParams=ind_182,industry_machinery,kw_50,aid_278189&dfpLayout=blog

The author notes that industries face several challenges when trying to secure their networks from intrusion. He notes that one of the problems concerns the inability to know if the network has been compromised. It is challenging to identify intruders and this has been one of the main areas of security breaches in industrial internet of things. The author also highlights the challenges and compromises made when using different forms of network. This is because the networks have different priorities. This is mostly realized in operations and internet technologies. There is always a clash of interests when managers try to differentiate between focusing on availability and concentrating on confidentiality

The article highlights the importance of cooperation. There is need for different people to work together to ensure that security is enhanced. Attacks on industrial internet of things can occur in different ways and this increases the difficulties of trying to solve the security problems. In addition, hackers keep on advancing their attack strategies. This highlights the need of having more than one way of dealing with security threats and risks as well as the importance of increasing investments to ensure that there are enough resources to deal with any emerging or potential threats.

This article is important as it highlights the different challenges and difficulties that industries experience when they implement the industrial internet of things. It highlights some of the fundamental areas to focus on when trying to implement new technologies. Moreover, it shows the importance of organizational and departmental cooperation to ensure success in implementation of the technology and to guarantee effectiveness of the security measures used.

 

References:

Carter, J. (2015). Securing the industrial internet of things: The risk list. Retrieved from http://www.directindustry.com/emag/issue-7/special-feature-securing-embedded-0724.html

Gault, M. (2015). Six reasons security will fail on the industrial internet. Retrieved from https://guardtime.com/blog/6-reasons-security-will-fail-on-the-industrial-internet

Gorbach, G., Polsonetti, C., & Chatha, A. (2014). Planning for the industrial internet of things. Retrieved from http://www.arcweb.com/brochures/planning-for-the-industrial-internet-of-things.pdf

Haaramo, E. (2015). From cars to cranes, Nordic industry is embracing the industrial internet of things. Retrieved from http://www.computerweekly.com/news/4500249567/From-cars-to-cranes-Nordic-industry-is-embracing-the-industrial-internet-of-things

Kaspersky (n.d.). Kaspersky lab: Empowering industrial cyber security. Retrieved from http://media.kaspersky.com/en/business-security/critical-infrastructure-protection/Empowering-Industrial-Cyber-Security.pdf

Lohr, S. (2015, October 14). G.E. navigates, carefully, the industrial internet of things. The New York Times. Retrieved from http://bits.blogs.nytimes.com/2015/10/14/g-e-navigates-carefully-the-industrial-internet-of-things/?_r=0

MacKenzie, H. (2015). Industrial wireless security part 1: Protection strategies. Retrieved from http://www.belden.com/blog/industrialsecurity/Industrial-Wireless-Security-Part-1-Protection-Strategies.cfm

MacKenzie, H. (2015). Industrial wireless security part 2: Detection strategies. Retrieved from http://www.belden.com/blog/industrialsecurity/Industrial-Wireless-Security-Part-2-Detection-Strategies.cfm

Meltzer, D. (2015). Securing the industrial internet of things. ISSA Journal. Retrieved from https://c.ymcdn.com/sites/www.issa.org/resource/resmgr/journalpdfs/feature0615.pdf

Spiegel, B. (2015). Industrial cyber security requires layered approach. Design News. Retrieved from http://www.designnews.com/author.asp?section_id=1386&doc_id=278189&dfpPParams=ind_182,industry_machinery,kw_50,aid_278189&dfpLayout=blog

 

 

 

 

 

 

 

 

 

 

 

 

 

 

 

 

Calculate your order
275 words
Total price: $0.00

Top-quality papers guaranteed

54

100% original papers

We sell only unique pieces of writing completed according to your demands.

54

Confidential service

We use security encryption to keep your personal data protected.

54

Money-back guarantee

We can give your money back if something goes wrong with your order.

Enjoy the free features we offer to everyone

  1. Title page

    Get a free title page formatted according to the specifics of your particular style.

  2. Custom formatting

    Request us to use APA, MLA, Harvard, Chicago, or any other style for your essay.

  3. Bibliography page

    Don’t pay extra for a list of references that perfectly fits your academic needs.

  4. 24/7 support assistance

    Ask us a question anytime you need to—we don’t charge extra for supporting you!

Calculate how much your essay costs

Type of paper
Academic level
Deadline
550 words

How to place an order

  • Choose the number of pages, your academic level, and deadline
  • Push the orange button
  • Give instructions for your paper
  • Pay with PayPal or a credit card
  • Track the progress of your order
  • Approve and enjoy your custom paper

Ask experts to write you a cheap essay of excellent quality

Place an order