官术网_书友最值得收藏!

Common IoT attack types

There are many attack types covered in this book; however, the following list provides some of the most significant as they relate to the IoT:

  • Wired and wireless scanning and mapping attacks
  • Protocol attacks
  • Eavesdropping attacks (loss of confidentiality)
  • Cryptographic algorithm and key management attacks
  • Spoofing and masquerading (authentication attacks)
  • Operating system and application integrity attacks
  • Denial of service and jamming
  • Physical security attacks (for example, tampering and interface exposures)
  • Access control attacks (privilege escalation)

The preceding attacks are only a small sample of what exists. In the real world, however, most attacks are highly customized to a specific, known vulnerability. A vulnerability that is not yet publicly known, and for which an exploit has typically been developed, is called a zero-day (or O-day) vulnerability. Any number of attacks may exploit such vulnerabilities and any number of attacks may be marketed and sold on various sites (for example, TheRealDeal, AlphaBay, and Zerodium) that come and go in the zero-day marketplace. Well-placed security controls are vital to reducing either the likelihood or severity of an attack's exploitation of a vulnerability. The following diagram shows the ecosystem of attacks, vulnerabilities, and controls:

The types of attacks on IoT systems will grow over time and, in some cases, will follow profit motive trends similar to what we see in the evolving cybersecurity industry. For example, today there is a disturbing trend in the malware business whereby attackers employ cryptographic algorithms to encrypt a victim's personal hard drive data. The attackers then offer to return the data, decrypted, for a fee. Called ransomware, the potential for such an attack in the IoT realm is frightening. Consider a malicious hacker performing ransom attacks on physical infrastructure or medical equipment. Someone receives a note that their pacemaker was unknowingly compromised; the victim receives a short, non-lethal jolt to prove it, then is instructed to immediately wire funds to a destination account or risk a full-fledged, potentially lethal attack. Consider automobiles, garage doors opening (while on vacation), and other potential activities usable by malicious actors for ransom. The IoT must take these types of attacks seriously and not dismiss them as the musings of pundits. The greatest challenge in the security industry is finding methods today of defending against tomorrow's attacks given that many devices and systems are expected to operate years or decades into the future.

主站蜘蛛池模板: 建湖县| 鄂州市| 澄城县| 马龙县| 贵阳市| 丹阳市| 科尔| 甘洛县| 浙江省| 吴堡县| 高唐县| 辽宁省| 保山市| 微山县| 呼图壁县| 渭南市| 鲁甸县| 长岭县| 高阳县| 商水县| 华阴市| 大方县| 镇原县| 咸阳市| 图们市| 屏东市| 太谷县| 延川县| 周至县| 连云港市| 台湾省| 桂平市| 临沭县| 烟台市| 开鲁县| 云安县| 阜南县| 鄂托克旗| 徐水县| 无极县| 广灵县|