Home Tags CYBER-PHYSICAL SYSTEMS

Tag: CYBER-PHYSICAL SYSTEMS

Discovering Consumer Attitudes Toward Connected Car Security
Thales conducted a survey of 1,000 consumers across the U.S. and UK. Few interesting findings: Ownership of internet-connected cars is on the rise. 28% in the U.S. (increased from 24% in 2016) and 18% in the UK. Due to the current threat landscape people are very worried about security...
PwC IIoT Operational Reference Architecture
The Industrial Internet of Things (IIOT) promises to revolutionize industrial and manufacturing activities, and disrupt today's business models. The CIO’s role will touch various parts of their company more than ever, and they will also need to help their businesses operationalize rapid changes in business models, from products to services, cloud-based models, outsourced models, and others.
ENISA - Baseline Security Recommendations for IoT
The study which is titled ‘Baseline Security Recommendations for Internet of Things in the context of critical information infrastructures’, aims to set the scene for IoT security in Europe. It serves as a reference point in this field and as a foundation for relevant forthcoming initiatives and developments.
Smart Cities
How important privacy is for building smart cities and embracing the IoT In the 60s cartoon The Jetsons, the family lived in a futuristic city with flying cars, a robotic housekeeper, and even a watch that let you do video calling. The Jetsons city of the future is with us in the here and now as we have the technology to build smart cities, and in doing so, we can create amazing places to live and work. This idea of making our cities smart is engaging clever minds all over the world and we are witnessing the emergence of smart places...
State of IoT 2018
New Cradlepoint Business Intelligence Report reveals the current IT practices, perceptions and future plans surrounding global Internet of Things (IoT) deployments. The findings of the underlying study revealed that even though over 69% of organizations have adopted, or plan to adopt, IoT solutions within the next year, 40% of companies have serious concerns around cybersecurity.
Forrester and ForeScout Research on IoT and OT Security Challenges
ForeScout commissioned Forrester Consulting to see if organizations can adequately and accurately secure their networks with the rise of IoT-connected devices. The study sheds additional insight into this issue that may be surprising...
Inmarsat - The Future of IoT in Enterprise
Inmarsat released the results of survey of about 500 respondents. According to the results, IoT has taken a lead over other forms of innovation. 82% of respondents will have adopted some form of IoT within the next two years. Three quarters of respondents in our survey agreed that they needed to improve their processes to protect against malicious attacks...
Cyber-Kinetic Attacks History
The fact that cyber-kinetic attacks rarely appear on mainstream news doesn’t mean they don’t happen. They happen more frequently than you would think. Many, for various reasons, aren’t even reported to agencies charged with combatting them. This hinders security experts in understanding the full scope and recognizing the trends in this growing problem. We’ll highlight examples of cyber-kinetic incidents and attacks in this chapter. Some were malfunctions that, nonetheless, demonstrated cyber-physical system vulnerabilities. Some were collateral damage from hacking or computer viruses. The vulnerabilities these exposed inspired a growing number of targeted cyber-kinetic attacks in recent years. The Beginning of Cyber-Kinetic...
Cyber-Kinetic Timeline
Below is a timeline of key historic cyber-kinetic attacks, system malfunctions and key researcher demos targeting cyber-physical systems (CPS), Internet of Things (IoT) and Industrial Control Systems (ICS) resulting in kinetic impacts in the physical world. I tried to select only those that were first-of-the-kind or that significantly increased general awareness about a particular type of an attack or incident I know that the list is incomplete. That’s where you come in. If you are aware of an incident or a research that demonstrated something new regarding cyber-kinetic threats or helped significantly raise the awareness, please contact me. For a more...
Chinese cybercrime
Western publications often picture the People’s Democratic Republic of China (hereafter China) as the world’s chief propagator of cyberattacks. But the picture is much more complex than such broad-brush claims suggest. Few Westerners realize that China and its neighbours in the Greater China region (Taiwan, Macau and Hong Kong) have, over last few years, became the most technologically advanced region in the world – ahead of the West in the adoption, and in many cases even in the development of advanced technologies. Countries in the region were always close to the top of the list of victims of cyberattacks. Factors, such...
Cyber-Kinetic Robot
The attacker stepped out from behind a hedge in the upper-class suburban neighborhood, being careful to stay in the shadows. Across the street, the last lights shining through the windows of the house had just flickered out. She tugged the bottom of her black hoodie into place and pulled the hood up over her head, casting her face deeper in shadow. Her target sat in the driveway at the front of the house, a bright red and completely decked out SUV. Glancing up and down the street to ensure no one was looking, she slipped across the street into the...
Security Standards Regulations Guidelines
Below is my attempt to list of all published 5G, IoT and "Smart Everything"-related security guidelines, frameworks and standards. If you are aware of additional entries that should be here, please let me know at [email protected]
Cyber-Kinetic Security, IoT Security, OT Security
We live in a world in which the way we observe and control it is radically changing. Increasingly, we interact with physical objects through the filter of what computational systems embedded in them tell us, and we adjust them based on what those systems relate. We do this on our phones, in our cars, in our homes, in our factories and, increasingly, in our cities. Physical objects are so interconnected that we simply take those connections for granted, as if being able to unlock your car by pushing a button on your key fob, unlocking it with your phone or...