classic | mobile
Follow us on:
Follow us on Facebook  Share via Twitter  Share via LinkedIn
 

Search...
Hi-Tech Security Solutions Business Directory
Residential Estate Security Handbook 2018


Turning cyber threat into cyber opportunity
September 2018, Transport (Industry), Integrated Solutions, IT infrastructure

The network of connected sensors, devices, and appliances commonly referred to as the Internet of Things (IoT) has completely changed the way business works. This is as true of the heavy hauling and freight industry as any other. At any moment, various players in the industry can get a sense of vehicle health, cargo safety, and whether or not any infrastructure is in need of repair.

As IoT technologies have become more ubiquitous, so have the threats from cybercriminals however. With more than 20-billion IoT devices expected to be online by 2020, there are more gaps for cybercriminals to take advantage of than ever before. That has massive potential consequences for heavy hauling. A cyber-attack at targeted points in a country or region’s network could leave it crippled, preventing people from receiving much-needed goods and services.

Maeson Maherry
Maeson Maherry

Fortunately, it doesn’t have to be that way. According to Etion Group chief digital officer Maeson Maherry, it’s possible for businesses to reap the benefits of IoT without placing themselves in a compromised security environment.

“Connected sensors can provide businesses with useful data that can be easily acted on,” Maherry says. “Sensors in trucks and cargo containers, for example, can tell you when to do preventative maintenance, helping avert potential disasters.”

For that to work, however, people have to be able to act on that data. “If I can send commands to vehicles and machines out in the field, which is what sensors are in the first place, can I do so in a way that makes my business more productive and efficient?

“So, for example, if a vehicle is telling me that it’ll need maintenance soon, do I have the power to schedule that maintenance so that the machine is down for as little time as possible?”

If that is the case, that ability comes with serious benefits, but in order to be able to reap them, you have to know that you can trust the information coming from the embedded sensors in your network. Here, he says, the question of who owns the IoT devices and sensors in a business environment becomes critical.

“I’ve got these devices and sensors in my business environment, do they belong to me, or do they belong to their manufacturer?”

Logically, he points out, ownership should always lie with the business owner because these devices are used to make decisions with potentially massive business impacts. “You have to make sure that you’ve got owner-controlled security in place. You’ve got to make sure that you can control these devices, and make sure it’s only your device that plugs into your network.”

Even if you own the security, he adds, you still have to know that you can trust the entire system. “You’ve got to be able to trust everything, from the sensors themselves, the way they’re communicating data, all the way through to the information systems that are processing that data and turning it into information for you, so that you can make your own deductions and send back commands.”

Here the fundamentals of security – authentication, encryption, and integrity – come in. When it comes to authentication, this allows you to know that a sensor sending you information belongs to you and that when you send information to a sensor it will act on it. A lot of the work around encryption, meanwhile, comes down to picking your battles.

“Is it something that I need to worry about other people seeing?,” Maherry asks. “If the devices are sending out private medical information then the answer is yes, but if they’re just sending the settings on a machine then the answer might be no.”

Finally, integrity entails doing everything you can to prevent your machines being tampered with. And that’s incredibly important. Integrity is going to be at “the next wave of cybersecurity threats, which will be a constant concern for us over the next decade or more”.

We’ve already seen what happens when those devices are tampered with. In August 2016, cybercriminals used IoT devices to execute one of the biggest DDoS attacks in history, bringing down some of the Internet’s biggest sites. It’s only a matter of time before someone tries to bring down a freight network.

Fortunately, says Maherry, such incidents are avoidable. “It’s possible to solve all these issues with the cryptography and technology that we have today, we just have to have the conversations to start with. The same is true with the devices: they’re going to need to be updated in the field, just like your computer or your phone get updated. You’ve got to make sure that there’s integrity in the code that’s running on these devices, even if it’s embedded.”

“The answers are definitely there,” says Maherry, “but if people are not thinking about the cybersecurity aspect and the ownership aspect, then you’re not going to get to the benefits of what IoT can really do on a large scale.”


  Share via Twitter   Share via LinkedIn      

Further reading:

  • Is everything-as-a-service worth it?
    April 2019, iPulse Systems, Verifier, CCTV, Surveillance & Remote Monitoring, Integrated Solutions
    Security-as-a-service seems like a good idea to reduce technology and labour expenses. Hi-Tech Security Solutions find out more.
  • Wide-area surveillance on estates, farms and other large properties
    April 2019, Protoclea Advanced Image Engineering, Access Control & Identity Management, Integrated Solutions
    Using the right solution to protect large, open areas can be accomplished with the right technology and planning.
  • Visible light facial recognition
    April 2019, ZKTeco, Technews Publishing, This Week's Editor's Pick, Access Control & Identity Management, Integrated Solutions
    ZKTeco recently expanded its reach in the facial recognition market with the launch of its new series of visible light facial recognition (VLFR) products.
  • 2019 Internet of Things (IoT) Barometer
    March 2019, This Week's Editor's Pick, Integrated Solutions, IT infrastructure
    A majority of businesses that use IoT technology agree that it has either disrupted their industry or will do so in the next five years.
  • SECaaS a game changer for SA
    April 2019, Specialised Exhibitions Montgomery, Integrated Solutions, IT infrastructure
    SECaaS promises to comprehensively arm companies of all sizes with the tools they need to protect themselves from harmful cyberattacks.
  • Increased monetisation and enhanced security
    April 2019, Elvey Security Technologies , CCTV, Surveillance & Remote Monitoring, Integrated Solutions
    The deployment of various products in the control room space have allowed installers and service providers to monetise their products and services, and increase their overall offerings to the industry.
  • Surveillance in the gambling industry
    April 2019, Entertainment and Hospitality (Industry), CCTV, Surveillance & Remote Monitoring, Integrated Solutions
    Winston Sumner, ASIS SA committee member, says integration is essential for successful security operations in the gambling and entertainment markets.
  • Surveillance infrastructure has changed
    April 2019, Capsule Technologies, This Week's Editor's Pick, Integrated Solutions, IT infrastructure
    The processing power required to use AI and deep learning is much higher than companies are used to, making it difficult to use off-the-shelf solutions for server and storage.
  • Is security restricting your function as a service?
    April 2019, Access Control & Identity Management, Integrated Solutions
    Security can really scupper your efforts to get the benefits of functions as a service (FaaS).
  • Palm vein authentication at airports
    April 2019, Access Control & Identity Management, Transport (Industry)
    Passengers travelling on domestic flights in Korea can verify their identities just by holding out a hand, improving convenience and reducing congestion.
  • Indian rail on track with intelligence and safety
    April 2019, Hikvision South Africa, Transport (Industry), CCTV, Surveillance & Remote Monitoring, Perimeter Security, Alarms & Intruder Detection
    The Western Railway has some 150 remote installations for the railway’s signalling systems, and these had to be secured.
  • Vox unlocks value for gated communities
    April 2019, Vox Telecom, Home Security, IT infrastructure
    Solutions have been developed to provide Home Owners’ Associations with an environment where they can offer residents significant value adds.

 
 
         
Contact:
Technews Publishing (Pty) Ltd
1st Floor, Stabilitas House
265 Kent Ave, Randburg, 2194
South Africa
Publications by Technews
Dataweek Electronics & Communications Technology
Electronics Buyers’ Guide (EBG)

Hi-Tech Security Solutions
Hi-Tech Security Business Directory (HSBD)

Motion Control in Southern Africa
Motion Control Buyers’ Guide (MCBG)

South African Instrumentation & Control
South African Instrumentation & Control Buyers’ Guide (IBG)
Other
Terms & conditions of use, including privacy policy
PAIA Manual
         
    Mobile | Classic

Copyright © Technews Publishing (Pty) Ltd. All rights reserved.