{"id":15595,"date":"2019-06-17T11:00:14","date_gmt":"2019-06-17T19:00:14","guid":{"rendered":"http:\/\/www.palada.net\/index.php\/2019\/06\/17\/news-9344\/"},"modified":"2019-06-17T11:00:14","modified_gmt":"2019-06-17T19:00:14","slug":"news-9344","status":"publish","type":"post","link":"http:\/\/www.palada.net\/index.php\/2019\/06\/17\/news-9344\/","title":{"rendered":"Rising Cybersecurity Concerns Within the Industrial IoT (IIoT)"},"content":{"rendered":"<p><strong>Credit to Author: Atin Chhabra| Date: Mon, 17 Jun 2019 14:48:13 +0000<\/strong><\/p>\n<p>With the advent and growth of technology, no entity \u2013 whether an individual or an organisation \u2013 is truly safe from the disastrous impact of a successful cyber attack or information breach. The situation is only worsened by the Industrial Internet of Things (IIoT), as the sheer number of these devices continues to increase with each passing year.\u00a0 This IIoT device revolution has seen a simultaneous increase in the cyber threat landscape due to new avenues of attack that these devices have brought about with them. Furthermore, the industrial markets have consistently found themselves as targets for potential cyber-criminals and information thieves. Some of the primary reasons attributing to this can be explained below.<\/p>\n<p><strong>Outdated &amp; Obsolete Systems<\/strong><\/p>\n<p>A noteworthy component of the globe\u2019s IT infrastructure is currently functioning on outdated software and hardware solutions. A prominent example of this is <strong><u><a href=\"https:\/\/www.schneider-electric.co.in\/en\/product-category\/6000-telemetry-and-remote-scada-systems\/\">SCADA<\/a><\/u><\/strong>. They are essentially utilised as a platform of data collection and process automation. <strong><u><a href=\"https:\/\/www.schneider-electric.co.in\/en\/product-category\/6000-telemetry-and-remote-scada-systems\/\">SCADA systems<\/a><\/u><\/strong> were initially designed to function internally, without keeping secure communication in mind. However, as time has progressed a significant number of vulnerabilities have come up within these systems. In most cases, these systems are not supported or updated with security applications, even if the damages they address are obvious. Developing a security patch can be a cumbersome task, since the proposed changes may result in the other components of the system to underperform or fail.<\/p>\n<p><strong>Growing Demands <\/strong><\/p>\n<p>It can easily be said that demand for <strong><u><a href=\"https:\/\/www.schneider-electric.co.in\/en\/work\/campaign\/innovation\/industries.jsp\">Industrial IoT<\/a><\/u> <\/strong>devices greatly exceeds the demand for the security and safeguarding of these same devices. Along with the fact that the customised configuration of distinct systems can harm a facility, any disturbance in this service can have disastrous results. These consequences can impact the operational as well as financial safety of a system. To elaborate on this further, imagine trying to replace the entire foundation of a car without it impacting the functionality of other components such as the gear, steering wheel, or even the clutch.<\/p>\n<p><strong>Inadequate Standards<\/strong><\/p>\n<p>The sudden revolution of the IIoT has lead to an inevitable demand for security which is earlier negligible. This has lead to an array of specific standards for<strong> <u><a href=\"https:\/\/www.schneider-electric.co.in\/en\/work\/solutions\/cybersecurity\/industrial-cybersecurity.jsp\">cybersecurity solutions<\/a><\/u><\/strong>. However, enforcing these standards pervasively is close to impossible due to the diversity and uniqueness of each system and their functionality.<\/p>\n<p><strong>Sheer Popularity of IIoT<\/strong><\/p>\n<p>As elaborated on below, the undying thirst for operational efficiency and performance enhancement within the industry has resulted in the swift employment of new-age technologies. This makes cybersecurity an even bigger concern due to the meaningful threat introduced by the growth of the <strong><u><a href=\"https:\/\/www.schneider-electric.co.in\/en\/work\/campaign\/innovation\/industries.jsp\">Industrial Internet of Things<\/a><\/u>.<\/strong><\/p>\n<p>The post <a rel=\"nofollow\" href=\"https:\/\/blog.se.com\/industrial-software\/2019\/06\/17\/rising-cybersecurity-concerns-within-the-industrial-iot-iiot\/\">Rising Cybersecurity Concerns Within the Industrial IoT (IIoT)<\/a> appeared first on <a rel=\"nofollow\" href=\"https:\/\/blog.se.com\">Schneider Electric Blog<\/a>.<\/p>\n<p><a href=\"https:\/\/blog.se.com\/industrial-software\/2019\/06\/17\/rising-cybersecurity-concerns-within-the-industrial-iot-iiot\/\" target=\"bwo\" >http:\/\/blog.schneider-electric.com\/feed\/<\/a><\/p>\n","protected":false},"excerpt":{"rendered":"<p><strong>Credit to Author: Atin Chhabra| Date: Mon, 17 Jun 2019 14:48:13 +0000<\/strong><\/p>\n<p>With the advent and growth of technology, no entity \u2013 whether an individual or an organisation \u2013 is truly safe from the disastrous impact of a successful cyber attack or&#8230;  <a href=\"https:\/\/blog.se.com\/industrial-software\/2019\/06\/17\/rising-cybersecurity-concerns-within-the-industrial-iot-iiot\/\" title=\"ReadRising Cybersecurity Concerns Within the Industrial IoT (IIoT)\">Read more &#187;<\/a><\/p>\n<p>The post <a rel=\"nofollow\" href=\"https:\/\/blog.se.com\/industrial-software\/2019\/06\/17\/rising-cybersecurity-concerns-within-the-industrial-iot-iiot\/\">Rising Cybersecurity Concerns Within the Industrial IoT (IIoT)<\/a> appeared first on <a rel=\"nofollow\" href=\"https:\/\/blog.se.com\">Schneider Electric Blog<\/a>.<\/p>\n","protected":false},"author":4,"featured_media":0,"comment_status":"open","ping_status":"closed","sticky":false,"template":"","format":"standard","meta":{"colormag_page_container_layout":"default_layout","colormag_page_sidebar_layout":"default_layout","footnotes":""},"categories":[12389,12388],"tags":[12410],"class_list":["post-15595","post","type-post","status-publish","format-standard","hentry","category-scadaics","category-schneider","tag-industrial-software"],"_links":{"self":[{"href":"http:\/\/www.palada.net\/index.php\/wp-json\/wp\/v2\/posts\/15595","targetHints":{"allow":["GET"]}}],"collection":[{"href":"http:\/\/www.palada.net\/index.php\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"http:\/\/www.palada.net\/index.php\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"http:\/\/www.palada.net\/index.php\/wp-json\/wp\/v2\/users\/4"}],"replies":[{"embeddable":true,"href":"http:\/\/www.palada.net\/index.php\/wp-json\/wp\/v2\/comments?post=15595"}],"version-history":[{"count":0,"href":"http:\/\/www.palada.net\/index.php\/wp-json\/wp\/v2\/posts\/15595\/revisions"}],"wp:attachment":[{"href":"http:\/\/www.palada.net\/index.php\/wp-json\/wp\/v2\/media?parent=15595"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"http:\/\/www.palada.net\/index.php\/wp-json\/wp\/v2\/categories?post=15595"},{"taxonomy":"post_tag","embeddable":true,"href":"http:\/\/www.palada.net\/index.php\/wp-json\/wp\/v2\/tags?post=15595"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}