{"id":19208,"date":"2022-05-31T12:30:12","date_gmt":"2022-05-31T20:30:12","guid":{"rendered":"http:\/\/www.palada.net\/index.php\/2022\/05\/31\/news-12941\/"},"modified":"2022-05-31T12:30:12","modified_gmt":"2022-05-31T20:30:12","slug":"news-12941","status":"publish","type":"post","link":"https:\/\/www.palada.net\/index.php\/2022\/05\/31\/news-12941\/","title":{"rendered":"Why Industry 4.0 must think more like Apple"},"content":{"rendered":"<p><img decoding=\"async\" src=\"https:\/\/images.idgesg.net\/images\/idge\/imported\/imageapi\/2022\/04\/26\/03\/security-shield-protection-form-lines-triangles-and-particle-style-vector-id1018011064-100905046-large.3x2-100925437-large.3x2.jpg?auto=webp&amp;quality=85,70\"\/><\/p>\n<p><strong>Credit to Author: Jonny Evans| Date: Tue, 31 May 2022 12:16:00 -0700<\/strong><\/p>\n<p>For industrial applications, the Internet of Things risks becoming the Internet of Thieves. Perhaps industries making use of connected solutions should take a leaf out the Apple book and lock down their infrastructure.<\/p>\n<p>As digital processes become deeply embedded across every industry, it makes sense that industrial control systems were tested at this year\u2019s Pwn2Own contest. Hackers were asked to seek out vulnerabilities in industrial software and systems.<\/p>\n<p>Contest winners <a href=\"https:\/\/www.computest.nl\/en\/news\/news-and-press-releases\/dutch-hackers-found-serious-vulnerabilities-in-industrial-software\/\" rel=\"nofollow noopener\" target=\"_blank\">Daan Keuper and Thijs Alkemade<\/a> found that once they managed to break into the IT networks used at these companies, it was \u201crelatively easy\u201d to then cause havoc with systems and equipment.<\/p>\n<p>In part, this is because at this stage of the transformation, much of the equipment used in manufacturing wasn\u2019t originally designed to be connected to the internet or has weak or outdated security.<\/p>\n<p>IT understands this, of course, which is why industrial IoT deployments tend to secure the IT networks they use, but this also means that if those networks are penetrated, much of the deployed equipment lacks additional protection. And it means that numerous potential attack surfaces exist.<\/p>\n<p>This is never good, but at present the threat to critical infrastructure is <a href=\"https:\/\/www.nsa.gov\/Press-Room\/News-Highlights\/Article\/Article\/3004954\/cisa-fbi-nsa-and-international-partners-issue-advisory-on-demonstrated-threats\/\" rel=\"nofollow noopener\" target=\"_blank\">growing<\/a>.<\/p>\n<p>In the event that security is broken, attackers may take over machinery, modify processes, or simply choose to shutter production. This can have huge consequences \u2014 on the company, its customers and partners, and across already creaking supply chains.<\/p>\n<p>Louis Priem, consultant at ICT Group, said, \u201cSystems in factory environments typically run 24\/7, so there is very little opportunity to patch vulnerabilities. In addition, there is a lot of legacy, as machines are purchased for the long term, and there is usually no opportunity to install antivirus applications. All these make the industrial sector vulnerable to malicious parties.\u201d<\/p>\n<p>Speaking to <em><a href=\"https:\/\/www.technologyreview.com\/2022\/04\/21\/1050815\/hackers-target-critical-infrastructure-pwn2own\/\" rel=\"nofollow noopener\" target=\"_blank\">MIT Technology Review<\/a><\/em>, the Pwn2Own winners warned that security in industrial control systems is lagging behind badly. Think of how a <a href=\"https:\/\/www.computerworld.com\/article\/2487452\/target-attack-shows-danger-of-remotely-accessible-hvac-systems.html\">successful attack against Target<\/a> a few years ago made use of an insecure HVAC system to penetrate the corporate network, which shows the need to protect every available endpoint.<\/p>\n<p>These days more than ever, security <a href=\"https:\/\/www.computerworld.com\/article\/3658552\/jamf-adds-network-and-endpoint-security-tools-for-enterprise-macs.html\">lives at the edge<\/a>.<\/p>\n<p>It&#8217;s not as if we couldn\u2019t see problems like this coming.<\/p>\n<p>The evolution of industrial IoT has seen the <a href=\"https:\/\/www.computerworld.com\/article\/2476652\/can-apple-keep-us-safe-in-the-internet-of-things.html\">creation of a myriad of different standards<\/a> with differing security levels. This has driven many in the space (including Apple) to <a href=\"https:\/\/www.applemust.com\/apple-amazon-google-others-to-build-smart-home-connectivity-standard\/\" rel=\"nofollow noopener\" target=\"_blank\">develop joint standards<\/a> for connected devices.<\/p>\n<p>Matter, the consumer IoT standard that is the first fruit of that effort, should arrive this year, while the more industrial Thread standard is <a href=\"https:\/\/www.threadgroup.org\/BUILT-FOR-IOT\/Commercial#Applications\" rel=\"nofollow noopener\" target=\"_blank\">already seeing deployment<\/a>. (I\u2019m expecting more news regarding Matter pretty soon, potentially at WWDC.)<\/p>\n<p>\u00a0\u201cThread is based on the universally deployed Internet Protocol version 6 (IPv6) standard, making it extremely robust. A Thread network does not rely on a central hub, such as a bridge, so there\u2019s no single point of failure. And Thread has the ability to self-heal \u2013 if one node (or accessory in your Thread network) becomes unavailable, the data packets will select an alternate route automatically and the network simply continues to work,\u201d Eve Systems <a href=\"https:\/\/www.computerworld.com\/article\/3643672\/eve-systems-ceo-matter-standard-is-a-foundational-tech.html\">has explained<\/a>.<\/p>\n<p>To some extent, one way to protect any device is to follow Apple\u2019s core mission, which is to ensure systems do as much as possible with as little information as possible.<\/p>\n<p>While the effort has arguably slowed the company\u2019s progress in AI development in comparison with more cloud-based competitors, Apple\u2019s focus on placing intelligence at the edge is increasingly seen as appropriate.<\/p>\n<p>Mimic Technology and Business &amp; Decision, for example, <a href=\"https:\/\/www.businesswire.com\/news\/home\/20220511005211\/en\/mimik-and-Business-Decision-Partner-to-Accelerate-Adoption-of-Industry-4.0-Technologies\" rel=\"nofollow noopener\" target=\"_blank\">seem to be<\/a> developing industrial IoT systems that follow a model in which intelligence sits at the edge.<\/p>\n<p>When combined with other emerging network technologies, such as <a href=\"https:\/\/www.networkworld.com\/article\/3031279\/sd-wan-what-it-is-and-why-you-ll-use-it-one-day.html\" rel=\"noopener\" target=\"_blank\">SD-WAN<\/a> or private 5G networks, placing intelligence at the edge helps secure industrial networks by helping cordon off individual endpoints.<\/p>\n<p>The problem, of course, is that not every connected system is smart enough to be so protected, while the different priorities of IT and operational intelligence mean attackers enjoy a luxury of potential vulnerabilities for attacks.<\/p>\n<p>And that\u2019s even before dumb, short-sighted governments <a href=\"https:\/\/www.computerworld.com\/article\/3640611\/no-sideloading-is-not-good-for-you.html\">force sideloading<\/a> and inherently insecure device security <a href=\"https:\/\/www.computerworld.com\/article\/2476516\/security-expert-rejects-apple--nsa--ios-backdoor-claims.html\">back doors<\/a> onto the mobile systems and platforms we increasingly rely on to keep our connected infrastructure secure.<\/p>\n<p>Perhaps enterprise IoT needs to borrow a page from the Apple book and design systems that are inherently more secure than anyone thinks they need? Because it\u2019s only a matter of time before they find that anything less won\u2019t do.<\/p>\n<p><em>Please follow me on\u00a0<a href=\"https:\/\/twitter.com\/jonnyevans_cw\" rel=\"nofollow noopener\" target=\"_blank\">Twitter<\/a>, or join me in the\u00a0<a href=\"https:\/\/mewe.com\/join\/appleholics_bar_and_grill\" rel=\"nofollow noopener\" target=\"_blank\">AppleHolic\u2019s bar &amp; grill<\/a>\u00a0and\u00a0<a href=\"https:\/\/mewe.com\/join\/apple_discussions\" rel=\"nofollow noopener\" target=\"_blank\">Apple Discussions<\/a>\u00a0groups on MeWe.<\/em><\/p>\n<p><a href=\"https:\/\/www.computerworld.com\/article\/3662131\/why-industry-40-must-think-more-like-apple.html#tk.rss_security\" target=\"bwo\" >http:\/\/www.computerworld.com\/category\/security\/index.rss<\/a><\/p>\n","protected":false},"excerpt":{"rendered":"<p><img decoding=\"async\" src=\"https:\/\/images.idgesg.net\/images\/idge\/imported\/imageapi\/2022\/04\/26\/03\/security-shield-protection-form-lines-triangles-and-particle-style-vector-id1018011064-100905046-large.3x2-100925437-large.3x2.jpg?auto=webp&amp;quality=85,70\"\/><\/p>\n<p><strong>Credit to Author: Jonny Evans| Date: Tue, 31 May 2022 12:16:00 -0700<\/strong><\/p>\n<article>\n<section class=\"page\">\n<p>For industrial applications, the Internet of Things risks becoming the Internet of Thieves. Perhaps industries making use of connected solutions should take a leaf out the Apple book and lock down their infrastructure.<\/p>\n<h2><strong>What the ethical hackers say<\/strong><\/h2>\n<p>As digital processes become deeply embedded across every industry, it makes sense that industrial control systems were tested at this year\u2019s Pwn2Own contest. Hackers were asked to seek out vulnerabilities in industrial software and systems.<\/p>\n<p>Contest winners <a href=\"https:\/\/www.computest.nl\/en\/news\/news-and-press-releases\/dutch-hackers-found-serious-vulnerabilities-in-industrial-software\/\" rel=\"nofollow noopener\" target=\"_blank\">Daan Keuper and Thijs Alkemade<\/a> found that once they managed to break into the IT networks used at these companies, it was \u201crelatively easy\u201d to then cause havoc with systems and equipment.<\/p>\n<p class=\"jumpTag\"><a href=\"\/article\/3662131\/why-industry-40-must-think-more-like-apple.html#jump\">To read this article in full, please click here<\/a><\/p>\n<\/section>\n<\/article>\n","protected":false},"author":4,"featured_media":0,"comment_status":"open","ping_status":"closed","sticky":false,"template":"","format":"standard","meta":{"colormag_page_container_layout":"default_layout","colormag_page_sidebar_layout":"default_layout","footnotes":""},"categories":[11062,10643],"tags":[2211,1955,6269,16861,714],"class_list":["post-19208","post","type-post","status-publish","format-standard","hentry","category-computerworld","category-independent","tag-apple","tag-industry","tag-internet-of-things","tag-iot-security","tag-security"],"_links":{"self":[{"href":"https:\/\/www.palada.net\/index.php\/wp-json\/wp\/v2\/posts\/19208","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/www.palada.net\/index.php\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/www.palada.net\/index.php\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/www.palada.net\/index.php\/wp-json\/wp\/v2\/users\/4"}],"replies":[{"embeddable":true,"href":"https:\/\/www.palada.net\/index.php\/wp-json\/wp\/v2\/comments?post=19208"}],"version-history":[{"count":0,"href":"https:\/\/www.palada.net\/index.php\/wp-json\/wp\/v2\/posts\/19208\/revisions"}],"wp:attachment":[{"href":"https:\/\/www.palada.net\/index.php\/wp-json\/wp\/v2\/media?parent=19208"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/www.palada.net\/index.php\/wp-json\/wp\/v2\/categories?post=19208"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/www.palada.net\/index.php\/wp-json\/wp\/v2\/tags?post=19208"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}