Problem solve 在您的技术,过程和项目中获得有关特定问题的帮助。

飞行物联网引入了新的机会,安全漏洞

在物联网的惊人世界中,时代发生了变化。曾经是一个新的和引人入胜的想法,迅速发展到各地的消费者的心中。从Fitbit和Pet Trackers等可穿戴设备到智能奶牛和智能农业,物联网现在正在天空。

Flying IoT is essentially drones fully equipped with network connectivity capabilities. These devices mark a new frontier for smart devices — one that comes with a host of challenges. One key challenge for flying IoT is security. The security vulnerabilities go far beyond a consumer’s smart device unknowingly being used in a botnet分布式拒绝服务(DDoS) attack.

那是因为无人机可以用多种方式用于邪恶目的。例如,黑客可能会拦截被无人机和基站之间传输的数据。或者,黑客可以使用无人机对智能设备进行物理控制,将其用作公司网络的后门。如果该主张似乎不太可能,请考虑如何在2016年的以色列魏兹曼科学学院和加拿大达尔豪西大学的研究人员did just that

通过为无人机配备自动攻击套件,他们可以入侵一个智能灯泡。仅在几分钟之内,该黑客迅速从一个灯泡传播到目标办公大楼中的每个智能灯泡。这使他们可以打开和关闭建筑物的灯。如果这是一次真正的攻击,可能会更糟。

在2019年底,另一组研究人员使用了DJI无人机接管智能电视。同样,如果这是一次真正的攻击,黑客可以轻松地更改查看器屏幕上的内容,显示网络钓鱼消息以获取私人信息,甚至使用KeyLogger来捕获远程按钮按下。

来源:Shutterstock。

尽管有安全挑战,但预计无人机to play an increasingly important rolein delivering packages to customer’s doorsteps, tracking criminals, and rapidly delivering emergency supplies such as medications and vaccines. To enable optimal operation of these applications, drone security must be assured. This means companies must address security issues head on rather than treating them as an afterthought.

According to the Open Web Application Security Project, the top ten任何物联网设备中的漏洞,包括无人机,是:

  • Weak, guessable or hardcoded passwords
  • Vulnerable network services
  • 未受保护的生态系统接口
  • Lack of a secure update mechanism
  • Use of insecure or outdated components
  • Insufficient privacy protection
  • Unprotected data transfer and storage
  • Lack of device management
  • 脆弱的默认设置
  • Lack of physical hardening

With the exception of the very last security vulnerability, each of these issues can be effectively addressed through penetration testing — or pen testing . For example, brute force scanners can crack poor passwords. Service discovery tools can find unguarded devices on the network. Using things such as fuzzing attacks, application layer scans and attacks, and secure communication validation techniques, pen testing can test for and find cybersecurity vulnerabilities early in the drone development process.

但是,不断网络攻击的发展性质意味着即使是最佳的笔测试解决方案也可以迅速过时。解决此问题的最佳方法是确保使用的任何笔测试工具将通过正在进行的应用程序和威胁情报订阅不断更新。解决最后的脆弱性(缺乏身体硬化)需要物理解决方案。

On the other side of the spectrum, any company vulnerable to a cyberattack via drone can protect themselves using a good heterogenous mix of security solutions to secure their networks. Unfortunately, finding the right mix of solutions is no easy task, since they can be tough to verify and challenging to scale. Plus, interactions between the solutions can sometimes impact security performance and network resiliency.

Source: Shutterstock

To解决此类问题,公司应寻找一个易于使用的应用程序和安全测试生态系统,以验证现代网络和网络设备的稳定性,准确性和质量。理想情况下,安全解决方案应该能够模拟现实世界中的合法流量,DDOS,Exploits,恶意软件和模糊。具有这些功能的生态系统将使弱势公司能够模拟良好和坏流量,以在最现实的条件下验证和优化其网络。

与任何新的IoT应用程序一样,必须克服许多技术考虑,以便快速进入市场并在长期内满足客户。就无人机而言,网络安全将仍然是最大的技术考虑因素之一。

通过在设计周期的早期将安全措施设计成无人机并在整个开发过程中进行适当测试,公司可以获得比潜在黑客相比的优势。鉴于现代无人机现在已经是天空中的计算机,因此最早可能为网络攻击的准备是保持网络犯罪分子领先的唯一途径,同时仍然意识到飞行物联网的全部好处。

所有的物联网议程网络贡献者都负责其帖子的内容和准确性。意见是作家的,不一定会传达物联网议程的思想。

SearchCIO
Search安全
Search联网
SearchDataCenter
SearchDataManagement
关闭