- Practical Internet of Things Security
- Brian Russell Drew Van Duren
- 394字
- 2021-06-10 18:42:28
Common IoT attack types
There are many attack types covered in this book; however, the following list provides some of the most significant as they relate to the IoT:
- Wired and wireless scanning and mapping attacks
- Protocol attacks
- Eavesdropping attacks (loss of confidentiality)
- Cryptographic algorithm and key management attacks
- Spoofing and masquerading (authentication attacks)
- Operating system and application integrity attacks
- Denial of service and jamming
- Physical security attacks (for example, tampering and interface exposures)
- Access control attacks (privilege escalation)
The preceding attacks are only a small sample of what exists. In the real world, however, most attacks are highly customized to a specific, known vulnerability. A vulnerability that is not yet publicly known, and for which an exploit has typically been developed, is called a zero-day (or O-day) vulnerability. Any number of attacks may exploit such vulnerabilities and any number of attacks may be marketed and sold on various sites (for example, TheRealDeal, AlphaBay, and Zerodium) that come and go in the zero-day marketplace. Well-placed security controls are vital to reducing either the likelihood or severity of an attack's exploitation of a vulnerability. The following diagram shows the ecosystem of attacks, vulnerabilities, and controls:
The types of attacks on IoT systems will grow over time and, in some cases, will follow profit motive trends similar to what we see in the evolving cybersecurity industry. For example, today there is a disturbing trend in the malware business whereby attackers employ cryptographic algorithms to encrypt a victim's personal hard drive data. The attackers then offer to return the data, decrypted, for a fee. Called ransomware, the potential for such an attack in the IoT realm is frightening. Consider a malicious hacker performing ransom attacks on physical infrastructure or medical equipment. Someone receives a note that their pacemaker was unknowingly compromised; the victim receives a short, non-lethal jolt to prove it, then is instructed to immediately wire funds to a destination account or risk a full-fledged, potentially lethal attack. Consider automobiles, garage doors opening (while on vacation), and other potential activities usable by malicious actors for ransom. The IoT must take these types of attacks seriously and not dismiss them as the musings of pundits. The greatest challenge in the security industry is finding methods today of defending against tomorrow's attacks given that many devices and systems are expected to operate years or decades into the future.
- INSTANT Metasploit Starter
- 深入淺出隱私計算:技術解析與應用實踐
- 數(shù)字安全藍皮書:本質(zhì)屬性與重要特征
- 反黑命令與攻防從新手到高手(微課超值版)
- 數(shù)據(jù)安全實踐指南
- 網(wǎng)絡安全技術及應用(第3版)
- Kali Linux Network Scanning Cookbook(Second Edition)
- 零信任網(wǎng)絡:在不可信網(wǎng)絡中構(gòu)建安全系統(tǒng)(第2版)
- 網(wǎng)絡空間安全實驗
- 信息安全等級保護測評與整改指導手冊
- 網(wǎng)絡安全設計、配置與管理大全
- End to End GUI Development with Qt5
- 實用黑客攻防技術
- 構(gòu)建新型網(wǎng)絡形態(tài)下的網(wǎng)絡空間安全體系
- 網(wǎng)絡空間安全:拒絕服務攻擊檢測與防御