IOT AAT (Techtalk)
IOT AAT (Techtalk)
Name N.Upender
Rollno 22955A6706
Subject Principles Of IOT
Subject Code ACIC10
TITLE
The impact of the Internet of Things (IoT) the emerging set of embedded sensors, actuators,
controllers, and communications devices on future utilities and infrastructures from the
perspective of risk, reliability, and resilience. Given the need to safeguard from the
perspective of the utilities’ risk and presents a set of observations and recommendations
concerning utility deployment of the IoT.
The IoT presents a new and fundamentally different component with a highly uncertain risk
profile. These IoT systems will be densely deployed, highly integral, and likely autonomous
in operation, meaning that they could directly affect the operational reliability of a utility.
with risk-assessment experts from leading utilities, where it was stated that many utilities did
not realize the full extent of vulnerabilities within IoT devices, nor were they sure how to
incorporate that risk and uncertainty into their current risk-assessment models.
The key findings were as follows:
The understanding of IoT-related security vulnerabilities varies.
The impact of software vulnerabilities is poorly comprehended.
The risk models are poorly specified because the managers cannot gauge likelihood.
In the managers’ view, IoT manufacturers were responsible for mitigating this risk.
Risk and Uncertainty
Risk can informally be defined as an exposure to the possibility of an undesirable event.
These individual risks can then be incorporated in assessments by a variety of approaches to
provide a systems-level view . While determining how people judge a risk is more complex a
common method for assigning quantitative values to risk is as follows:
Risk = Likelihood* Impact
In this simple formulation, risk can be thought of as the impact of an unwanted event multiplied
by the probability (or likelihood) of that event occurring. It is common to represent this impact
as a loss or a cost (e.g., financial impact), which can then be used to assess and compare events.
These individual risks can be aggregated to create system-level views of risk across a system,
and therefore can be used to assess when changes are made to the system (such as the addition
of IoT devices to a utility network).
Uncertainty is inherent to risk.
This uncertainty translates into a potential range of risk. Higher uncertainty means a larger range
of potential values.
By minimizing uncertainty, one can better understand risk. However, and not surprisingly, the
process of reducing uncertainty can be costly and involve a great deal of measurement, planning,
engineering, and testing.
Higher uncertainty as it relates to software can stem from a range of factors, such as poorly
written code, improper design assumptions, poorly defined requirements, and other unknown
factors.
With proper design, implementation, and testing, unwanted outcomes can be avoided, and
uncertainty can be reduced but not eliminated.
Vulnerabilities of the IoT
lack of software and security knowledge of the
manufacturer
lack of incentives for the manufacturer to adopt secure
methods
the common integration of poorly written publicly
available code (including core operating system code)
the inability to update these IoT systems
the inability to disable these systems
the lack of industry standards dictating levels of security
from a software perspective
the lack of information pertaining to the risk profile of each
device
Understanding IoT Risk
Utilities need to better understand the risk of adopting new IoT infrastructure. Major utilities
have vast experience assessing the operational risks associated with their industry and, as
such, have tools for estimating this risk and the means for managing it. It is now critical that
these utilities understand the impact and likelihood of risk from integrating the IoT into their
infrastructure.
The good news is that the existing risk-assessment methods are directly transferable; it is
simply that the scale and scope of the problem are more complex, and the threat and
vulnerability are more uncertain.
We can expect that both the impact and the likelihood factors of risk will increase, but it will
not be enough to simply assign a high-risk/high uncertainty value to an IoT device. It will be
necessary to understand the means and consequences of reducing the likelihood and impact
of potential harm.
Designing for IoT Resilience
Utilities need to design systems with appropriate redundancies, fail-safes, and isolation measures.
After incorporating IoT risk into assessment models, it follows that steps be taken to mitigate the
impact and likelihood of failures in a way that creates a resilient system.
The ultimate goal will be to design for autonomous operation (developing infrastructures that can
self-detect and defeat attacks or failures), but this is a long way off. In the meantime, utilities need
to design around the risk of any given IoT device failure.
Furthermore, future infrastructures will likely evolve beyond the stage of basic interdependencies
into a new “interwoven” set of vulnerabilities that combines the vulnerabilities affecting the IoT,
ICT, power systems, and a given utility.
The current system is a result of organic growth with IoT infrastructure more or less developing
organically and in silos, independent of the underlying infrastructure or system.
Establishing Software Security Levels
Ensuring Sufficient Processing And Storage To Use Robust Encryption To Prevent Data Leaks And Ensure
Confidentiality
Defining Approaches To Secure Supply Chain. Utilities Will Need To Require Their Vendors To Adopt Such
Standards.
Importance Of IOT Security
Depending on the application, a breach in an industrial internet of things environment could result in
risks ranging from leaking of important information that is critical to the way your business works or a
device is manufactured, to compromise of the product you produce or damage to your industrial controls.
Take a physical product, like bolts, for example. If a hacker gained access to the network for your bolt
manufacturing plant and changed the machine settings that controlled the strength of that bolt, it could
easily cause bolts to fail and your products to fall apart under stresses it should normally be able to
withstand.
That could mean a person dies when your product fails. While the risks vary depending upon how you
use IoT devices in your organization, the threat is real no matter the level of concern. Protecting your
organization, and the people who use your products should be paramount.
Risks associated with industrial IoT
The Industrial Internet of Things (IoT) has
seen significant advancements since we
first explored its risks in this blog post. As
technology continues to evolve, so do the
risks associated with IoT devices.
Device hijacking
Data siphoning
Denial of service attacks
Data breaches
Device theft
Man-in-the-Middle or Device “spoofing”
Conclusion
The IoT represents a conundrum for utility providers and policymakers. While the IoT could help
reduce operational expenses and aid in faster detection and recovery from faults, it also represents a
new and highly uncertain security risk.
Even if some of the risk of adoption can be transferred to the manufacturers of these devices and
systems, the utility is the entity that will be held accountable when a failure arises. While recognizing
the value of the IoT, utilities should learn about how to maintain or enhance the resilience of their
future IoT-based infrastructure.
This requires that they determine who should build and manage this infrastructure as well as determine
what design, operations, and management structures should be put in place. Ensuring resilience
necessitates utilities developing a process for assessing the risk associated with the integration of this
type of technology into these utilities and the subsequent design accounting for this risk.