Skip to main content

2017 | OriginalPaper | Buchkapitel

10. Dealing with Security, Privacy, Access Control, and Compliance

verfasst von : Sudhi R. Sinha, Youngchoon Park

Erschienen in: Building an Effective IoT Ecosystem for Your Business

Verlag: Springer International Publishing

Aktivieren Sie unsere intelligente Suche, um passende Fachinhalte oder Patente zu finden.

search-config
loading …

Abstract

IoT has dramatically enlarged the playing field with devices and data. While this brings many benefits, it also creates significant exposure to security and privacy vulnerabilities. IoT amplifies the access points for data and control, which in turn amplifies the intrusion points [1–3]. While we continue to build defenses in devices and networks, we also have to deal with a huge population of legacy devices, applications, and networks where inbuilt protection was limited [4, 5]. The threats are becoming more persistent and the impact more profound, sometimes debilitating to businesses. The threats are equally high for consumer IoT businesses as well as industrial IoT businesses. History is riddled with many examples of security breaches with significant impact. The discovery of Stuxnet [6] in 2010, a small 500 kb worm that infected the software for 14 Iranian nuclear power plants brought a lot of focus to this subject. However, there are examples from before. The Slammer worm disabled the Davis-Besse nuclear power plant in 2003. We continue to hear stories about credit card and another personal information breach all the time. A 2014 SANS survey reported 7% more respondents indicate a breach of their environments [1].

Sie haben noch keine Lizenz? Dann Informieren Sie sich jetzt über unsere Produkte:

Springer Professional "Wirtschaft+Technik"

Online-Abonnement

Mit Springer Professional "Wirtschaft+Technik" erhalten Sie Zugriff auf:

  • über 102.000 Bücher
  • über 537 Zeitschriften

aus folgenden Fachgebieten:

  • Automobil + Motoren
  • Bauwesen + Immobilien
  • Business IT + Informatik
  • Elektrotechnik + Elektronik
  • Energie + Nachhaltigkeit
  • Finance + Banking
  • Management + Führung
  • Marketing + Vertrieb
  • Maschinenbau + Werkstoffe
  • Versicherung + Risiko

Jetzt Wissensvorsprung sichern!

Springer Professional "Technik"

Online-Abonnement

Mit Springer Professional "Technik" erhalten Sie Zugriff auf:

  • über 67.000 Bücher
  • über 390 Zeitschriften

aus folgenden Fachgebieten:

  • Automobil + Motoren
  • Bauwesen + Immobilien
  • Business IT + Informatik
  • Elektrotechnik + Elektronik
  • Energie + Nachhaltigkeit
  • Maschinenbau + Werkstoffe




 

Jetzt Wissensvorsprung sichern!

Springer Professional "Wirtschaft"

Online-Abonnement

Mit Springer Professional "Wirtschaft" erhalten Sie Zugriff auf:

  • über 67.000 Bücher
  • über 340 Zeitschriften

aus folgenden Fachgebieten:

  • Bauwesen + Immobilien
  • Business IT + Informatik
  • Finance + Banking
  • Management + Führung
  • Marketing + Vertrieb
  • Versicherung + Risiko




Jetzt Wissensvorsprung sichern!

Literatur
1.
Zurück zum Zitat Dave Shackleford, “A SANS survey”, October 2014. Dave Shackleford, “A SANS survey”, October 2014.
2.
Zurück zum Zitat Erika McCallister, Tim Grance and Karen Scarfone, National Institute of Standards and Technology (NIST), “SP 800-122 - Guide to Protecting the Confidentiality of Personally Identifiable Information (PII),” December 1990 – present. Erika McCallister, Tim Grance and Karen Scarfone, National Institute of Standards and Technology (NIST), “SP 800-122 - Guide to Protecting the Confidentiality of Personally Identifiable Information (PII),” December 1990 – present.
4.
Zurück zum Zitat International Society for Automation, “SA/IEC 62443 - Standards to Secure Your Industrial Control System.” International Society for Automation, “SA/IEC 62443 - Standards to Secure Your Industrial Control System.”
6.
Zurück zum Zitat Mark Clayton, “Stuxnet malware is ‘weapon’ out to destroy... Iran's Bushehr nuclear plant?,” 21 September 2010. Mark Clayton, “Stuxnet malware is ‘weapon’ out to destroy... Iran's Bushehr nuclear plant?,” 21 September 2010.
7.
Zurück zum Zitat Information Security Forum, Standard of Good Practice, “Security management system's usability key to easy adoption,” sourcesecurity.com, Retrieved 22 August 2013. Information Security Forum, Standard of Good Practice, “Security management system's usability key to easy adoption,” sourcesecurity.​com, Retrieved 22 August 2013.
8.
Zurück zum Zitat Mike Magee, John Lettice and Ross Alderson, “The Register,” 1994. Mike Magee, John Lettice and Ross Alderson, “The Register,” 1994.
9.
Zurück zum Zitat National Institute of Standards and Technology (NIST), “Framework for Improving Critical Infrastructure Cybersecurity,” https://www.nist.gov/sites/default/files/documents/cyberframe work/cybersecurity-framework-021214.pdf, Version 1.0, 12 February 2014. National Institute of Standards and Technology (NIST), “Framework for Improving Critical Infrastructure Cybersecurity,” https://​www.​nist.​gov/​sites/​default/​files/​documents/​cyberframe work/cybersecurity-framework-021214.pdf, Version 1.0, 12 February 2014.
10.
Zurück zum Zitat The Stanford Consortium and US National Security Agency, “Research on Information Security and Policy,” 1998. The Stanford Consortium and US National Security Agency, “Research on Information Security and Policy,” 1998.
11.
Zurück zum Zitat UK Government’s Department of Trade and Industry, BS 7799, “Information Security Management Systems - Specification with guidance for use,” part 2, 1999. UK Government’s Department of Trade and Industry, BS 7799, “Information Security Management Systems - Specification with guidance for use,” part 2, 1999.
12.
Zurück zum Zitat The International Organization for Standardization and The International Electrotechnical Commission, “ISO/IEC 27001:2013 - Information technology - Security techniques - Information security management systems – Requirements,” September 2013. The International Organization for Standardization and The International Electrotechnical Commission, “ISO/IEC 27001:2013 - Information technology - Security techniques - Information security management systems – Requirements,” September 2013.
13.
Zurück zum Zitat The International Organization for standardization, “ISO 15408–3.1:2008 - Information technology — Security techniques — Evaluation criteria for IT security - Part 3: Security assurance components,” 2008. The International Organization for standardization, “ISO 15408–3.1:2008 - Information technology — Security techniques — Evaluation criteria for IT security - Part 3: Security assurance components,” 2008.
14.
Zurück zum Zitat North American Electrical Reliability Corporation, “CIP 002–009” North American Electrical Reliability Corporation, “CIP 002–009”
15.
Zurück zum Zitat Craig Gentry, “Fully homomorphic encryption using ideal lattices,” 2009. Craig Gentry, “Fully homomorphic encryption using ideal lattices,” 2009.
16.
Zurück zum Zitat European Telecommunication Standards Institute, “TC CYBER,” 2014. European Telecommunication Standards Institute, “TC CYBER,” 2014.
17.
Zurück zum Zitat National Institute of Standards and Technology (NIST), “Advanced Encryption Standard (AES),” 2001. National Institute of Standards and Technology (NIST), “Advanced Encryption Standard (AES),” 2001.
18.
Zurück zum Zitat Ron Rivest, Adi Shamir, and Leonard Adleman, “RSA encryption algorithm,” 1977. Ron Rivest, Adi Shamir, and Leonard Adleman, “RSA encryption algorithm,” 1977.
20.
Zurück zum Zitat John Leyden, “PC virus celebrates 20th birthday,” 19 January 2006. Avoine, Gildas; Pascal Junod; Philippe Oechslin, “Computer system security: basic concepts and solved exercises. EFPL Press. p. 20. ISBN 978-1-4200-4620-5,” 2007. John Leyden, “PC virus celebrates 20th birthday,” 19 January 2006. Avoine, Gildas; Pascal Junod; Philippe Oechslin, “Computer system security: basic concepts and solved exercises. EFPL Press. p. 20. ISBN 978-1-4200-4620-5,” 2007.
21.
Zurück zum Zitat Nathaniel Popper, “Decoding the Enigma of Satoshi Nakamoto and the Birth of Bitcoin,” 15 May 2015. Nathaniel Popper, “Decoding the Enigma of Satoshi Nakamoto and the Birth of Bitcoin,” 15 May 2015.
Metadaten
Titel
Dealing with Security, Privacy, Access Control, and Compliance
verfasst von
Sudhi R. Sinha
Youngchoon Park
Copyright-Jahr
2017
DOI
https://doi.org/10.1007/978-3-319-57391-5_10