Article count:2305 Read by:3469961

Account Entry

Why Cybersecurity Is Hard to Understand

Latest update time:2018-12-28
    Reads:


Cybersecurity is not always easy to understand as it is an ever-changing and complex issue that is a consideration at every point in the lifecycle of a system or device. Security is a system solution and a system is only as secure as its weakest link. Today, there are a large number of cyber attacks, and as systems become more complex, so do the number of successful attacks.


There are many examples of weak links leading to system vulnerabilities.

  • In 2016, the car keys of the entire fleet were compromised because only four root keys had been used for the past 20 years;

  • In 2011, high-security identity tokens were stolen by accessing production artifacts created and stored on the factory floor;

  • In 2017, hackers infiltrated a car's operating system through a cellular link, allowing them to remotely update the operating system and rewrite programs;

  • The Heartbleed Open SSL buffer read vulnerability left 200,000 active servers and devices vulnerable and still unable to receive security updates;


Absolute security is never achieved, which further explains why cybersecurity is difficult to understand. As new vulnerabilities are discovered and hackers adopt new methods of attacking devices, devices and systems must be constantly updated to keep up with changing security requirements.




The changing landscape of cybersecurity and its complexity make this problem even more difficult to understand. The interaction of systems and devices presents a complex security problem that cannot be solved by any single solution. The solution requires a secure system architecture with a defense-in-depth approach. Past approaches, such as air-gapped systems, do not provide adequate protection in today's connected world, where physical access to devices can still be gained on the network. This problem needs to be addressed as early as possible in the design cycle so that security is designed in, with an architecture and lifecycle design that can address the changing and growing threats.


Reasons to implement network security at the edge

Cybersecurity has traditionally been considered an IT issue, requiring the implementation of good network protocols, operating system and application protocols, firewalls, malware protection, and other solutions designed to protect against cyberattacks. However, there is not always a unilateral agreement on what constitutes the edge. For network providers, the edge is usually considered to be a router, gateway, PC, tablet, or other device with advanced functionality. In the world of industrial automation, it might be a drive that controls a pump. In today's ever-changing environment, these edge devices are constantly changing to include more functionality and higher levels of connectivity. The risk assessment of the system is also changing. Some devices may not have previously required cybersecurity, but if appropriate measures are not taken to protect against risks, they may become the weakest link in the system.


Implementing cybersecurity at the edge provides users with greater confidence in their data. To achieve the highest levels of security, security must be designed in earlier in the signal chain. Ensuring that data has not been manipulated by validating the source signal provides greater confidence in decisions made based on that data. ADI is uniquely positioned to redefine the secure edge by leveraging existing solutions that bridge the physical and digital worlds.


Complexity is the enemy of cybersecurity. Just two to three coding errors in every 1,000 lines of code can provide a path for malicious exploitation of the system. Implementing cybersecurity at the point of lowest complexity provides an environment where security can be better ensured to be implemented correctly. Performing security operations within a secure boundary implemented by edge devices brings the chain of trust closer to the real world. In highly complex networks, organizations and individuals must continuously update applications and configurations to protect against the latest threats. At the device level, the coverage area of ​​security operations can be limited, making it easier to manage throughout the life cycle of the product.



By establishing trusted data early in the signal chain and implementing cybersecurity at the interface between the real and digital worlds, the highest level of security can be provided. With the convergence of IT and OT, cybersecurity is no longer just an IT network issue. Devices that have not been security-hardened in the past need to provide a root of trust in the data, and security features need to be applied based on the risk assessment and constraints of the system. Confirming identity and integrity at the edge can establish trust in the data earlier, providing greater confidence that the data is accurate. ADI is able to bring unique value to customers by redefining the secure edge and applying a hardware root of trust in the data.


Cybersecurity strategies adapted to the market

ADI is a leader in precision sensing, with a large market share in high-reliability devices used to make real-time decisions. ADI plays an important role in empowering our customers as they adapt to industry megatrends and strive to meet new demands for changing the way they interact with the real world. In addition to providing technology to push capabilities beyond what is possible, we are also working to solve the problems created by the derivative demands of these advances, with cybersecurity being a priority for us.


When we evaluate traditional markets, we see clear differences in how these markets view cybersecurity and the maturity of adopting security solutions. ADI has a strong portfolio of secure encryption solutions for the defense and government sectors. ADI gained cybersecurity expertise through the acquisition of Sypris Electronics. By leveraging this strong foundation in national-level encryption solutions, we are moving into adjacent markets that require high-reliability operations and driving cybersecurity solutions further to the edge, where ADI has historically provided precision sensing technology.


Cybersecurity technology applies to all markets, and ADI's strategy is to effectively evaluate the needs of each market and apply the appropriate cybersecurity solutions to achieve a secure device architecture consistent with the risk assessment of each application. It is easy to understand that meeting cybersecurity needs is more difficult in markets that must achieve high reliability operations and therefore have a more advanced cybersecurity landscape. Our main goal is to address the industrial market and develop solutions that can accelerate the adoption of Industry 4.0.


Likewise, the industrial market has seen a number of significant attacks. Some of the most significant have been nation-state-level, targeting critical infrastructure or targets that could cause lethal harm. These attacks are initiated through malware that infiltrates the system, often through physical access to a control unit or PLC connected to the factory network. With the advent of Industry 4.0, attack points will continue to expand further to the edge as traditional I/O devices begin to take on more control of operations and connect to PLCs via Ethernet or directly to the cloud. As capabilities on the network continue to expand and provide more functional connectivity, edge devices at a certain point that once had little chance of compromising the entire system now present a higher risk to the system. Due to the more sophisticated attacks in this market, the ability to properly implement cybersecurity technologies is particularly important to prevent overall system vulnerabilities. This implementation requires accurate threat assessments to understand potential attack points and layer security solutions to effectively provide security protection. For edge devices, establishing appropriate security boundaries and enabling hardware root of trust greatly enhances the system security posture.



ADI prioritizes cybersecurity strategy in the industrial market sector because it requires high-reliability operations, security has a significant impact in these environments, and there is a general trend for cybersecurity issues to move further to the edge, where ADI has a significant market share. By pushing cybersecurity to the edge, there will be opportunities to achieve more secure systems in these markets, which means ADI's products will contribute to the overall system design, thereby reducing the impact of threats. Our investment in new technologies is not only aimed at providing security to protect against current and future threats, but also making it easier for customers to achieve cybersecurity by solving the lifecycle challenges of product security and making it simpler for customers to integrate cybersecurity to the edge.


Latest articles about

 
EEWorld WeChat Subscription

 
EEWorld WeChat Service Number

 
AutoDevelopers

About Us Customer Service Contact Information Datasheet Sitemap LatestNews

Room 1530, Zhongguancun MOOC Times Building,Block B, 18 Zhongguancun Street, Haidian District,Beijing, China Tel:(010)82350740 Postcode:100190

Copyright © 2005-2024 EEWORLD.com.cn, Inc. All rights reserved 京ICP证060456号 京ICP备10001474号-1 电信业务审批[2006]字第258号函 京公网安备 11010802033920号