Building a closed loop of industrial IoT security ecology is the key to testing and evaluation

People, data and machines constitute the key elements of the industrial Internet of Things. The close connection between the three devices opens the interconnection of equipment and equipment, equipment and people, further realizes the seamless connection between on-site production and user remote operation and maintenance management and coordinates data analysis. And action.

The deeper integration of the key elements of the Industrial Internet of Things has helped traditional industries to create greater value at a faster rate of development, as well as higher productivity and productivity. The impact of the extensive application of the Industrial Internet of Things is also two-sided. While improving industrial efficiency and promoting the development of social processes, the security risks caused by the complexity and uncertainty of the network are at the corner of “value”.

Complementing short board tamping safety testing and evaluation

Constructing a closed loop of industrial IoT security ecology Doing a good job in testing and evaluation is the key _ industrial Internet of Things, Internet of Things, intelligent manufacturing equipment

Building a closed loop of industrial IoT security ecology is the key to testing and evaluation

Industrial IoT needs to connect hundreds of millions of terminal industrial devices to the Internet, making the relatively closed industrial control network more and more open, opening up brings convenience and efficiency, and the number of vulnerabilities and exploits form effective attacks. The number is also rising. When an industrial device in an industrial IoT system is less secure, other industrial devices in the system are no longer safe, which creates a "short-board effect" in the security of industrial Internet of Things. The more “short boards”, the more secure the industrial Internet of Things that is closely related to the national economy and the people's livelihood.

To build a closed loop of industrial IoT security, we must first conduct safety testing and evaluation, and consolidate the safety testing and risk assessment of industrial IoT systems and equipment. If you do not carry out related tests, you will be able to operate with "sickness". On the one hand, it is easy to be exploited by attackers in the industrial Internet of Things to carry out intrusions and attacks. It will affect the normal use of certain functions of the operating system, and a large amount of private information such as core process parameters. There is a risk of being stolen, which in turn controls and destroys industrial equipment in critical infrastructure, causing enormous economic losses and casualties, and even threatens national security. On the other hand, if the whole safety construction plan is not tested, the design and construction of the safety protection plan cannot be effectively carried out. Safety testing and evaluation, such as the inspection and examination in the process of seeing a doctor, is an important basis for ensuring that the drug is removed from the disease.

In the "Network Security Law of the People's Republic of China" to be implemented on June 1, 2017, it is clearly stated that the state will be in important industries and fields such as public communication and information services, energy, transportation, water conservancy, finance, public services, and e-government. The critical information infrastructure is focused on protection and the assessment of the security and possible risks of critical information infrastructure.

Do not break the safety test to break through the traditional limitations

Then, can the existing testing methods or products be able to effectively and safely detect the systems and equipment in the industrial Internet of Things? From the point of view of the complexity of networks, systems and equipment in industrial Internet of Things, there are dozens of bus protocols and application layer protocols in industrial control networks, and the protocol implementation of these protocols is also different. In addition, the disclosure of industrial control systems and devices The vulnerability is limited, and the effectiveness of detection through vulnerability scanning needs to be improved. Specifically, the current methods for detecting security vulnerabilities in industrial IoT are relatively limited, as shown in:

1. Existing detection methods are only for peripheral servers and general IT equipment in the network, and cannot touch the core industrial equipment to be protected;

2. The existing port service scanning, vulnerability feature scanning and other technologies have greater reliance on the vulnerability library, but the open industrial control network security vulnerability database has few information, which makes it impossible to achieve in-depth and comprehensive detection;

3. Scanning techniques and mechanisms based on open vulnerabilities cannot effectively detect unknown vulnerabilities, and at the same time lag behind unknown vulnerabilities exploited by attackers in time;

4. Lack of targeted detection tools can not effectively prove the existence of potential vulnerabilities on industrial equipment.

Combined with the characteristics of the industrial Internet of Things, we recommend that the security detection of systems and devices in the Industrial Internet of Things, especially vulnerability detection, need to consider the following aspects:

1. With on-demand customization: targeted and customized inspection based on industrial equipment and systems, such as customization of different test cases according to different communication protocols and communication interfaces of the equipment;

2. Comprehensive vulnerability detection function: Since the known industrial control security vulnerabilities are limited, it is necessary to effectively detect potential vulnerabilities, such as fuzzy testing based on industrial control protocols to mine unknown vulnerabilities;

3. With strong scalability: Because the communication protocol and communication interface of industrial control equipment are different, the security detection products need to have strong scalability, which is convenient for the expansion of supported devices, protocols and interfaces;

4. It has strong ease of use: In the industrial Internet of Things, it is convenient to perform security detection on systems and equipment in the industrial Internet of Things without complicated deployment, and it is easy to operate and can generate and view test results in time.

Router

Wifi Router,Wireless Router,Mifi Device,LTE Hotspot

Shenhzhen Tongheng Weichuang Technology Co., Ltd , https://www.thwclte.com

Posted on