Reader small image

You're reading from  Practical Industrial Internet of Things Security

Product typeBook
Published inJul 2018
PublisherPackt
ISBN-139781788832687
Edition1st Edition
Right arrow
Author (1)
Sravani Bhattacharjee
Sravani Bhattacharjee
author image
Sravani Bhattacharjee

Sravani Bhattacharjee was a technology leader at Cisco untill 2014, where she led the architectural planning and security evaluations of several enterprise cloud/datacenter solutions. She is currently the Principal of Irecamedia, where she collaborates with Industrial IoT innovators (incl. IBM, AT&T, Microsoft, and Intel) to strategize and create compelling whitepapers and a wide variety of editorial and technical marketing content that drives awareness and business decisions. She is a member of the IEEE IoT chapter, a writer, and a speaker. She is the Managing Editor of “The IoT Review”, a podcast and blogging platform on Industrial and Enterprise IoT (iot.irecamedia.com).
Read more about Sravani Bhattacharjee

Right arrow

IIoT endpoint vulnerabilities


Endpoint risk assessment and the implementation of security countermeasures require a thorough evaluation of the attack surfaces and attack vectors applicable to IIoT-specific use cases. Interested readers are encouraged to refer to the Industrial Internet Security Framework specification, which presents an elaborate analysis on "Security Threats and Vulnerabilities on Endpoints" (IIC-IISF). In this section, a few common threats and vulnerabilities associated with the various endpoint components are cited as examples:

lock icon
The rest of the page is locked
Previous PageNext Page
You have been reading a chapter from
Practical Industrial Internet of Things Security
Published in: Jul 2018Publisher: PacktISBN-13: 9781788832687

Author (1)

author image
Sravani Bhattacharjee

Sravani Bhattacharjee was a technology leader at Cisco untill 2014, where she led the architectural planning and security evaluations of several enterprise cloud/datacenter solutions. She is currently the Principal of Irecamedia, where she collaborates with Industrial IoT innovators (incl. IBM, AT&T, Microsoft, and Intel) to strategize and create compelling whitepapers and a wide variety of editorial and technical marketing content that drives awareness and business decisions. She is a member of the IEEE IoT chapter, a writer, and a speaker. She is the Managing Editor of “The IoT Review”, a podcast and blogging platform on Industrial and Enterprise IoT (iot.irecamedia.com).
Read more about Sravani Bhattacharjee

Endpoint component

Threats and Vulnerability

 

 

Hardware

  • Unauthorized seizure of system resources, such as memory, processing cycles, and privileged access modes (privilege escalation exploit)
  • Improper endpoint initialization by corrupting UEFI/BIOS and corrupting the boot process

 

 

 

Firmware

  • Steal code signing key or inject corrupted firmware through tampering
  • Exploit vulnerabilities in code signing and firmware update process
  • Rewrite firmware through...