Cyber Crime and Cyber Terrorism



Download 5,67 Mb.
Pdf ko'rish
bet31/283
Sana19.05.2022
Hajmi5,67 Mb.
#604880
1   ...   27   28   29   30   31   32   33   34   ...   283
Bog'liq
Cyber crime and cyber terrorism investigators handbook by Babak

27
 
Emerging threats
to remotely activate utility services to a property as that may endanger the safety of 
persons. A large-scale event therefore may take up to days to recover from.
 9.
Smart living: Smart appliances will be part of our homes soon. The smart fridge, 
dish washer, washing machine, and so on will start communicating with the 
smart grid and find the greenest or the cheapest time to use power and water. The 
even smart fridges will keep track of consumables and order supplies at the local 
super market. The design of such appliances, which have an expected lifetime of 
at least 15 years, do not take cyber security updates into account. Moore’s law, 
however, will cause an invalidation of any cryptographic protection mechanism 
in probably half of such a lifetime. With weak security, smart appliances may 
become a new distributed denial of service platform attacking either via ICT 
systems connected to the ICT layer, or the smart (power) grid. For example in 
the latter case an attack could provide false information to the grid on a massive 
scale about when how much power is required in a certain area. The question 
then remains how can we manage the security posture of millions of fridges, dish 
washers, and washing machines, including their update status, and their license 
to operate in the smart grid system? This becomes a cyber-security challenge 
equivalent to what 
Bijlsma et al. (2013)
 stated for the automotive sector.
 10.
All sectors: Smart (energy) Grids and Smart Cities require the cooperation 
of a large number of stakeholders who connect their mostly physical services 
though a management layer with its large ICT base. Risk management across 
a chain of organizations is a problem, especially because it is often vague 
who is responsible for them. Making the chain (cyber) resilient is an even 
larger challenge. But, at the higher level on information exchanges between 
organizations, the earlier identified cyber security lessons are not applied. 
Lacking validation of information acquired from another organization and 
verifying it was allowed and expected values may cause decisions to be 
taken with major consequences. Criminals may take advantage of such weak 
interfaces, e.g., by careful crafting of service price jumps.
 11.
Health and care sector: After a slow start, fixed position robots are applied in 
flexible industries such as the automotive sector. Currently, a first-generation 
mobile robot is on the market. A fast innovation cycle is expected as these 
robots are expected to become part of the workforce in hospitals and homes 
for elderly people. They will provide flexible services at lower costs and fill 
the current gaps in the availability of nurses and people providing personal 
care. The pressure to provide robots to the market may cause a main focus 
to be on safety aspects while cyber security aspects are overlooked. It can be 
predicted from the earlier identified cyber security lessons that cyber security 
failures will occur in the protection of communication channels between the 
robot and the main controlling station in validating commands to the robot. 
Who is liable when due to a cyber-attack a robot provides the wrong medicine 
or shakes up a bed with person enwrapped in plaster? Moreover, robots will 
be managed by a department which is likely to be unconsciously insecure. 



Download 5,67 Mb.

Do'stlaringiz bilan baham:
1   ...   27   28   29   30   31   32   33   34   ...   283




Ma'lumotlar bazasi mualliflik huquqi bilan himoyalangan ©hozir.org 2024
ma'muriyatiga murojaat qiling

kiriting | ro'yxatdan o'tish
    Bosh sahifa
юртда тантана
Боғда битган
Бугун юртда
Эшитганлар жилманглар
Эшитмадим деманглар
битган бодомлар
Yangiariq tumani
qitish marakazi
Raqamli texnologiyalar
ilishida muhokamadan
tasdiqqa tavsiya
tavsiya etilgan
iqtisodiyot kafedrasi
steiermarkischen landesregierung
asarlaringizni yuboring
o'zingizning asarlaringizni
Iltimos faqat
faqat o'zingizning
steierm rkischen
landesregierung fachabteilung
rkischen landesregierung
hamshira loyihasi
loyihasi mavsum
faolyatining oqibatlari
asosiy adabiyotlar
fakulteti ahborot
ahborot havfsizligi
havfsizligi kafedrasi
fanidan bo’yicha
fakulteti iqtisodiyot
boshqaruv fakulteti
chiqarishda boshqaruv
ishlab chiqarishda
iqtisodiyot fakultet
multiservis tarmoqlari
fanidan asosiy
Uzbek fanidan
mavzulari potok
asosidagi multiservis
'aliyyil a'ziym
billahil 'aliyyil
illaa billahil
quvvata illaa
falah' deganida
Kompyuter savodxonligi
bo’yicha mustaqil
'alal falah'
Hayya 'alal
'alas soloh
Hayya 'alas
mavsum boyicha


yuklab olish