27
Emerging threats
to remotely activate utility services to a property as that may endanger the safety of
persons. A large-scale event therefore may take up to days to recover from.
9.
Smart living: Smart appliances will be part of our homes soon. The smart fridge,
dish washer, washing machine, and so on will start communicating with the
smart grid and find the greenest or the cheapest time to use power and water. The
even smart fridges will keep track of consumables and order supplies at the local
super market. The design of such appliances, which have an expected lifetime of
at least 15 years, do not take cyber security updates into account. Moore’s law,
however, will cause an invalidation of any cryptographic protection mechanism
in probably half of such a lifetime. With weak security, smart appliances may
become a new distributed denial of service platform attacking either via ICT
systems connected to the ICT layer, or the smart (power) grid. For example in
the latter case an attack could provide false information to the grid on a massive
scale about when how much power is required in a certain area. The question
then remains how can we manage the security posture of millions of fridges, dish
washers, and washing machines, including their update status, and their license
to operate in the smart grid system? This becomes a cyber-security challenge
equivalent to what
Bijlsma et al. (2013)
stated for the automotive sector.
10.
All sectors: Smart (energy) Grids and Smart Cities require the cooperation
of a large number of stakeholders who connect their mostly physical services
though a management layer with its large ICT base. Risk management across
a chain of organizations is a problem, especially because it is often vague
who is responsible for them. Making the chain (cyber) resilient is an even
larger challenge. But, at the higher level on information exchanges between
organizations, the earlier identified cyber security lessons are not applied.
Lacking validation of information acquired from another organization and
verifying it was allowed and expected values may cause decisions to be
taken with major consequences. Criminals may take advantage of such weak
interfaces, e.g., by careful crafting of service price jumps.
11.
Health and care sector: After a slow start, fixed position robots are applied in
flexible industries such as the automotive sector. Currently, a first-generation
mobile robot is on the market. A fast innovation cycle is expected as these
robots are expected to become part of the workforce in hospitals and homes
for elderly people. They will provide flexible services at lower costs and fill
the current gaps in the availability of nurses and people providing personal
care. The pressure to provide robots to the market may cause a main focus
to be on safety aspects while cyber security aspects are overlooked. It can be
predicted from the earlier identified cyber security lessons that cyber security
failures will occur in the protection of communication channels between the
robot and the main controlling station in validating commands to the robot.
Who is liable when due to a cyber-attack a robot provides the wrong medicine
or shakes up a bed with person enwrapped in plaster? Moreover, robots will
be managed by a department which is likely to be unconsciously insecure.
Do'stlaringiz bilan baham: |