Free
Message: Internet of Things used to attack internet service...
This is a repost but important in light of the recent DDoS (Distributed Denial of Service) we experienced on Friday and is in the edig wheelhouse. Basically a hacker took control of static hosts and created a botnet (army of compromised static hosts or computer devices) to attack and flood routers with too much info to compute thus making them useless. Static host: describes newer types of nontraditional devices in the age of Internet of Things. They include handheld gaming systems, tv, smart devices that run on top of Google and Apple operating systems, heating and air conditioning controls, military weapons systems, embedded medical devices etc.. all connected to the internet. these hosts may or may not have traditional operating systems but they are likely to have a chip or firmware based operating systems called embedded operating systems. Static hosts aren't immune from requiring security since they permeate our lives and have access to our most sensitve information credit card info, physical address, location data etc. Mainframes are still used to process massive amounts of data and provide data analytics services to large organizations. What makes a mainframe fall into the static host category is its specialize use, embedded systems, and often unique hardware and operating environment requirements. They may use other network protocols in addition to TCP/IP which can create unique interoperability and security challenges. SCADA Supervisory Control and Data Acquisition is a newer buzzword in the security industry. SCADA systems are used in industrial applications such as utilities ( electric plants, sewage treatment centers, nuclear power plants, (water companies?)) HVAC controls also fall into this category and are often automated and connected to the internet or other networks to monitor and control environmental elements such as temp and humidity. ICS industrial Control Systems is also associated with SCADA. Only in recent years have SCADA has become an important issue in the information security world. These systems are being connected to the internet and often in an unprotected state. They run TCP/IP protocols and often embedded versions of some popular consumer operating systems such as Windows and Linux. This makes them prime targets for hackers. It is too hard to imagine a hacker attacking and gaining control of these systems and seriously affecting power, water, and other utilities and services on a massive scale. Wrappers are nothing more than a programming interface for different services that exist on the host which are translated to be compatible with other services on other hosts via networking protocols. Wrappers should be configured to allow minimum access possible from external interfaces, devices and protocols. Most users won't ever need to acces wrapper interfaces with embedded devices. An administrator or from a security perspective you may access these interfaces through different configuration methods for particular static or embedded hosts your working with. Read more from Mike Meyers Security+ Module 19 Static Hosts
Share
New Message
Please login to post a reply