Welcome!

@ThingsExpo Authors: Elizabeth White, Zakia Bouachraoui, Liz McMillan, Pat Romanski, Yeshim Deniz

Related Topics: @ThingsExpo, @CloudExpo, Cloud Security, @DXWorldExpo

@ThingsExpo: Blog Post

Internet of Things and Cyber-Sabotage By @JamesCarlini | @ThingsExpo [#IoT]

Too many top executives and futurists are giddy about what the future holds with the Internet of Things

Corporate Cyber-Sabotage: The Six-Phased Enterprise Assessment Framework

When the Tsunami of system failures paralyzes your organization from a coordinated cyber-attack, it's too late for the CEO to think your organization can "get through this event." It's too late.

Too many top executives and futurists are giddy about what the future holds with the "Internet of Things" and the growth of technology-based applications cutting across many, if not all, industries. Few are talking about reinforcing corporate systems as well as hardening facilities and mission critical applications to withstand cyber-sabotage and EMP attacks because few, if any, are even qualified to assess that area of their enterprise (see Intelligent Infrastructure Destruction: Cyber Attacks).

Many still talk about having "Disaster Recovery" plans. That isn't good enough in the era of 21st century intelligent infrastructure. The design concept should be to develop systems that support a strategic direction of "Business Continuity" and sustainability, not disaster recovery.

In some cases, you cannot afford to be down for an hour or two, let alone a day or two. Your competition will swallow your business while you try to determine how to re-instate your systems into an operational mode.

What kind of attacks can be launched? Everyone always focuses on the stealing of credit card numbers from retailers or critical (and sensitive) information from healthcare providers, but the reality is cyber-attacks can span more than just customer record information. Plus, the credit card breaches are still going on and are successful, so many organizations have yet to establish real barriers to protect systems from outside attacks.

Besides cyber-attacks, EMP (Electro-Magnetic Pulse) attacks can also shut down everything electronic.

Attacking the Intelligent Infrastructure of an Organization
If I was a cyber-criminal engaging in corporate cyber-sabotage, I would look beyond what is being protected today. What industries and mission-critical systems would I target? When you start to think of it, there are a lot of potential targets still not hardened. Are yours? (See Chart 1- Potential Industrial Targets.)

With more organizations getting hit with cyber-attacks, the focus of improvement should not be at the technical level. The focus of improvement should be at a more encompassing approach covering all levels of an organization including its executive vision, its strategic direction, its processes, and the platform of technologies (systems and services) it has in-place to support those processes and achieve its strategic objectives.

Chart 1 - Potential Industrial Targets

Industry

Systems Target

Desired Result

Automotive

Robotic systems on the Assembly line. Distribution and logistics systems. R&D systems.

Complete stopping of the Assembly Line. Complete lock up of any distribution of parts and finished product. (Apply this to any manufacturing process)

Pharmaceutical

Again, Manufacturing systems. Recipes for all drugs and their derivatives. Research & Development systems.

Complete lock up of any distribution of product. Complete destruction of R&D results. Secondary result - the resulting damage and freezing of Healthcare Industry.

Power

Power Grid (Distribution). Power Stations. Management Systems (All video cameras overseeing operations and facilities.)

Complete system failure for the power company. Secondary result - the complete stoppage of any outside entity dependent on power.

Source: James Carlini

As you can see, the above attacks are much more sophisticated than lifting credit card information. Corporate cyber-sabotage focuses more on stopping the organization in its tracks: cutting off production, ruining Intellectual Property (IP), and freezing up logistics and distribution of products as well as energy.

Remember the Three Rs for Your Enterprise
Many organizations are still in a primitive mode when it comes to backing-up mission-critical applications. With mission-critical applications in organizations growing from "one out of three" to "one out of two" in many areas, the need to take a broader and more strategic view on the Three Rs (Reliability, Redundancy and Resiliency) of the enterprise is critical.

The assessment of the Enterprise's Intelligent Infrastructure as well as its strategic policies and procedures needs to be performed in this era of increasing cyber-attacks. The Enterprise Assessment Framework provides a more structured view of what has to happen in a multi-phased approach to building stronger, more resilient intelligent infrastructure that can withstand cyber-sabotage (see Chart 2).

Chart 2 - Enterprise Assessment Framework

Phase

Action

Process

Results

1

Analysis Of Current Environment

Multi-level, multi-enterprise element (people, systems, procedures & processes) review.

Vision of current topology and physical attributes of systems and facilities.

2

Identifying Major Issues

Multi-dimensional assessment tool covering both manual and automated processes.

Uncovering single points-of-failure, incomplete applications, other inconsistencies.

3

Assessment

Multi-dimensional Proprietary Tool.

Quantifying Issues and Concerns as well as the revealing of potential weak points.

4

Recommended Changes & Upgrades

Presentation of Improvements. Report.

List of prioritized improvements and upgrades.

5

Implementation Of Changes

Adding and/or modifying procedures, systems, and practices in a prioritized approach.

Added capabilities, shoring up weak areas, and eradicating single points-of-failure.

6

Post-Implementation Review

Review of the new in-place systems, processes and procedures.

Assessment of what has worked and what needs further improvement.

Source: James Carlini

Copyright 2014 - James Carlini

Location Location Connectivity by James Carlini is available Amazon and Barnes & Noble.

More Stories By James Carlini

James Carlini, MBA, a certified Infrastructure Consultant, keynote speaker and former award-winning Adjunct Professor at Northwestern University, has advised on mission-critical networks. Clients include the Chicago Mercantile Exchange, GLOBEX, and City of Chicago’s 911 Center. An expert witness in civil and federal courts on network infrastructure, he has worked with AT&T, Sprint and others.

Follow daily Carlini-isms at www.twitter.com/JAMESCARLINI

Comments (0)

Share your thoughts on this story.

Add your comment
You must be signed in to add a comment. Sign-in | Register

In accordance with our Comment Policy, we encourage comments that are on topic, relevant and to-the-point. We will remove comments that include profanity, personal attacks, racial slurs, threats of violence, or other inappropriate material that violates our Terms and Conditions, and will block users who make repeated violations. We ask all readers to expect diversity of opinion and to treat one another with dignity and respect.


IoT & Smart Cities Stories
The platform combines the strengths of Singtel's extensive, intelligent network capabilities with Microsoft's cloud expertise to create a unique solution that sets new standards for IoT applications," said Mr Diomedes Kastanis, Head of IoT at Singtel. "Our solution provides speed, transparency and flexibility, paving the way for a more pervasive use of IoT to accelerate enterprises' digitalisation efforts. AI-powered intelligent connectivity over Microsoft Azure will be the fastest connected pat...
There are many examples of disruption in consumer space – Uber disrupting the cab industry, Airbnb disrupting the hospitality industry and so on; but have you wondered who is disrupting support and operations? AISERA helps make businesses and customers successful by offering consumer-like user experience for support and operations. We have built the world’s first AI-driven IT / HR / Cloud / Customer Support and Operations solution.
Codete accelerates their clients growth through technological expertise and experience. Codite team works with organizations to meet the challenges that digitalization presents. Their clients include digital start-ups as well as established enterprises in the IT industry. To stay competitive in a highly innovative IT industry, strong R&D departments and bold spin-off initiatives is a must. Codete Data Science and Software Architects teams help corporate clients to stay up to date with the mod...
At CloudEXPO Silicon Valley, June 24-26, 2019, Digital Transformation (DX) is a major focus with expanded DevOpsSUMMIT and FinTechEXPO programs within the DXWorldEXPO agenda. Successful transformation requires a laser focus on being data-driven and on using all the tools available that enable transformation if they plan to survive over the long term. A total of 88% of Fortune 500 companies from a generation ago are now out of business. Only 12% still survive. Similar percentages are found throug...
Druva is the global leader in Cloud Data Protection and Management, delivering the industry's first data management-as-a-service solution that aggregates data from endpoints, servers and cloud applications and leverages the public cloud to offer a single pane of glass to enable data protection, governance and intelligence-dramatically increasing the availability and visibility of business critical information, while reducing the risk, cost and complexity of managing and protecting it. Druva's...
BMC has unmatched experience in IT management, supporting 92 of the Forbes Global 100, and earning recognition as an ITSM Gartner Magic Quadrant Leader for five years running. Our solutions offer speed, agility, and efficiency to tackle business challenges in the areas of service management, automation, operations, and the mainframe.
The Jevons Paradox suggests that when technological advances increase efficiency of a resource, it results in an overall increase in consumption. Writing on the increased use of coal as a result of technological improvements, 19th-century economist William Stanley Jevons found that these improvements led to the development of new ways to utilize coal. In his session at 19th Cloud Expo, Mark Thiele, Chief Strategy Officer for Apcera, compared the Jevons Paradox to modern-day enterprise IT, examin...
With 10 simultaneous tracks, keynotes, general sessions and targeted breakout classes, @CloudEXPO and DXWorldEXPO are two of the most important technology events of the year. Since its launch over eight years ago, @CloudEXPO and DXWorldEXPO have presented a rock star faculty as well as showcased hundreds of sponsors and exhibitors! In this blog post, we provide 7 tips on how, as part of our world-class faculty, you can deliver one of the most popular sessions at our events. But before reading...
DSR is a supplier of project management, consultancy services and IT solutions that increase effectiveness of a company's operations in the production sector. The company combines in-depth knowledge of international companies with expert knowledge utilising IT tools that support manufacturing and distribution processes. DSR ensures optimization and integration of internal processes which is necessary for companies to grow rapidly. The rapid growth is possible thanks, to specialized services an...
At CloudEXPO Silicon Valley, June 24-26, 2019, Digital Transformation (DX) is a major focus with expanded DevOpsSUMMIT and FinTechEXPO programs within the DXWorldEXPO agenda. Successful transformation requires a laser focus on being data-driven and on using all the tools available that enable transformation if they plan to survive over the long term. A total of 88% of Fortune 500 companies from a generation ago are now out of business. Only 12% still survive. Similar percentages are found throug...