Unit 5 ICS
Unit 5 ICS
Advantages of IoT:
1. Improved efficiency and automation of tasks.
2. Increased convenience and accessibility of information.
3. Better monitoring and control of devices and systems.
4. Greater ability to gather and analyze data.
5. Improved decision-making.
6. Cost savings.
7. Technology Optimization
8. Reduced Waste
9. Enhanced Data Collection
Que. Explain 4 pillars of IOT & how they are interconnected with each
other
Four Pillars of IoT
1. M2M: The Internet of Devices • Machine to machine refers to direct communication between
devices using any communications channel, including wired and wireless. Machine to machine
communication can include industrial instrumentation, enabling a sensor or meter to communicate the data it
records (such as temperature, inventory level, etc.) to application software that can use it. • Most of the
M2M market research reports assume M2M modules are simply just cellular modules.
Application Areas for Cellular M2M, p. 67 • There is overlap between M2M and the consumer electronics
applications. The consumer electronics offerings include the following: • Personal navigation devices •
eReaders • Digital picture frames • People-tracking devices • Pet-tracking devices • Home security monitors
• Personal medical devices Four Pillars of IoT
The typical architecture of an M2M system from BiTX. • Service S N 7 Asset-specific protocol 6 M2M
communication protocol N S Network adapter Gateway Manager Four Pillars of IoT
2. RFID: The Internet of Objects An RFID tag is a simplified, low-cost, disposable contactless
smartcard. RFID tags include a chip that stores a static number (ID) and attributes of the tagged object and
an antenna that enables the chip to transmit the store number to a reader. • An RFID system involves
hardware known as readers and tags, as well as RFID software or RFID middleware. Four Pillars of IoT
3. WSN is more for sensing and information-collecting purposes. Other networks include body sensor
network (BSN), visual or video sensor network (VSN), vehicular sensor networks, underwater (acoustic)
sensor networks, interplanetary sensor networks, fieldbus networks, and others. • The extended scope of
WSN is the USN, or ubiquitous sensor network, a network of intelligent sensors that could one day become
ubiquitous. Four Pillars of IoT
The architecture of a typical sensor network • Sensor node: sense target events, gather sensor readings,
manipulate information, send them to gateway via radio link • Base station/sink: communicate with sensor
nodes and user/operator • Operator/user: task manager, send query • Routing and energy saving are required.
Four Pillars of IoT
WSNs are meant to be deployed in large numbers in various environments, including remote and hostile
regions, with ad hoc communications as key. • For this reasons, algorithms and protocols need to address the
following issues. • Lifetime maximization • Robustness and fault tolerance • Self-configuration •
Middleware for WSN, the middle-level primitive between the software and the hardware, can help bridge
the gap and remove impediments. Four Pillars of IoT
Context-aware system based on WSN • Mobile sensor networks (MSNs) are WSNs in which nodes can
move under own control or under the control of the environment. Four Pillars of IoT
Approaches IoT
Organizations across all industries are identifying ways to benefit from the Internet of Things. However,
building an IoT solution not only requires various components, but also a very diverse set of skills
The good news is, that selecting the right tools and technologies can help expedite the process. I wrote about
different approaches to making IoT solution development more efficient.
The scope and requirements of an IoT solution regularly change as organizations are increasingly integrating
IoT into their business. Being able to efficiently evolve an IoT solution these changing requirements will
ultimately define the solution’s usefulness and value in the future. Therefore, picking an IoT technology that is
designed to easily integrate 3rd party systems and products as well as extend the functionality with additional
components at any time will enable organizations to not only meet the requirements of their current use case, but
also to scale in future projects as well.
IoT security can become an afterthought as IoT connectivity options expand to accommodate more devices and reach
more places. However, it’s crucial to remember that while technology gets smarter, so do cyber security
attacks. Some examples of cellular IoT attacks that need to be prevented are DDoS (distributed denial of service), fake
cell towers, location tracking, and SMS phishing.
These attacks cannot be prevented using outdated hardware and security tools.
IoT devices continuously generate and transmit data to a central location, so much vital data passes through the
network. Collecting and managing IoT data well is key to monitoring and managing remote systems in real-time. For
example, network congestion can be the bane of an IoT network.
Technologies like AI, machine learning, and computer vision can be used to extract and analyze IoT
data. Companies can then use this data to optimize and automate processes, perform predictive maintenance, automate
routing, and schedule security improvements.
4. Finding compatible technology that perfectly integrates with your IoT solution
Along the way while developing your IoT solution, you will eventually have to decide which technologies to
integrate into your solution. While cost and functionality are deciding factors that come to mind immediately,
you might also want to think about whether the technologies you are planning to use have been tested to work
with the IoT platform you are using and how easily they can be integrated.
5. Taking IoT technology for a test drive before making any purchase decisions
When adopting an IoT strategy, users typically have not had many opportunities to gain experience with any of
the IoT technology on the market. Before making any purchase decisions, you should try to get a real feel for
the IoT technology you are planning to purchase. Some technology vendors offer developer zones that give both novice
and experienced users a guided tutorial of the different aspects of the technology.
Definition of IoT Security
IoT security is based on a cybersecurity strategy to protect IoT devices and the vulnerable networks
they connect to from cyber attacks. IoT devices have no built-in security. IoT security is needed to
help prevent data breaches because IoT devices transfer data over the internet unencrypted and
operate undetected by standard cybersecurity systems.
Unfortunately, there is no way to install security software on most IoT devices. IoT devices may even
ship with malware on them that infects the network when they connect. This is why network security
is a priority for IoT security.
Often, these devices have security issues that make them vulnerable to attack and place the rest of the
organization at risk. For example, cyber threat actors commonly target unprotected printers, smart
lighting, IP cameras, and other networked devices to gain access to an organization’s network. From
there, they can move laterally through the network to access more critical devices and sensitive data
and create ransomware and/or double extortion cyberattacks that can render a business’ network
useless.
Securing the company against cyber threats requires securing all devices connected to the corporate
network. IoT security is a vital component of a corporate cybersecurity strategy because it limits the
risks posed by these insecure, networked devices.
IoT security solutions can be implemented by both device customers and manufacturers. The three
types oF IoT security include:
Network Security: Users need to protect their devices against unauthorized access and potential
exploitation. IoT network security implements a zero-trust security strategy to minimize the corporate
attack surface.
Credential security :IoT device admin credentials should be updated if possible. It is best to avoid
reusing credentials across multiple devices and applications — each device should have a unique
password. This helps prevent credential-based attacks.
Device authentication: IoT devices connect to each other, to servers, and to various other
networked devices. Every connected device needs to be authenticated to ensure they do not accept
inputs or requests from unauthorized parties.For example, an attacker could pretend to be an IoT
device and request confidential data from a server, but if the server first requires them to present an
authentic TLS certificate (more on this concept below), then this attack will not be successful.For the
most part, this type of authentication needs to be configured by the device manufacturer.
Encryption: IoT device data exchanges are vulnerable to external parties and on-path attackers as
they pass over the network — unless encryption is used to protect the data. Think of encryption as
being like an envelope that protects a letter's contents as it travels through the postal
service.Encryption must be combined with authentication to fully prevent on-path attacks. Otherwise,
the attacker could set up separate encrypted connections between one IoT device and another, and
neither would be aware that their communications are being intercepted.
Turning off unneeded features:Most IoT devices come with multiple features, some of which
may go unused by the owner. But even when features are not used, they may keep
additional ports open on the device in case of use. The more ports an Internet-connected device leaves
open, the greater the attack surface — often attackers simply ping different ports on a device, looking
for an opening. Turning off unnecessary device features will close these extra ports.
DNS filtering: DNS filtering is the process of using the Domain Name System to block
malicious websites. Adding DNS filtering as a security measure to a network with IoT
devices prevents those devices from reaching out to places on the Internet they should not
(i.e. an attacker's domain).
The following IoT security challenges continue to threaten the financial safety of both individuals and
organizations:
Remote exposure: Unlike other technologies, IoT devices have a particularly large attack
surface due to their internet-supported connectivity. While this accessibility is extremely
valuable, it also gives hackers the opportunity to interact with devices remotely. This is why
hacking campaigns, such as phishing, are particularly effective..
Weak default passwords: IoT devices often come with weak passwords, and most consumers
might not be aware that they need to be replaced with more secure ones. If default passwords aren't
changed on IoT devices, it can leave them vulnerable to brute-force and other hacking attacks.
Multiple connected devices: Most households today have multiple interconnected devices. The
drawback of this convenience is that, if one device fails due to a security misconfiguration, the rest of
the connected devices in the same household go down as well.
Lack of encryption: Most network traffic originating from IoT devices is unencrypted, which
increases the possibility of security threats and data breaches. These threats can be avoided by
ensuring all the devices are secured and encrypted
For example, in 2022, millions of Buetooth digital locks in smart cars could be remotely unlocked by
hackers exploiting a vulnerability in Bluetooth technology. As well, protocols like HTTP (Hypertext
Transfer Protocol) and API-are channels that IoT devices rely on and cyber criminals can exploit.
Instead of buying and maintaining computer products and services, you can pay to use a cloud
computing service. It saves you the time, effort, and cost of doing it all by yourself!
Simply put, cloud computing is the delivery of computing services—including servers, storage,
databases, networking, software, analytics, and intelligence—over the Internet (“the cloud”) to offer
faster innovation, flexible resources, and economies of scale.
Why would you not want to have your own computers, servers, staffers, and offices to run a
company? Cloud computing allows you to accomplish a lot more with a lot less!
Cloud services are on-demand, which means you can access the service anywhere and anytime. It isn't
limited by space or size.
2. It's cheaper
You don't need to purchase computers, rent office space or hire staff. Various models of cloud
services offer one or all of those options. This could mean huge savings as you only pay for what you
want.
3. It's flexible
Since you only pay for what you want and what you want is accessible anywhere, you can increase or
decrease the scope of your projects or the intensity of your work as needed.
Ex.
Amazon Web Services (AWS)
Google Cloud Platform (GCP)
Microsoft Azure
Benefits of cloud computing
Cloud computing is a big shift from the traditional way businesses think about IT resources. Here are
seven common reasons organizations are turning to cloud computing services:
Cost
Moving to the cloud helps companies optimize IT costs. This is because cloud computing
eliminates the capital expense of buying hardware and software and setting up and running
onsite datacenters—the racks of servers, the round-the-clock electricity for power and
cooling, and the IT experts for managing the infrastructure. It adds up fast.
Speed
Most cloud computing services are provided self service and on demand, so even vast
amounts of computing resources can be provisioned in minutes, typically with just a few
mouse clicks, giving businesses a lot of flexibility and taking the pressure off capacity
planning.
Global scale
The benefits of cloud computing services include the ability to scale elastically. In cloud
speak, that means delivering the right amount of IT resources—for example, more or less
computing power, storage, bandwidth—right when they’re needed, and from the
right geographic location.
Productivity
Onsite datacenters typically require a lot of “racking and stacking”—hardware setup, software
patching, and other time-consuming IT management chores. Cloud computing removes the
need for many of these tasks, so IT teams can spend time on achieving more important
business goals.
Performance
The biggest cloud computing services run on a worldwide network of secure datacenters,
which are regularly upgraded to the latest generation of fast and efficient computing
hardware. This offers several benefits over a single corporate datacenter, including reduced
network latency for applications and greater economies of scale.
Reliability
Cloud computing makes data backup, disaster recovery, and business continuity easier and
less expensive because data can be mirrored at multiple redundant sites on the cloud
provider’s network.
Security
Many cloud providers offer a broad set of policies, technologies, and controls that strengthen
your security posture overall, helping protect your data, apps, and infrastructure from
potential threats.
These resources might be accessible for free, or access might be sold according to
subscription-based or pay-per-usage pricing models.
The public cloud provider owns, manages, and assumes all responsibility for the data centers,
hardware, and infrastructure on which its customers’ workloads run, and it typically provides high-
bandwidth network connectivity to ensure high performance and rapid access to applications and data.
Public cloud is a multi-tenant environment—the cloud provider's data center infrastructure is shared
by all public cloud customers. In the leading public clouds—Amazon Web Services (AWS), Google
Cloud, IBM Cloud, Microsoft Azure, and Oracle Cloud—those customers can number in the millions.
Many enterprises are moving portions of their computing infrastructure to the public cloud because
public cloud services are elastic and readily scalable, flexibly adjusting to meet changing workload
demands. Others are attracted by the promise of greater efficiency and fewer wasted resources since
customers pay only for what they use. Still others seek to reduce spending on hardware and on-
premises infrastructures.
Private cloud
A private cloud refers to cloud computing resources used exclusively by a single business or
organization. accessible by, one customer only. A private cloud can be physically located on the
company’s onsite datacenter. Some companies also pay third-party service providers to host their
private cloud. A private cloud is one in which the services and infrastructure are maintained on a
private network.
benefits of private cloud computing—including elasticity, scalability, and ease of service delivery—
with the access control, security, and resource customization of on-premises infrastructure.
Many companies choose private cloud over public cloud because private cloud is an easier way (or
the only way) to meet their regulatory compliance requirements. Others choose private cloud because
their workloads deal with confidential documents, intellectual property, personally identifiable
information (PII), medical records, financial data, or other sensitive data.
By building private cloud architecture according to cloud native principles, an organization gives
itself the flexibility to easily move workloads to public cloud or run them within a hybrid cloud (see
below) environment whenever they’re ready.
Hybrid cloud
Hybrid clouds combine public and private clouds, bound together by technology that allows data and
applications to be shared between them. By allowing data and applications to move between private
and public clouds, a hybrid cloud gives your business greater flexibility and more deployment options
and helps optimize your existing infrastructure, security, and compliance.
Hybrid cloud is just combination of public and private cloud environments. Specifically, and ideally, a
hybrid cloud connects an organization's private cloud services and public clouds into a single, flexible
infrastructure for running the organization’s applications and workloads.
The goal of hybrid cloud is to establish a mix of public and private cloud resources—and with a level
of orchestration between them—that gives an organization the flexibility to choose the optimal cloud
for each application or workload and to move workloads freely between the two clouds as
circumstances change. This enables the organization to meet its technical and business objectives
more effectively and cost-efficiently than it could with public or private cloud alone.
IaaS
The most basic category of cloud computing services. With infrastructure as a service (IaaS), you rent
IT infrastructure—servers and virtual machines (VMs), storage, networks, operating systems—from a
cloud provider on a pay-as-you-go basis.
PaaS
Platform as a service (PaaS) refers to cloud computing services that supply an on-demand
environment for developing, testing, delivering, and managing software applications. PaaS is designed
to make it easier for developers to quickly create web or mobile apps, without worrying about setting
up or managing the underlying infrastructure of servers, storage, network, and databases needed for
development.
SaaS
Software as a service (SaaS) is a method for delivering software applications over the internet, on
demand and typically on a subscription basis. With SaaS, cloud providers host and manage the
software application and underlying infrastructure, and handle any maintenance, like software
upgrades and security patching. Users connect to the application over the internet, usually with a web
browser on their phone, tablet, or PC.
Serverless computing
Overlapping with PaaS, serverless computing focuses on building app functionality without spending
time continually managing the servers and infrastructure required to do so. The cloud provider
handles the setup, capacity planning, and server management for you. Serverless architectures are
highly scalable and event-driven, only using resources when a specific function or trigger occurs.
we must evaluate what logs the forensics investigator needs in order to find our who was
behind the attack. A means of systematically gathering digital evidence, analyzing it to make
credible evidence, authentically presenting it to the court of law.
Cloud forensics refers to the use of forensic techniques to investigate cloud environments.
When unlawful or criminal behavior has occurred using the cloud as a medium, cloud
forensics experts use their skills and knowledge to detect the individuals or groups
responsible. Cloud forensics encompasses users of the cloud, both victims and perpetrators.
For example, a company using cloud servers might be the victim of a data breach or denial of
the service incident. Criminals themselves might also use the cloud to launch an attack.
A cloud server is easier to replace and keep services running while you investigate
Cloud computing brings opportunities for network forensics tracing Internet criminals in the
distributed environment. We may use the new “pay-as-you-go” model of the cloud computing to
deploy the on-demand cyber surveillance sentinels and conduct distributed trace back in complicated
cyber crime scene investigations. To trace criminals abusing anonymous communication networks
such as Tor, law enforcement can deploy high-bandwidth Amazon EC2 sentinels into the Tor network.
Some sentinels are configured as Tor entry guards and others work as Tor exits nodes. With the high
bandwidth and appropriate number of such sentinels, we can achieve a required probability that a Tor
circuit passes through an entry sentinel and an exit sentinel in order to capture the suspects. The
proposed “pay-as-you-go” traceback model is cost-effective since the investigation may last for just
hours with effective traceback techniques.
This process of connectivity testing primarily checks the device and application behavior while the
network is subjected through a load, or with intermittent failures, or also checked for their
performance when there has been a loss of connectivity. These real-time scenarios build robustness of
these IoT devices and their underlying platforms as a whole to ensure these IoT apps are checked for
various connectivity issues to ensure they perform well.
Functionality testing:
Functionality testing is critical for the success of IoT applications which is essential for them to work
seamlessly. This type of functionality testing is needed for sensors and the IoT apps connected and
might not be required for the network and backend data center connections. Automated functionality
testing consumes less time and ensures quality results while testing these IoT applications and should
be leveraged.
Security testing:
The IoT environment involves numerous users and massive amounts of data transfer at various
connections. It is therefore essential to validate the users through effective user authentication and
ensure highest safety, and security of the IoT ecosystem. In addition, as there are a lot of
interconnected devices involved and connected, there is every chance for cyber threats and
vulnerabilities to attack the networks and systems. Hence, it is essential to adopt security testing
services to get safe and secure IoT interconnected systems.
Usability testing:
Today’s fast paced customers prefer only such IoT apps which perform seamlessly and are easy to
use. Some of the most commonly used IoT apps such as smart homes, smart wearables, smart grids,
connected car, telemedicine, telehealth, etc. have all been successful only due to their ease of usage
and due to their seamless performance. Hence, primarily usability testing is critical and essential for
these IoT apps performance.
Performance testing:
End-users prefer those IoT apps which perform seamlessly and deliver great user experience.
Automated performance testing is preferred as test scripts are executed without any human
intervention. While adopting this method of testing, testers should also consider various other
performance factors such as network bandwidth, latency, packet loss, balance with a number of
concurrent users, etc. Therefore, performance testing should be done for the IoT application, networks
and also for the backend connections involved within these IoT apps. Thus, it is also preferred to run
these performance tests with various types of networks and data streams to achieve great IoT app
performance results.
Scalability testing:
This form of scalability testing is essential for building an IoT test environment as it involves
simulation of sensors by using various virtualization tools and technologies. The scalability of these
apps within the IoT ecosystem is important to get the desired IoT apps.