• Twitter
  • Facebook
  • LinkedIn
  • Instagram
  • YouTube

Computer Village | Authorized HP Dell Apple Acer Lenovo Distributor in Lagos Nigeria.

Powering ICT in Africa

  • HOME
  • ABOUT US
  • BLOG
    • NEWS
  • PRODUCT & SERVICES
    • HP SERVERS PRICE LIST IN LAGOS NIGERIA
    • Hikvision Authorized CCTV Dealers Distributors Lagos Nigeria
    • HPE PROLIANT SERVERS
    • UK USED DURABLE LAPTOPS
    • DELL SERVER PRICE IN LAGOS NIGERIA
    • DELL LAPTOP COMPUTER PRICE LIST IN LAGOS NIGERIA
    • LENOVO LAPTOP COMPUTER PRICE LIST IN LAGOS NIGERIA
    • FAIRLY USED HP LAPTOP PRICE IN LAGOS NIGERIA
    • Computer Monitors, LCD Monitor, LED Monitor
    • DAHUA CAMERA DISTRIBUTOR SUPPLIER IN LAGOS NIGERIA
    • PROJECTOR DEALERS IN LAGOS NIGERIA AND PRICES SPECIFICATIONS
    • HP DESKTOP ALL-IN-ONE PRICE LIST LAGOS NIGERIA
    • COMPUTER ACCESSORIES AND COMPUTER PARTS
    • COMPUTER VILLAGE PRICELIST
  • CONTACT
  • REQUEST A QUOTE

October 3, 2019 By admin Leave a Comment

What is the security impact of using IoT edge devices to enable business decisions?

What is the security impact of using IoT edge devices to enable business decisions?

In October 2014, the IoT World Forum Architecture Committee published a seven-layer IoT reference model, in which layer three is edge computing.1 This layer is responsible for facilitating connectivity and analysis between physical devices, applications and business processes. As more businesses embrace this framework, securing the edge computing layer will be critical in enabling trustworthy business decisions. Fundamental processes like the ability of edge devices to authenticate, authorize and discover other devices and services will need to be analyzed through the security lens.

Hardware-Village-Nigeria

For legacy devices, businesses may choose to retrofit them with new capabilities to make them a part of their connected infrastructure. For example, manufacturing companies increasingly integrate their industrial systems in the field to optimize decision making and production. However, this may make it more difficult to implement authentication, authorization or encryption controls on these modified devices. Fully protecting this range of distributed devices will require businesses to emphasize and extend their security footprint far beyond existing borders.

Prioritize protecting edge devices Unlike traditional computing devices, IoT edge devices are typically embedded sensors and controllers with fixed functions and the ability to perform specific tasks. Smart meters, for example, allow two-way information flow between the electricity utility and customers. Traditionally, these devices are deployed outside the security perimeter and, in some cases, directly connected to the Internet. Since many device developers are not security specialists with a thorough understanding of potential threats, physical protections are not universal features of IoT edge devices. As a result, there are numerous ways to physically tamper with them.

Boost security for edge device infrastructure As businesses delegate increased authority to edge devices, they will need to pay even more attention to fundamental security controls like data protection, auditability, privilege management, vulnerability management, device authentication and network segmentation. The Shellshock vulnerability affected not only Linux-based servers and desktops, but also many IoT devices that used some variants of Linux.2 Exacerbating this issue was the lack of patching or anomalous activity detection capabilities in these devices. To avoid similar challenges, businesses must invest in ecosystem hygiene—integrating techniques to patch and securely update IoT devices and their configurations to reduce the impact of vulnerabilities spreading through the environment.

Establishing trust zones, wherein enterprise resources with similar security requirements are placed in the same network segment, has proven to be an effective risk mitigation technique in various enterprise systems. Businesses can extend this practice to edge infrastructure where devices need to be separated by their inherent capabilities and security features. It will be important to allow edge devices to communicate across different trust zones as network topologies are modified. To enable business decisions at the edge, businesses must ensure that edge device interaction is governed by appropriate authentication and algorithms that can take autonomous actions, and that the actions being performed are authorized. Intel’s IoT Gateway is an example of a solution to extend the capabilities of legacy devices and connect them to a next-generation intelligent infrastructure.3 This platform enables businesses to setup secure connections between devices in different trust zones, as well as build custom applications to manage authentication and authorization. The platform includes security management capabilities for resource-constrained devices, enabling cloud connectivity and more. Yet another way for businesses to boost security is to implement on edge devices foundational security controls like immutable identification and whitelisting of allowable agents and applications. Include system context in security planning As more decisions are made at the edge rather than at the core controller, context-awareness capabilities will underpin real-time decision making. Businesses should make sure intrusion detection and mitigation techniques take into account device behavior, its relationship with other devices and the overall context of services being provided. Is the device providing mission-critical data? Is it passively collecting data, or also responding and actuating? Is it part of a cohort of devices that depend on each other for decision making? Security planning needs to be holistic, taking into account the entire context of the system. Context dependence will drive physical and logical security models. To that end, Cisco is developing a distributed computing infrastructure to support edge analytics, which it calls “fog computing.”4 Using Cisco’s IOx capability, businesses can develop, manage and run applications that are closer to where actionable data is generated, and then delegate authority for pre-specified decision making. They can also build security capabilities using the IOx platform and develop use cases that expand security planning to perimeter and edge devices. Solutions like this will help businesses understand the interactions of devices, profile their activities and respond appropriately.

Manage edge intelligence with new governance model Data governance, communication and privacy models must keep pace with new frameworks and architectures being introduced to build end-toend IoT systems. As edge devices communicate and make decisions based off telemetry from various sources, it will be critical for businesses to maintain supervisory control. The nature of control needed will drive ecosystem requirements—such as determining whether cloud or private network solutions are preferred. Businesses need to architect a hierarchical supervisory controls model that optimizes the right security controls for the right business processes to achieve the full benefit of a flexible infrastructure. Unfortunately, security planning must also anticipate the likelihood of a breach—no organization seems immune from attack. During a cyber-attack, the supervisory control model must balance requirements for resiliency and availability—minimizing downtime—for ongoing device operations. Mocana, a company that focuses on securing non-traditional endpoints, has developed an IoT device framework for protecting edge data and enterprise communications. This framework consists of a range of capabilities— including key management, secure wireless and strong encryption—required for management of a distributed IoT infrastructure. Mocana also provides an API for rapid deployment of secure IoT devices that conform to business requirements and governance models. Another option comes from FogHorn Systems, which is developing an IoT application deployment platform that supports delivery and management of host applications embedded in edge devices.5 Businesses can use the platform to distribute applications from platform-as-a-service (PaaS) to onsite sensor networks. The FogHorn Edge Platform delivers service level agreement (SLA)-sensitive security applications to the edge, which can be triggered based on specific conditions. Conclusion Edge devices will have a profound impact on the security infrastructure, as IoT becomes an integral part of business in the digital ecosystem. Accenture recommends that businesses work to understand and proactively address the security implications of decisions being made at the edge. Managing and safeguarding edge devices, as well as the end-toend set of technologies that enable intelligent decisions, will be essential to future operations.

Filed Under: BLOG

SEAGATE EXTERNAL HARD DRIVES AND SSDS

https://www.youtube.com/watch?v=QGEFdjCgf9I

Leave a Reply Cancel reply

Your email address will not be published. Required fields are marked *

Ask The Hardware Expert

Products

  • LENOVO IDEAPAD 110-15IBR INTEL® PENTIUM®N3710 4GB RAM 1TB HDD WINDOWS 10 LENOVO IDEAPAD 110-15IBR INTEL® PENTIUM®N3710 4GB RAM 1TB HDD WINDOWS 10 ₦180,000.00 ₦160,000.00
  • JBL Flip 5 - Speaker - for portable use - wireless - Bluetooth - 20 Watt - ocean blue JBL Flip 5 - Speaker - for portable use - wireless - Bluetooth - 20 Watt - ocean blue ₦54,697.00
  • Sony Signature Series DMP-Z1 - Digital player - 256 GB Sony Signature Series DMP-Z1 - Digital player - 256 GB ₦3,875,544.00
  • Bose Soundbar 700 for TV - Wireless - Bluetooth, Wi-Fi - Arctic White Bose Soundbar 700 for TV - Wireless - Bluetooth, Wi-Fi - Arctic White ₦364,344.00
  • Ultimate Ears BOOM 3 - Ultraviolet Purple Ultimate Ears BOOM 3 - Ultraviolet Purple ₦68,395.44
  • Bose Home Speaker 500 - Bluetooth, Wi-Fi - Triple Black Bose Home Speaker 500 - Bluetooth, Wi-Fi - Triple Black ₦181,944.00
  • Ultimate Ears MEGABOOM3 Wireless Speaker - Lagoon Blue Ultimate Ears MEGABOOM3 Wireless Speaker - Lagoon Blue ₦91,195.44
  • Logitech Z625 - Speaker system - 2.1-channel - 200-watt (total) Logitech Z625 - Speaker system - 2.1-channel - 200-watt (total) ₦77,515.44
  • Logitech Z906 Surround Sound Speaker System Logitech Z906 Surround Sound Speaker System ₦177,995.00
  • HP Pavilion x360 Laptop HP Pavilion x360 Laptop - 14t-dw000 touch
  • HP Spectre Folio Laptop HP Spectre Folio - 13-ak0015nr
  • HP Spectre Folio Laptop HP Spectre Folio Laptop
  • Bose SoundLink Revolve Bluetooth Speaker - Triple Black Bose SoundLink Revolve Bluetooth Speaker - Triple Black ₦90,744.00
  • Bose SoundLink Color Portable Bluetooth Speaker II - Soft Black Bose SoundLink Color Portable Bluetooth Speaker II - Soft Black ₦58,824.00
  • Bose SoundLink Micro Portable Bluetooth Speaker - Midnight Blue Bose SoundLink Micro Portable Bluetooth Speaker - Midnight Blue ₦45,144.00

Ask The Expert – Computer Repair

Hardware Village

Authorized HP Dell Apple Acer Asus Lenovo Distributor in Lagos Nigeria.

Head Office : 15 Oyebola Street, Lagos, Nigeria

Branch Office : 17 Oremeji street, Computer Village , Ikeja, Lagos.

+2347086258443
+2347049183845

Email 1: info@hardwarevillagengr.com
Email 2: tosinxx@gmail.com

HARDWARE MANUFACTURER

  • TOSHIBA
  • LENOVO
  • DELL
  • ASUS
  • APPLE
  • ACER
  • HP
  • EXTERNAL DRIVE
  • PROJECTOR
  • SERVERS
  • Privacy Policy
  • TOSHIBA
  • LENOVO
  • DELL
  • ASUS
  • APPLE
  • ACER
  • HP
  • EXTERNAL DRIVE
  • PROJECTOR
  • SERVERS
  • Privacy Policy

© Copyright 2018 Hardware Village · All Rights Reserved · Powered by Hardware Village Technology ·