41 Cybersicherheit von Embedded Systems, OT und IoT /invite Thomas Weber, CyberDanube
Description
Eingebettete Geräte („embedded systems“) sind ein fester Bestandteil unseres täglichen Lebens. Diese Geräte, die von Smart Metern bis hin zu industriellen Steuerungssystemen reichen, sind darauf ausgelegt, bestimmte Aufgaben auszuführen und werden in der Regel mit begrenzten Ressourcen gebaut. Natürlich haben „embedded systems“ oder auch OT/operational technology IT-Sicherheitsprobleme. Zusammen mit Thomas Weber spreche ich über die Cyber-Sicherheitsimplikationen dieser zahlreichen Geräte. Wir gehen darauf ein, wo „embedded systems“ überall drin stecken, welche Verwundbarkeiten sie haben und wie man ihre Sicherheit verbessern kann. Wir veranschaulichen das am Beispiel der Smart Meter Diskussion zur intelligenten Steuerung des Stromnetzes. Zum Schluss sprechen wir auch noch über aktuelle Entwicklungen in der EU, wie der EU Cyber Resilience Act, der auch an den IT-Sicherheitsanforderungen von „embedded systems“ Verbesserungen einführt.
Shownotes
- CyberDanube: https://cyberdanube.com/de/
- Thomas Weber: https://www.linkedin.com/in/thomas-weber-ce/?originalSubdomain=at
- How do OT and IT differ? https://www.cisco.com/c/en/us/solutions/internet-of-things/what-is-ot-vs-it.html
- US NIST Guide to Operational Technology (OT) Security, https://csrc.nist.gov/pubs/sp/800/82/r3/ipd
- Characteristics of embedded Systems and IoT, https://www.upskillcampus.com/blog/embedded-systems-characteristics-of-embedded-systems-and-iot
- Embedded Software market shares, https://www.gminsights.com/industry-analysis/embedded-software-market
- Embedded System market size, https://www.globenewswire.com/news-release/2023/01/25/2595562/0/en/The-Global-Embedded-Systems-Market-size-is-expected-to-reach-126-7-billion-by-2028-rising-at-a-market-growth-of-5-7-CAGR-during-the-forecast-period.html
- Security challenges of Embedded IoT Design, https://www.renesas.com/us/en/document/whp/how-solve-6-top-security-challenges-embedded-iot-design-0
- OT Security best practices, https://www.beyondtrust.com/blog/entry/operational-technology-ot-cybersecurity-4-best-practices
- Benefits of smart meters, https://www.smart-energy.com/regional-news/north-america/potential-benefits-to-society-through-smart-metering-initiatives/amp/
- Societal benefits of smart metering investments, https://www.sciencedirect.com/science/article/abs/pii/S1040619008001929
- Demand Response, https://www.iea.org/energy-system/energy-efficiency-and-demand/demand-response
- Vulnerabilities in smart meters, https://techmonitor.ai/technology/cybersecurity/how-secure-are-smart-meters
- IT security of the smart grid, https://smartgrid.ieee.org/bulletins/july-2018/security-and-privacy-concerns-in-smart-metering-the-cyber-physical-aspect
- Resiliency of smart power meters, https://www.sciencedirect.com/science/article/pii/S1877050915008492
- Smart meter security, https://www.researchgate.net/publication/333305127_Smart_Meter_Security_Vulnerabilities_Threat_Impacts_and_Countermeasures
- Mitigating smart meter security risks, https://eepower.com/technical-articles/mitigating-smart-meter-security-risk-a-privacy-preserving-approach/
- Microsoft Multiple high severity vulnerabilities in CODESYS V3 SDK, https://www.microsoft.com/en-us/security/blog/2023/08/10/multiple-high-severity-vulnerabilities-in-codesys-v3-sdk-could-lead-to-rce-or-dos/
- 16 Car Makers and Their Vehicles Hacked via Telematics, APIs, Infrastructure, https://www.securityweek.com/16-car-makers-and-their-vehicles-hacked-telematics-apis-infrastructure/
- Nachtrag: Sicherheit von öffentlichen WLANs und Antiviren Tools
- The Risk of Public Wifi, https://www.forbes.com/advisor/business/public-wifi-risks/#:~:text=One%20of%20the%20biggest%20risks,your%20devices%20without%20you%20knowing.
- CISA Best practices public WiFi, https://www.cisa.gov/sites/default/files/publications/Best%2520Practices%2520for%2520Using%2520Public%2520WiFi.pdf
- Die Schlangenöl Branche, https://www.golem.de/news/antivirensoftware-die-schlangenoel-branche-1612-125148.html
- Schutz oder Schlangenöl?, https://www.heise.de/select/ct/2017/5/1488560529789980
- Do you still need Antivirus?, https://www.security.org/antivirus/do-you-need-antivirus/
- Is Antivirus Software Becoming Obsolete?, https://www.poweradmin.com/blog/are-malware-threats-making-antivirus-software-obsolete/
- 31 Antivirus Statistics and Trends, https://dataprot.net/statistics/antivirus-statistics/#:~:text=On%20average%2C%20antivirus%20software%20is,25%25%20successful%20at%20detecting%20malware.&text=Statistics%20on%20computer%20viruses%20and,%2Dthe%2Dline%20antivirus%20software.
- Do you need antivirus protection in 2023?,
- https://surfshark.com/blog/do-i-need-antivirus
- You Don’t Need to Buy Antivirus Software, https://www.nytimes.com/wirecutter/blog/best-antivirus/
- Understanding Anti-Virus Software, https://www.cisa.gov/news-events/news/understanding-anti-virus-software
- Antivirus and other security software, https://www.ncsc.gov.uk/collection/device-security-guidance/policies-and-settings/antivirus-and-other-security-software
- Virenschutz und falsche Antivirensoftware, https://www.bsi.bund.de/DE/The